Do you use more vlans on one bridge? I made one bridge for each vlan. This is probably why I used IP firewall for VLAN.
This is my configuration:
/interface bridge
add name=bdg-vlan5 pvid=5 vlan-filtering=yes
add disabled=yes name=bdg-vlan7 pvid=7 vlan-filtering=yes
add name=bdg-vlan10 pvid=10 vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=ether1-wan
/interface list
add name=list-WAN
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=pool-vlan5 ranges=10.1.5.20-10.1.5.254
add name=pool-vlan10 ranges=10.1.10.20-10.1.10.254
/ip dhcp-server
add address-pool=pool-vlan5 disabled=no interface=bdg-vlan5 name=
dhcpserv-vlan5
add address-pool=pool-vlan10 disabled=no interface=bdg-vlan10 name=
dhcpserv-vlan10
/interface bridge filter
add action=drop chain=input comment=“**** phone block”
src-mac-address=00:87:01:E7:5E:74/FF:FF:FF:FF:FF:FF
/interface bridge port
add bridge=bdg-vlan5 interface=ether3 pvid=5
add bridge=bdg-vlan10 interface=ether4 pvid=10
add bridge=bdg-vlan5 interface=wlan1 pvid=5
add bridge=bdg-vlan5 interface=ether5 pvid=5
add bridge=bdg-vlan5 interface=ether2 pvid=5
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/interface bridge vlan
add bridge=bdg-vlan5 untagged=ether3,ether2,ether5,wlan1,bdg-vlan5 vlan-ids=5
add bridge=bdg-vlan10 untagged=ether4,*B vlan-ids=10
add bridge=bdg-vlan7 untagged=bdg-vlan7 vlan-ids=7
/interface detect-internet
set wan-interface-list=list-WAN
/interface ethernet switch vlan
add ports=ether2,ether3 switch=switch1 vlan-id=5
add ports=ether2,ether4 switch=switch1 vlan-id=10
/interface list member
add interface=ether1-wan list=list-WAN
/interface wireless cap
set bridge=bdg-vlan5 caps-man-addresses=10.1.5.1 discovery-interfaces=
bdg-vlan5 interfaces=wlan1
/ip address
add address=10.1.5.1/24 interface=bdg-vlan5 network=10.1.5.0
add address=10.1.10.1/24 interface=bdg-vlan10 network=10.1.10.0
/ip dhcp-client
add dhcp-options=clientid_duid,clientid,hostname disabled=no interface=
ether1-wan
/ip dhcp-server lease
add address=10.1.10.254 client-id=1:30:85:a9:97:1e:13 mac-address=
30:85:A9:97:1E:13 server=dhcpserv-vlan10
/ip dhcp-server network
add address=10.1.5.0/24 dns-server=192.168.1.1 gateway=10.1.5.1 netmask=24
add address=10.1.10.0/24 dns-server=192.168.1.1 gateway=10.1.10.1 netmask=32
/ip dns
set servers=8.8.8.8
/ip firewall address-list
add address=10.1.10.0/24 list=support
add address=0.0.0.0/8 comment=“Self-Identification [RFC 3330]” list=bogons
add address=127.0.0.0/8 comment=“Loopback [RFC 3330]” list=bogons
add address=169.254.0.0/16 comment=“Link Local [RFC 3330]” list=bogons
add address=192.0.2.0/24 comment=“Reserved - IANA - TestNet1” list=bogons
add address=192.88.99.0/24 comment=“6to4 Relay Anycast [RFC 3068]” list=
bogons
add address=198.18.0.0/15 comment=“NIDB Testing” list=bogons
add address=198.51.100.0/24 comment=“Reserved - IANA - TestNet2” list=bogons
add address=203.0.113.0/24 comment=“Reserved - IANA - TestNet3” list=bogons
/ip firewall filter
add action=add-src-to-address-list address-list=Syn_Flooder
address-list-timeout=30m chain=input comment=
“001 Add Syn Flood IP to the list” connection-limit=30,32 protocol=tcp
tcp-flags=syn
add action=drop chain=input comment=“002 Drop to syn flood list”
src-address-list=Syn_Flooder
add action=drop chain=input comment=“003 Drop to port scan list”
src-address-list=Port_Scanner
add action=jump chain=input comment=“004 Jump for icmp input flow”
jump-target=ICMP protocol=icmp
add action=drop chain=input comment=
“005 Block all access to the winbox - except to support list” disabled=
yes dst-port=8291 protocol=tcp src-address-list=!support
add action=jump chain=forward comment=“006 Jump for icmp forward flow”
jump-target=ICMP protocol=icmp
add action=drop chain=forward comment=“007 Drop to bogon list”
dst-address-list=bogons
add action=add-src-to-address-list address-list=spammers
address-list-timeout=3h chain=forward comment=
“008 Add Spammers to the list for 3 hours” connection-limit=30,32
dst-port=25,587 limit=30/1m,0:packet protocol=tcp
add action=drop chain=forward comment=“009 Avoid spammers action” dst-port=
25,587 protocol=tcp src-address-list=spammers
add action=accept chain=input comment=“010 Accept DNS - UDP” port=53
protocol=udp
