Community discussions

MikroTik App
 
NetworqAndy
just joined
Topic Author
Posts: 17
Joined: Mon Oct 03, 2016 10:58 pm

Internal access to WAN connection over VLAN

Mon Apr 29, 2024 7:11 pm

Hi all,

So, I'm looking to use a WAN connection that's physically located elsewhere on the network from the main RB1100 router. Switch at that location is a CSS610, with 5 VLANs set up.

Network uses VLANs 10, 20, 30 and 40 for various other things and I've set up VLAN90 for this WAN connection.

Topology:

Mikrotik RB1100 - WAN1 and WAN2 are local to here (on ether1 and ether2 respectively, although only WAN2 is active currently). ether6-10 are trunk ports.
||
||trunk port
||
Mikrotik CSS610 switch (Ports 7 and 8 are members of VLAN90).
> ether1 is for local access point on vlan10 + 20.
> ether7 is for WAN3 connection to modem. Set as access port. Optional (to allow untagged packets on ingress) with PVID of 90. Allow any packets.
> ether8 is set as trunk port. Strict VLAN. Only tagged packets allowed.

ISP has advised no PPPoE authentication is required - address will be assigned using DHCP to LAN cable on fibre modem.

I've proven this works by creating an access port on the RB1100 on vlan90, and my laptop's ethernet has picked up a DHCP address with my laptop jumping on the internet using WAN3. However... I now need to create a DHCP client within the RB1100 which can pickup up VLAN90 in order to set up NAT/routes etc. I'm sure there's a way to do that as I don't really want to end up devoting two physical ethernet ports on the router (ie. ether3 as an access port on VLAN90 and ether4 as a WAN port with DCHP client).

Grateful of any guidance on where I'm going wrong here. I can't see an interface that would virtually achieve this. Would the right solution here to create another bridge?

Config below for the RB1100....

