I have been using the cAP ac (3 units) in my home since the beginning of 2019.
Now I want to add IoT and am therefore setting up a completely new setting.
I would like to put the setup together step by step. The cAP ac is only running for test purposes and therefore everything without passwords.
Firmware is: 6.49.12
eth1 is connected to our firewall UTM and it is used to access the Internet.
I got large parts of the setup from another thread in which @anav had given me a lot of helpful tips.
Now, for example, I want to bind the smartphones permanently to wifi2 with 5GHz, but an older tablet permanently to wifi1 with 2.4GHz
wifi 3 + wifi4 are for our children’s guests.
How do I solve this?
# jan/30/2024 17:29:34 by RouterOS 6.49.12
# software id = **ELIDED**
#
# model = RBcAPGi-5acD2nD
# serial number = ***
/interface bridge
add name=bridge1
/interface wireless
set [ find default-name=wlan1 ] disabled=no mode=ap-bridge ssid=MikroTik \
wireless-protocol=802.11
set [ find default-name=wlan2 ] disabled=no mode=ap-bridge ssid=MikroTik \
wireless-protocol=802.11
/interface ethernet
set [ find default-name=ether2 ] disabled=yes
/interface list
add comment=*****UTM***** name=WAN
add comment=*****WiFi***** name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add name=profile supplicant-identity=MikroTik
/interface wireless
add disabled=no mac-address=**ELIDED** master-interface=wlan2 name=\
wlan3 security-profile=profile ssid="MikroTik's Guests"
add disabled=no mac-address= **ELIDED** master-interface=wlan1 name=\
wlan4 security-profile=profile ssid="MikroTik's Guests"
/ip pool
add name=dhcp ranges=172.16.99.0/24
/ip dhcp-server
add add-arp=yes address-pool=dhcp disabled=no interface=bridge1 name=dhcp1
/interface bridge filter
add action=drop chain=forward in-interface=wlan3
add action=drop chain=forward out-interface=wlan3
add action=drop chain=forward in-interface=wlan4
add action=drop chain=forward out-interface=wlan4
/interface bridge port
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=wlan2
add bridge=bridge1 interface=wlan1
add bridge=bridge1 interface=wlan3
add bridge=bridge1 interface=wlan4
/interface list member
add comment=*****UTM***** interface=ether1 list=WAN
add comment=*****WiFi***** interface=bridge1 list=LAN
/ip address
add address=192.168.2.15/24 interface=ether1 network=192.168.2.0
add address=172.16.99.1/24 interface=bridge1 network=172.16.99.0
/ip cloud
set update-time=no
/ip dhcp-server network
add address=172.16.99.0/24 dns-server=1.1.1.1,1.0.0.1,8.8.8.8,8.8.4.4 \
gateway=172.16.99.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4,1.1.1.1,1.0.0.1
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="allow admin access with winbox/www" \
in-interface-list=WAN src-address=192.168.2.50
add action=accept chain=input comment="defconf: accept DNS" dst-port=53 \
in-interface-list=WAN protocol=tcp
add action=accept chain=input dst-port=53 in-interface-list=WAN protocol=udp
add action=drop chain=input comment="drop all else"
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=accept chain=forward comment=\
"*************allow internet traffic*********" in-interface-list=LAN \
out-interface-list=WAN
add action=accept chain=forward comment="allow port forwarding" \
connection-nat-state=dstnat disabled=yes
add action=drop chain=forward
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip route
add distance=1 gateway=192.168.2.1
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.2.0/24
set api disabled=yes
set winbox address=192.168.2.0/24
set api-ssl disabled=yes
/ip ssh
set host-key-size=4096 strong-crypto=yes
/system clock
set time-zone-name=Europe/Berlin
/system logging
add action=echo topics=dns
add action=echo topics=wireless
add action=echo topics=dhcp
add action=echo topics=bridge
add topics=hotspot
add action=echo topics=interface
add action=echo topics=firewall
add action=echo topics=dns
add action=echo topics=wireless
add action=echo topics=dhcp
add action=echo topics=bridge
add topics=hotspot
add action=echo topics=interface
add action=echo topics=firewall
/system ntp client
set enabled=yes primary-ntp=192.168.2.1
/system routerboard settings
set auto-upgrade=yes
/system scheduler
add interval=1d name="Auto-Backup per eMail" on-event="/system backup save nam\
e=email; \r\
\n/tool e-mail send to=\"xxx@xyz.de\" subject=([/system\
\_identity get name] . \"-auto-backup\") file=email.backup body=\"automati\
sch erstelltes Backup\"; \r\
\n:log info \"Backup e-mail sent.\";" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=nov/06/2019 start-time=00:00:00
add interval=1d name="Auto Update Firmware" on-event="/system package update\r\
\ncheck-for-updates once\r\
\n:delay 3s;\r\
\n:if ( [get status] = \"New version is available\") do={\r\
\n install ;\r\
\n/tool e-mail send to=\"xxx@xyzr.de\" subject=([/system\
\_identity get name] . \"-neues Update installiert\") body=\"Update vorhan\
den und installiert\"; \r\
\n:log info \"Update verfuegbar\"\r\
\n:delay 30s;\r\
\n/system reboot\r\
\n};\r\
\n:log info \"kein Update verfuegbar\";" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=nov/06/2019 start-time=03:00:00
add interval=1d name="Auto Update Routerboard" on-event=":global Var1\r\
\n:global Var2\r\
\n:set Var1 \"\$[/system package get system version]\"\r\
\n:set Var2 \"\$[/system routerboard get current-firmware]\"\r\
\n:if (\$Var1>\$Var2) do={system routerboard upgrade;\r\
\n/tool e-mail send to=\"xxx@xyzr.de\" subject=([/system\
\_identity get name] . \"-neues Routerboard-Update installiert\") body=\"R\
outerboard-Update installiert durch Reboot\";\r\
\n:log info \"Routerboard-Update installiert\"\r\
\n/system reboot\r\
\n};\r\
\n\r\
\n policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=jan/15/2020 start-time=03:05:00
/system watchdog
set auto-send-supout=yes send-email-to=xxx@xyz.de
/tool e-mail
set address=server.com from=yyy@xyzr.de password= **ELIDED** port=587 start-tls=yes user=xxx
/tool mac-server
set allowed-interface-list=none
/tool mac-server ping
set enabled=no