That would become a single point of failure - takes out both WAN connections. Engineering redundancy solutions which does not make your setup less reliable is not straightforward.Hmm what about a managed switch in between?
They were examples of subnets attached to the VLAN interfaces at each end. Your original example has two VLANs but only one subnet at each end which is insufficient.What are: 192.168.11.0/24 + 192.168.12.0/24 and Remote: 192.168.21.0/24 + 192.168.22.0/24 ?
Be aware that if you add an EoIP interface with an MTU<1500 to a bridge it will impact any traffic between local bridge ports too, usually breaking things.I have set 1300 MTU on the EoIP tunnel. Additional rule set MSS to 1250.
Using the WiFi on the Mikrotik itself doesn't require CAPsMAN, just configure the wlan interfaces directlyI would ideally like to use both the Mikrotik itself and the Cisco since I need to cover a considerably large area.
There is no /interface bridge section to create the bridge.Afternoon, I am installing a CRS tomorrow, can someone just verify my config.
Only if you wish to access services on the Mikrotik itself from them, e.g. management access.Does the bridge need to be tagged on all vLans?
As mentioned in an earlier post the SNTP client is fine, however upon installing the NTP package to provide a local NTP server the replacement NTP client still only accepts IP addresses, not names.What feature? Some arrow to point you to the right menu?
The Mikrotik implementation only supports TCP for the VPN client to server connection itself (I believe UDP has been added in RouterOS 7), the VPN tunnel handles any layer 3 payload in IP / TUN mode.What can we do if we want to use OpenVPN on MikroTik when it lacks UDP?
Exactly which standards prohibit that behaviour?Then its not a switch its an abomination following no standards.Erm, no. There is nothing preventing SSIDs or switch ports being assigned to the untagged network in UniFi, in fact you have to explicitly assign them to be tagged.