# apr/29/2024 17:06:32 by RouterOS 6.49.14
# software id = E75X-80RJ
#
# model = RB1100Dx4
# serial number = HEY09AX5MMT
/interface bridge
add name=bridge1 vlan-filtering=yes
add name=bridgeWAN3 vlan-filtering=yes
/interface ethernet
set [ find default-name=ether5 ] name=OffBridge-5
set [ find default-name=ether1 ] name=WAN1
set [ find default-name=ether2 ] name=WAN2
set [ find default-name=ether3 ] name=WAN3-Future
set [ find default-name=ether4 ] name=WAN4-Future
set [ find default-name=ether6 ] comment=TRNK-REC-18
set [ find default-name=ether7 ] comment=TRNK-REC-21
set [ find default-name=ether8 ] comment=TRNK-REC-34
set [ find default-name=ether9 ] comment=TRNK-SPARE
set [ find default-name=ether10 ] comment=TRNK-REC-SWITCH
set [ find default-name=ether11 ] name=ether11-StaffMGMT
set [ find default-name=ether12 ] name=ether12-StaffMGMT
set [ find default-name=ether13 ] name=ether13-Guest
/interface pppoe-client
add disabled=no interface=WAN2 name=WAN2GradwellSoGEA use-peer-dns=yes user=\
    HIDDEN
/interface l2tp-server
add name=l2tp-in-VPN user=HIDDEN
/interface vlan
add interface=bridge1 name=vlan1_setup vlan-id=1
add interface=bridge1 name=vlan10_StaffMGMT vlan-id=10
add interface=bridge1 name=vlan20_Guest vlan-id=20
add interface=bridge1 name=vlan30_VOIP vlan-id=30
add interface=bridge1 name=vlan40_CCTV vlan-id=40
add comment=FutureWAN interface=WAN3-Future name=vlan90_WAN3 vlan-id=90
/caps-man datapath
add bridge=bridge1 name=datapath_StaffMGMT vlan-id=10 vlan-mode=use-tag
add bridge=bridge1 name=datapath_Guest vlan-id=20 vlan-mode=use-tag
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=security_StaffMGMT
add authentication-types=wpa2-psk encryption=aes-ccm name=security_Guest
/caps-man configuration
add country="united kingdom" datapath=datapath_Guest \
    datapath.client-to-client-forwarding=no datapath.vlan-id=20 \
    datapath.vlan-mode=use-tag installation=indoor mode=ap name=cfg_GuestWifi \
    security=security_Guest ssid=OldMill_GuestWiFi
add country="united kingdom" datapath=datapath_StaffMGMT datapath.bridge=\
    bridge1 installation=indoor mode=ap name=cfg_StaffMGMT security=\
    security_StaffMGMT ssid=OldMill_Staff
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
set 12 default-vlan-id=0
set 13 default-vlan-id=0
set 14 default-vlan-id=0
set 15 default-vlan-id=0
/interface list
add name=WAN
add name=LAN
add name=MGMT
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp_StaffMGMT ranges=10.10.100.1-10.10.199.254
add name=dhcp_Guest ranges=10.20.100.1-10.20.199.254
add name=dhcp_VOIP ranges=10.30.100.1-10.30.199.254
add name=dhcp_CCTV ranges=10.40.100.1-10.40.199.254
add name=dhcp_VPN ranges=10.10.200.1-10.10.200.254
/ip dhcp-server
add address-pool=dhcp_StaffMGMT disabled=no interface=vlan10_StaffMGMT \
    lease-time=4w2d name=dhcpStaffMGMT
add address-pool=dhcp_Guest disabled=no interface=vlan20_Guest lease-time=1d \
    name=dhcpGuest
add address-pool=dhcp_VOIP disabled=no interface=vlan30_VOIP lease-time=\
    4w2d10m name=dhcpVOIP
add address-pool=dhcp_VOIP disabled=no interface=vlan40_CCTV lease-time=\
    4w2d10m name=dhcpCCTV
/ppp profile
set *0 interface-list=LAN
add bridge=bridge1 interface-list=LAN local-address=dhcp_StaffMGMT name=\
    SquibbyVPN remote-address=dhcp_VPN
/queue type
add kind=pcq name=pcq-download-guest pcq-classifier=dst-address pcq-rate=10M
add kind=pcq name=pcq-upload-guest pcq-classifier=src-address pcq-rate=5M
/queue simple
add disabled=yes max-limit=900M/900M name=Global queue=\
    ethernet-default/ethernet-default target=\
    10.10.0.0/16,10.20.0.0/16,10.30.0.0/16,10.40.0.0/16
add limit-at=700M/500M max-limit=700M/500M name=Guest queue=\
    pcq-upload-guest/pcq-download-guest target=10.20.0.0/16
/caps-man manager
set enabled=yes package-path=/ upgrade-policy=suggest-same-version
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=bridge1
add disabled=no interface=vlan10_StaffMGMT
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=cfg_StaffMGMT \
    name-format=identity slave-configurations=cfg_GuestWifi
/dude
set enabled=yes
/interface bridge port
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether6
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether7
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether8
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether9
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether10
add bridge=bridge1 ingress-filtering=yes interface=ether11-StaffMGMT pvid=10
add bridge=bridge1 ingress-filtering=yes interface=ether12-StaffMGMT pvid=10
add bridge=bridge1 ingress-filtering=yes interface=ether13-Guest pvid=20
add bridge=bridge1 ingress-filtering=yes interface=WAN3-Future pvid=90
/ip neighbor discovery-settings
set discover-interface-list=MGMT
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,ether6,ether7,ether8,ether9,ether10 \
    untagged=ether11-StaffMGMT,ether12-StaffMGMT,ether13-Guest vlan-ids=10
