Ok, you do not want to use dhcp server because you want to have fixed IPs. Have you considered to set static leasing of IP addresses?
Yes, I will look into setting that up.
Anyway, have you set the local ip address of your router as default route for each of the internal network devices?
Have you tried to ping external ip from the router? does it work? and from a device in the network?
I can't ping either way.
Or you have problem with DNS resolving?
It seems like it. This is weird because I was able to ping earlier. I wonder if I restored from a bad backup....
It is not easy to say, what could be the problem. Maybe you should post the complete export from mikrotik to check what you have set to it.
What ping directions have you tried with what result?
Here is the export:
# mar/14/2014 09:37:31 by RouterOS 6.10
# software id = XXXX-XXXX
#
/interface bridge
add l2mtu=1598 name=Bridge_6-10
/interface ethernet
set [ find default-name=ether1 ] comment=WAN
set [ find default-name=ether2 ] comment=LAN
/ip neighbor discovery
set ether1 comment=WAN
set ether2 comment=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=RouterOS
/ip hotspot user profile
set [ find default=yes ] idle-timeout=none keepalive-timeout=2m \
mac-cookie-timeout=3d
/ip pool
add name=Bridge_6-10 ranges=10.1.1.2-10.1.1.254
/port
set 0 name=serial0
set 1 name=serial1
/interface bridge port
add bridge=Bridge_6-10 interface=ether6
add bridge=Bridge_6-10 interface=ether7
add bridge=Bridge_6-10 interface=ether8
add bridge=Bridge_6-10 interface=ether9
add bridge=Bridge_6-10 interface=ether10
/ip address
add address=xxx.xx.xxx.5/25 comment="added by setup" interface=ether1 \
network=xxx.xx.xxx.0
add address=10.1.1.1/24 interface=ether2 network=10.1.1.0
add address=10.1.1.2/24 interface=Bridge_6-10 network=10.1.1.0
/ip dhcp-server config
set store-leases-disk=immediately
/ip dns static
add address=72.29.224.33 name=DNS1
add address=72.29.224.50 name=DNS2
/ip firewall address-list
add address=10.1.1.0/24 list=MyLAN
/ip firewall filter
add action=drop chain=input connection-state=invalid disabled=yes
add action=drop chain=forward connection-state=invalid disabled=yes
add chain=input disabled=yes src-address-list=MyLAN
add chain=input connection-state=established disabled=yes
add chain=forward disabled=yes src-address-list=MyLAN
add chain=forward connection-state=related disabled=yes
add chain=forward connection-state=established disabled=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1 to-addresses=0.0.0.0
/ip route
add comment="added by setup" distance=1 gateway=ether1
/ip upnp
set allow-disable-external-interface=no