The best guide ref vlans is:
http://forum.mikrotik.com/t/using-routeros-to-vlan-your-network/126489/1
Make sure you read this over to cement your understanding!!!
Will look at the configs soon.
Router Config:
(1) I am a bit lazier than you on the bridge ports (which define ingress behaviour), for the router I normally only add ingress-filtering=yes for trunk ports, and frame-types=admit-only-untagged-and-priority-tagged for access ports. Works fine either way.
(2) You did miss setting the pvid on port 5 though.
add bridge=BR1 comment=settop-box frame-types=
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=
ether5 pvid=10
(3) I am curious as to this setting on a wired only router ;-P, which needs to be removed:
add bridge=BR1 interface=wlan1 pvid=99
(4) Your bridge vlan settings are a bit off.
Normally you separate each line by vlan-ids but in your case with a single trunk, it is very doable to combine them but weird why you combined two and not the third??
/interface bridge vlan
From
add bridge=BR1 tagged=BR1,ether3-TRUNK vlan-ids=10,20
add bridge=BR1 tagged=BR1,ether3-TRUNK vlan-ids=99
To
dd bridge=BR1 tagged=BR1,ether3-TRUNK vlan-ids=10,20,99
However, you also have vlan 10 going to other ports so you cannot combine vlan 10. Furthermore you forgot to define the other egress (access ports) so it should look more like
add bridge=BR1 tagged=BR1,ether3-TRUNK vlan-ids=20,99
add bridge=BR1 tagged=BR1,ether3-TRUNK untagged=ether2,ether4,ether5 vlan-ids=10
(5) Interface list… are good to use but…
Items in red, are mythical creatures that dont exist.
Items in green are not useful duplicates.
The list entries by VLAN are the good ones and define all that is required.
I would not necessarily have an interface-list (other than defaults) that contains only interface, they help with multiple entries for the most part!!
/interface list member
add interface=BR1 list=LAN
add interface=ether1-WAN list=WAN
add interface=wlan1 list=MGMT
add interface=VLAN99_MGMT list=MGMT ???
add interface=VLAN10_HOME list=LAN
add interface=VLAN20_GUEST list=LAN
add interface=VLAN99_MGMT list=LAN
add interface=ether2 list=LAN
add interface=ether3-TRUNK list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=wlan1 list=LAN
(6) Firewall address list - what are you trying to accomplish here ???
/ip firewall address-list
add address=185.125.X.X list=blckaccess AND
add action=drop chain=forward comment=“Block Access” dst-address-list=
blcksafran src-address=0.0.0.0/0
(7) Input Chain FW rules look good! The only question is the intent of these two rules… not clear in my mind what you are trying to accomplish??
add action=accept chain=input comment=“Allow LAN” in-interface-list=LAN
add action=accept chain=input comment=“Allow Mgmt_Vlan Full Access”
in-interface=VLAN99_MGMT
The only person that needs access to the router itself to configure the router is the Admin.
So I create a firewall address list
add address=IP (my desktop-static) list=adminaccess
add address=IP (my laptop or ipad -static) list=adminaccess
and thus only need a single rule
add action=accept chain=input in-interface=vlan99_MGMT (or which ever subnet my devices are on) src-address-list=adminaccess
(8) In the forward chain, to go along with the premise above that you are in the management subnet, a specific FORWARD rule to be able to access all vlans!
add action=accept chain=forward in-interface=vlan99_MGMT src-address-list=adminaccess out-interface-list=VLAN*
- you could get fancy in the interface-list members and create another interface list as ‘VLAN’ includes the vlan you are coming from so its not as efficiently stated.
add - vlan10 list=othervlans
add - vlan20 list=othervlans
add action=accept chain=forward in-interface=vlan99_MGMT src-address-list=adminaccess out-interface-list=othervlans
(9) Unless you need this for something?? Security wise best to deactivate.
/tool mac-server
set allowed-interface-list=LAN