# port with pvid added to untagged group which might cause problems, consider adding a seperate VLAN entry
add bridge=bridge1 tagged=\
    bridge1,ether6,ether7,ether8,ether9,ether10,WAN3-Future vlan-ids=\
    20,30,40,90
/interface l2tp-server server
set default-profile=SquibbyVPN enabled=yes use-ipsec=yes
/interface list member
add interface=WAN1 list=WAN
add interface=vlan10_StaffMGMT list=LAN
add interface=vlan20_Guest list=LAN
add interface=vlan30_VOIP list=LAN
add interface=vlan40_CCTV list=LAN
add interface=vlan10_StaffMGMT list=MGMT
add interface=OffBridge-5 list=MGMT
add interface=WAN2GradwellSoGEA list=WAN
/interface pppoe-server server
add default-profile=SquibbyVPN disabled=no interface=<l2tp> service-name=\
    service1
/ip address
add address=10.30.0.1/16 interface=vlan30_VOIP network=10.30.0.0
add address=10.40.0.1/16 interface=vlan40_CCTV network=10.40.0.0
add address=10.10.0.1/16 interface=vlan10_StaffMGMT network=10.10.0.0
add address=10.20.0.1/16 interface=vlan20_Guest network=10.20.0.0
add address=192.168.55.1/24 interface=OffBridge-5 network=192.168.55.0
/ip dhcp-client
add add-default-route=no disabled=no interface=WAN1
/ip dhcp-server lease
#LOTS OF LEASES HERE - REMOVED FOR CLARITY#
/ip dhcp-server network
add address=10.10.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.10.0.1
add address=10.20.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.20.0.1
add address=10.30.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.30.0.1
add address=10.40.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.40.0.1
/ip dns
set servers=8.8.8.8,8.8.4.4
/ip firewall address-list
add address=10.20.100.1-10.20.199.254 list=Guest
add address=10.10.100.0/24 list=local
add address=10.20.100.0/24 list=local
add address=10.30.100.0/24 list=local
add address=10.40.100.0/24 list=local
add address=10.10.0.1-10.10.199.254 list=localLAN
add address=10.10.200.1-10.10.200.254 list=VPN
/ip firewall filter
add action=accept chain=input connection-state=established,related,untracked
add action=drop chain=input connection-state=invalid
add action=accept chain=input protocol=icmp
add action=accept chain=input in-interface=WAN2GradwellSoGEA protocol=\
    ipsec-esp
add action=accept chain=input dst-port=500,1701,4500 in-interface=\
    WAN2GradwellSoGEA protocol=udp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input in-interface-list=MGMT
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=tcp
add action=drop chain=input comment="Drop all else"
add action=fasttrack-connection chain=forward comment=\
    "fasttrack - disabled to allow queue function" connection-state=\
    established,related disabled=yes
add action=accept chain=forward comment=related-establ-untracked \
    connection-state=established,related,untracked
add action=drop chain=forward connection-state=invalid
add action=accept chain=forward comment="allow internet traffic" \
    in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="port forwarding" \
    connection-nat-state=dstnat disabled=yes
add action=accept chain=forward comment="MGMT to all vlans" \
    in-interface-list=MGMT out-interface-list=LAN
add action=drop chain=forward comment="drop all else"
add action=accept chain=forward comment=VPN dst-address-list=localLAN \
    src-address-list=VPN
/ip firewall mangle
add action=mark-connection chain=forward comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=no-mark disabled=yes dst-address-type=!local \
    in-interface-list=LAN new-connection-mark=viaWAN1 passthrough=yes \
    per-connection-classifier=both-addresses:2/0
add action=mark-connection chain=forward comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=no-mark disabled=yes dst-address-type=!local \
    in-interface-list=LAN new-connection-mark=viaWAN2 passthrough=yes \
    per-connection-classifier=both-addresses:2/1
add action=mark-routing chain=prerouting comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=viaWAN1 disabled=yes new-routing-mark=useWAN1 \
    passthrough=no
add action=mark-routing chain=prerouting comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=viaWAN2 disabled=yes new-routing-mark=useWAN2 \
    passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment="Disabled as not load balancing" disabled=yes distance=1 gateway=\
    192.168.2.1 routing-mark=useWAN1
add comment="Disabled as not load balancing" disabled=yes distance=1 gateway=\
    WAN2GradwellSoGEA routing-mark=useWAN2
add check-gateway=ping distance=1 gateway=WAN1
add distance=2 gateway=WAN2GradwellSoGEA
/ppp secret
add name=squibby profile=HIDDEN routes=10.10.0.0/16
/system clock
set time-zone-name=Europe/London
/system identity
set name=RB1100-Reception
/tool sniffer
set filter-interface=WAN1
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19729
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Internal access to WAN connection over VLAN

