trying to get 802.1q trunking working on ether4 to attach to linksys switch using a single bridge. VLANs 22 and 33 work on ports ether2 and 3. I have read all the documentation I can find on this still nothing seems to work.
any help is appreciated its driving me nuts at this point.
thanks
serial number = HF6094W66MX
/interface bridge
add admin-mac=78:9A:18:82:6E:12 auto-mac=no comment=defconf ingress-filtering=yes name=bridge vlan-filtering=yes
/interface vlan
add interface=bridge name=vlan22 vlan-id=22
add interface=bridge name=vlan33 vlan-id=33
/interface list
add comment=defconf name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=dhcpVLAN33 ranges=10.10.33.10-10.10.33.200
add name=dhcpVLAN22 ranges=10.10.22.10-10.10.22.200
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
add address-pool=dhcpVLAN22 disabled=no interface=vlan22 name=dhcp1
add address-pool=dhcpVLAN33 disabled=no interface=vlan33 name=dhcp2
/interface bridge port
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp1
add bridge=bridge interface=ether3 pvid=33
add bridge=bridge interface=ether2 pvid=22
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether4
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge tagged=bridge vlan-ids=22
add bridge=bridge tagged=bridge vlan-ids=33
/interface detect-internet
set internet-interface-list=WAN lan-interface-list=LAN wan-interface-list=WAN
/interface ethernet switch vlan
add independent-learning=no ports=ether2 switch=switch1 vlan-id=22
add independent-learning=no ports=ether3 switch=switch1 vlan-id=33
/interface list member
add comment=defconf interface=ether1 list=WAN
add comment=defconf interface=bridge list=LAN
add interface=vlan22 list=LAN
add interface=vlan33 list=LAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=10.10.22.1/24 interface=vlan22 network=10.10.22.0
add address=10.10.33.1/24 interface=vlan33 network=10.10.33.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=10.10.22.0/24 dns-server=208.67.220.220 gateway=10.10.22.1 next-server=208.67.222.222
add address=10.10.33.0/24 dns-server=208.67.220.220 gateway=10.10.33.1 next-server=208.67.222.222
add address=192.168.88.0/24 comment=defconf dns-server=208.67.220.220 gateway=192.168.88.1 next-server=208.67.222.222
/ip dns
set allow-remote-requests=yes servers=208.67.222.222,208.67.220.220
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
add name=208.67.222.222 ns=208.67.222.222 type=NS
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input dst-address=192.168.88.0/24 log=yes src-address=10.10.33.0/24
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/lcd
set default-screen=log time-interval=weekly
/system clock
set time-zone-name=America/New_York