add action=accept chain=input comment=“011 Accept DNS - TCP” port=53
protocol=tcp
add action=accept chain=input comment=“012 Accept to established connections”
connection-state=established
add action=accept chain=input comment=“013 Accept to related connections”
connection-state=related
add action=accept chain=input comment=
“014 Full access to SUPPORT address list” src-address-list=support
add action=accept chain=ICMP comment=“016 Echo request - Avoiding Ping Flood”
icmp-options=8:0 limit=1,5:packet protocol=icmp
add action=accept chain=ICMP comment=“017 Echo reply” icmp-options=0:0
protocol=icmp
add action=accept chain=ICMP comment=“018 Time Exceeded” icmp-options=11:0
protocol=icmp
add action=accept chain=ICMP comment=“019 Destination unreachable”
icmp-options=3:0-1 protocol=icmp
add action=accept chain=ICMP comment=“020 PMTUD” icmp-options=3:4 protocol=
icmp
add action=drop chain=ICMP comment=“021 Drop to the other ICMPs” protocol=
icmp
add action=jump chain=output comment=“022 Jump for icmp output” jump-target=
ICMP protocol=icmp
add action=accept chain=forward comment=A0X disabled=yes in-interface=
ether1-wan out-interface=bdg-vlan10 protocol=udp
add action=accept chain=forward comment=A0X disabled=yes in-interface=
bdg-vlan10 out-interface=ether1-wan protocol=udp
add action=accept chain=forward comment=
“A1-VLAN10 [FUTURA VLAN5] accept DHT UDP from WAN for uTorrent traffic”
in-interface=ether1-wan out-interface=bdg-vlan10 protocol=udp src-port=
6881-6889
add action=accept chain=forward comment=
“A1-VLAN10 [FUTURA VLAN5] accept DHT UDP to WAN for uTorrent traffic”
dst-port=6881-6889 in-interface=bdg-vlan10 out-interface=ether1-wan
protocol=udp
add action=accept chain=forward comment=
“A1-VLAN10 accept DNS, HTTP, HTTPs, XMPP TCP from WAN” in-interface=
ether1-wan out-interface=bdg-vlan10 protocol=tcp src-port=53,80,443,5222
add action=accept chain=forward comment=
“A1-VLAN10 accept DNS, HTTP, HTTPs, XMPP TCP to WAN” dst-port=
53,80,443,5222 in-interface=bdg-vlan10 out-interface=ether1-wan protocol=
tcp
add action=accept chain=forward comment=
“A1-VLAN10 accept DNS, HTTP, HTTPs UDP from WAN” in-interface=ether1-wan
out-interface=bdg-vlan10 protocol=udp src-port=53,80,443
add action=accept chain=forward comment=
“A1-VLAN10 accept DNS, HTTP, HTTPs UDP to WAN” dst-port=53,80,443
in-interface=bdg-vlan10 out-interface=ether1-wan protocol=udp
add action=accept chain=input comment=“D0X-VLAN5 permit CAPsMAN ports”
dst-port=5246,5247 in-interface=bdg-vlan5 protocol=udp
add action=accept chain=forward comment=
“D1-VLAN5 accept DNS, HTTP, HTTPs, RDP, XMPP TCP from WAN” in-interface=
ether1-wan out-interface=bdg-vlan5 protocol=tcp src-port=
53,80,443,3389,5222
add action=accept chain=forward comment=
“D1-VLAN5 accept DNS, HTTP, HTTPs RDP, XMPP TCP to WAN” dst-port=
53,80,443,3389,5222 in-interface=bdg-vlan5 out-interface=ether1-wan
protocol=tcp
add action=accept chain=forward comment=
“D1-VLAN5 accept DNS, HTTP, HTTPs RDP UDP from WAN” in-interface=
ether1-wan out-interface=bdg-vlan5 protocol=udp src-port=53,80,443,3389
add action=accept chain=forward comment=
“D1-VLAN5 accept DNS, HTTP, HTTPs RDP UDP to WAN” dst-port=53,80,443,3389
in-interface=bdg-vlan5 out-interface=ether1-wan protocol=udp
add action=accept chain=forward comment=
“R1-INTER accept printer TCP from vlan5 to vlan10” in-interface=bdg-vlan5
out-interface=bdg-vlan10 protocol=tcp src-address=10.1.5.19 src-port=9100
add action=accept chain=forward comment=
“R1-INTER accept printer TCP from vlan10 to vlan5” dst-address=10.1.5.19
dst-port=9100 in-interface=bdg-vlan10 out-interface=bdg-vlan5 protocol=
tcp
add action=drop chain=forward comment=“Z1-INTER drop from vlan10 to vlan5”
in-interface=bdg-vlan10 out-interface=bdg-vlan5
add action=drop chain=forward comment=“Z1-INTER drop from vlan5 to vlan10”
in-interface=bdg-vlan5 out-interface=bdg-vlan10
add action=drop chain=input comment=“Z9 drop everything from WAN”
in-interface=ether1-wan
add action=drop chain=output comment=“Z9 drop everything to WAN”
out-interface=ether1-wan
add action=drop chain=input comment=“Z9 drop anything else!”
/ip firewall nat
add action=masquerade chain=srcnat
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=MainMTK-router-firewall
I cutted wifi configs and other needless stuffs.