Mon Apr 29, 2024 7:45 pm

Well without looking at the config, the VLAN is created at the switch and is solely for the purposes of moving the connection from ether7 to ether8.
At the RB one simply terminates vlan90 on the incoming port
Simply assign a vlan to the interface and in IP DHCPclient use vlan90 as the interface.

You are also confusing by this desire to have an access port on ether3 for vlan90.????????????
No we are terminating vlan90 at ether4, there is no need to create anything extra.
GET RID OF THIS
add name=bridgeWAN3 vlan-filtering=yes
and this
add comment=FutureWAN interface=WAN3-Future name=vlan90_WAN3 vlan-id=90

No, do not use vlan=1 as an ID, its already used in the background by the MT device, use any other number please.
Classic error of creating an xtra vlan for the bridge traffic/ports ??? where are the five DHCP pools, dhp-server, dhp server-networks five IP addresses.
In other words if you have vlan1 where is the rest Conclusion there is no other subnet SO.............. GET RID of VLAN1

You are MISSING ip dhcp client for wan3 ???
/ip dhcp-client
add add-default-route=no interface=vlan90_WAN3


Ensure you ADD
/interface list member
add interface=WAN1 list=WAN
add interface=WAN2GradwellSoGEA list=WAN
add interface=vlan90_WAN3 list=WAN
add interface=WAN3-Future list=WAN ( just to be safe )
......................



Final thought, this was kind of silly you have a bridge mismatch but anyway you can REMOVE This not required.
add bridge=bridge1 ingress-filtering=yes interface=WAN3-Future pvid=90
 
NetworqAndy
just joined
Topic Author
Posts: 17
Joined: Mon Oct 03, 2016 10:58 pm

Re: Internal access to WAN connection over VLAN

Tue Apr 30, 2024 1:57 pm

Hi Anav,

Thanks for your reply. I've worked through your suggestions - the bridgeWAN3 was a hangover from trying a separate bridge approach, but noted on the vlan=1.

I did try adding on an IP DHCP CLIENT for WAN3 on the vlan90_WAN3 interface however this shows as 'invalid' within Winbox on the DHCP client list, and therefore doesn't pick up an IP address. If I deleted and recreate the rule it shows with a status of 'stopped'. This is when I started looking for what was different here - the vlan90 interface wasn't on the bridge, it was only assigned to ether3!

I now get an IP address however even after defining a route I can't ping out using vlan90 as the interface. Something not quite right but I can't see what... vlan90 DHCP client is not set to add a default route, so it's added in manually with a distance of 2 (pushing WAN2 to a distance of 3 to prove testing:
# apr/30/2024 12:13:11 by RouterOS 6.49.14
# software id = E75X-80RJ
#
# model = RB1100Dx4
# serial number = HEY09AX5MMT
/interface bridge
add name=bridge1 vlan-filtering=yes
/interface ethernet
set [ find default-name=ether5 ] name=OffBridge-5
set [ find default-name=ether1 ] name=WAN1
set [ find default-name=ether2 ] name=WAN2
set [ find default-name=ether3 ] name=WAN3WF300
set [ find default-name=ether4 ] name=WAN4-Future
set [ find default-name=ether6 ] comment=TRNK-REC-18
set [ find default-name=ether7 ] comment=TRNK-REC-21
set [ find default-name=ether8 ] comment=TRNK-REC-34
set [ find default-name=ether9 ] comment=TRNK-SPARE
set [ find default-name=ether10 ] comment=TRNK-REC-SWITCH
set [ find default-name=ether11 ] name=ether11-StaffMGMT
set [ find default-name=ether12 ] name=ether12-StaffMGMT
set [ find default-name=ether13 ] name=ether13-Guest
/interface pppoe-client
add disabled=no interface=WAN2 name=WAN2GradwellSoGEA use-peer-dns=yes user=\
    HIDDEN
/interface l2tp-server
add name=l2tp-in-VPN user=HIDDEN
/interface vlan
add interface=bridge1 name=vlan10_StaffMGMT vlan-id=10
add interface=bridge1 name=vlan20_Guest vlan-id=20
add interface=bridge1 name=vlan30_VOIP vlan-id=30
add interface=bridge1 name=vlan40_CCTV vlan-id=40
add comment="WAN3 - WF 300/300 Fibre Connection" interface=bridge1 name=\
    vlan90_WAN3 vlan-id=90
/caps-man datapath
add bridge=bridge1 name=datapath_StaffMGMT vlan-id=10 vlan-mode=use-tag
add bridge=bridge1 name=datapath_Guest vlan-id=20 vlan-mode=use-tag
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=security_StaffMGMT
add authentication-types=wpa2-psk encryption=aes-ccm name=security_Guest
/caps-man configuration
add country="united kingdom" datapath=datapath_Guest \
    datapath.client-to-client-forwarding=no datapath.vlan-id=20 \
    datapath.vlan-mode=use-tag installation=indoor mode=ap name=cfg_GuestWifi \
    security=security_Guest ssid=OldMill_GuestWiFi
add country="united kingdom" datapath=datapath_StaffMGMT datapath.bridge=\
    bridge1 installation=indoor mode=ap name=cfg_StaffMGMT security=\
    security_StaffMGMT ssid=OldMill_Staff
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
set 12 default-vlan-id=0
set 13 default-vlan-id=0
set 14 default-vlan-id=0
set 15 default-vlan-id=0
/interface list
add name=WAN
add name=LAN
add name=MGMT
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp_StaffMGMT ranges=10.10.100.1-10.10.199.254
add name=dhcp_Guest ranges=10.20.100.1-10.20.199.254
add name=dhcp_VOIP ranges=10.30.100.1-10.30.199.254
add name=dhcp_CCTV ranges=10.40.100.1-10.40.199.254
add name=dhcp_VPN ranges=10.10.200.1-10.10.200.254
/ip dhcp-server
add address-pool=dhcp_StaffMGMT disabled=no interface=vlan10_StaffMGMT \
    lease-time=4w2d name=dhcpStaffMGMT
add address-pool=dhcp_Guest disabled=no interface=vlan20_Guest lease-time=1d \
    name=dhcpGuest
add address-pool=dhcp_VOIP disabled=no interface=vlan30_VOIP lease-time=\
    4w2d10m name=dhcpVOIP
add address-pool=dhcp_VOIP disabled=no interface=vlan40_CCTV lease-time=\
    4w2d10m name=dhcpCCTV
/ppp profile
set *0 interface-list=LAN
add bridge=bridge1 interface-list=LAN local-address=dhcp_StaffMGMT name=\
    SquibbyVPN remote-address=dhcp_VPN
/queue type
add kind=pcq name=pcq-download-guest pcq-classifier=dst-address pcq-rate=10M
add kind=pcq name=pcq-upload-guest pcq-classifier=src-address pcq-rate=5M
/queue simple
add disabled=yes max-limit=900M/900M name=Global queue=\
    ethernet-default/ethernet-default target=\
    10.10.0.0/16,10.20.0.0/16,10.30.0.0/16,10.40.0.0/16
add limit-at=700M/500M max-limit=700M/500M name=Guest queue=\
    pcq-upload-guest/pcq-download-guest target=10.20.0.0/16
/caps-man manager
set enabled=yes package-path=/ upgrade-policy=suggest-same-version
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=bridge1
add disabled=no interface=vlan10_StaffMGMT
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=cfg_StaffMGMT \
    name-format=identity slave-configurations=cfg_GuestWifi
/dude
set enabled=yes
/interface bridge port
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether6
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether7
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether8
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether9
add bridge=bridge1 frame-types=admit-only-vlan-tagged ingress-filtering=yes \
    interface=ether10
add bridge=bridge1 ingress-filtering=yes interface=ether11-StaffMGMT pvid=10
add bridge=bridge1 ingress-filtering=yes interface=ether12-StaffMGMT pvid=10
add bridge=bridge1 ingress-filtering=yes interface=ether13-Guest pvid=20
/ip neighbor discovery-settings
set discover-interface-list=MGMT
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,ether6,ether7,ether8,ether9,ether10 \
    untagged=ether11-StaffMGMT,ether12-StaffMGMT,ether13-Guest vlan-ids=10
# port with pvid added to untagged group which might cause problems, consider adding a seperate VLAN entry
add bridge=bridge1 tagged=\
    bridge1,ether6,ether7,ether8,ether9,ether10,WAN3WF300 vlan-ids=\
    20,30,40,90
/interface l2tp-server server
set default-profile=SquibbyVPN enabled=yes use-ipsec=yes
/interface list member
add interface=WAN1 list=WAN
add interface=vlan10_StaffMGMT list=LAN
add interface=vlan20_Guest list=LAN
add interface=vlan30_VOIP list=LAN
add interface=vlan40_CCTV list=LAN
add interface=vlan10_StaffMGMT list=MGMT
add interface=OffBridge-5 list=MGMT
add interface=WAN2GradwellSoGEA list=WAN
add interface=vlan90_WAN3 list=WAN
/interface pppoe-server server
add default-profile=SquibbyVPN disabled=no interface=<l2tp> service-name=\
    service1
/ip address
add address=10.30.0.1/16 interface=vlan30_VOIP network=10.30.0.0
add address=10.40.0.1/16 interface=vlan40_CCTV network=10.40.0.0
add address=10.10.0.1/16 interface=vlan10_StaffMGMT network=10.10.0.0
add address=10.20.0.1/16 interface=vlan20_Guest network=10.20.0.0
add address=192.168.55.1/24 interface=OffBridge-5 network=192.168.55.0
/ip dhcp-client
add add-default-route=no disabled=no interface=WAN1
add add-default-route=no disabled=no interface=vlan90_WAN3
/ip dhcp-server lease
#LOADS OF LEASES REMOVED HERE
/ip dhcp-server network
add address=10.10.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.10.0.1
add address=10.20.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.20.0.1
add address=10.30.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.30.0.1
add address=10.40.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.40.0.1
/ip dns
set servers=8.8.8.8,8.8.4.4
/ip firewall address-list
add address=10.20.100.1-10.20.199.254 list=Guest
add address=10.10.100.0/24 list=local
add address=10.20.100.0/24 list=local
add address=10.30.100.0/24 list=local
add address=10.40.100.0/24 list=local
add address=10.10.0.1-10.10.199.254 list=localLAN
add address=10.10.200.1-10.10.200.254 list=VPN
/ip firewall filter
add action=accept chain=input connection-state=established,related,untracked
add action=drop chain=input connection-state=invalid
add action=accept chain=input protocol=icmp
add action=accept chain=input in-interface=WAN2GradwellSoGEA protocol=\
    ipsec-esp
add action=accept chain=input dst-port=500,1701,4500 in-interface=\
    WAN2GradwellSoGEA protocol=udp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input in-interface-list=MGMT
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input dst-port=53 in-interface-list=LAN protocol=tcp
add action=drop chain=input comment="Drop all else"
add action=fasttrack-connection chain=forward comment=\
    "fasttrack - disabled to allow queue function" connection-state=\
    established,related disabled=yes
add action=accept chain=forward comment=related-establ-untracked \
    connection-state=established,related,untracked
add action=drop chain=forward connection-state=invalid
add action=accept chain=forward comment="allow internet traffic" \
    in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="port forwarding" \
    connection-nat-state=dstnat disabled=yes
add action=accept chain=forward comment="MGMT to all vlans" \
    in-interface-list=MGMT out-interface-list=LAN
add action=drop chain=forward comment="drop all else"
add action=accept chain=forward comment=VPN dst-address-list=localLAN \
    src-address-list=VPN
/ip firewall mangle
add action=mark-connection chain=forward comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=no-mark disabled=yes dst-address-type=!local \
    in-interface-list=LAN new-connection-mark=viaWAN1 passthrough=yes \
    per-connection-classifier=both-addresses:2/0
add action=mark-connection chain=forward comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=no-mark disabled=yes dst-address-type=!local \
    in-interface-list=LAN new-connection-mark=viaWAN2 passthrough=yes \
    per-connection-classifier=both-addresses:2/1
add action=mark-routing chain=prerouting comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=viaWAN1 disabled=yes new-routing-mark=useWAN1 \
    passthrough=no
add action=mark-routing chain=prerouting comment=\
    "Disabled as currently set for DUAL WAN not PCC Load Balancing" \
    connection-mark=viaWAN2 disabled=yes new-routing-mark=useWAN2 \
    passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
/ip route
add comment="Disabled as not load balancing" disabled=yes distance=1 gateway=\
    192.168.2.1 routing-mark=useWAN1
add comment="Disabled as not load balancing" disabled=yes distance=1 gateway=\
    WAN2GradwellSoGEA routing-mark=useWAN2
add check-gateway=ping distance=1 gateway=WAN1
add distance=2 gateway=vlan90_WAN3
add distance=3 gateway=WAN2GradwellSoGEA
/ppp secret
add name=HIDDEN profile=SquibbyVPN routes=10.10.0.0/16
/system clock
set time-zone-name=Europe/London
/system identity
set name=RB1100-Reception
/tool sniffer
set filter-interface=WAN1

Thanks Anav for your help as always!!!

Who is online

Users browsing this forum: GoogleOther [Bot], jfim88, PrimeYeti, tryrtryrtryrt and 51 guests