I’m new to Mikrotik - I have 2 Mikrotik Caps Waps in my network and 1 Hex as my router.
I have my Wan on port 2 of the of the Hex and Lan connected on port 1.
I have a Poe+ Switch in my network which everything is plugged in Network wise.
I have CapsMan Running and working I will fix this as needed after I get my main issue resolved.
I want to separate my network a bit I want my tenants on a Separate SSID and Network address with no access to my network. I also want another network to handle my IOT devices.
I have this in a test Phase and will change all the names later.
My Main network is 192.168.1.0/24 my router is .1 I have a network called Segment3 the Ip address is 192.168.10.0/24 GW is .1
I have been tiring to figure how to filter two networks by using the firewall and no matter what rule I set between the networks I can still ping between the 2 networks. I just want the 2 networks not to see each other but still reach the internet. I cannot figure this out if I am doing something wrong or there is something wrong in my configuration. All Help with my Configuration is so much appreciated.
Here is my Configuration - All recommendations to anything it is much appreciated if a network diagram is needed I will create one.
[admin@MainRtr] > export
feb/28/2021 16:06:38 by RouterOS 6.48.1
software id = D2TW-9CRM
model = RB760iGS
serial number = AE370BD7B714
/caps-man channel
add band=2ghz-b/g/n name=Default24
add band=5ghz-a/n/ac name=Default5g
/interface bridge
add name=Bridge_Wireless1 protocol-mode=none
add name=Bridge_Wireless2
add arp=local-proxy-arp fast-forward=no name=Bridge_Wireless3 protocol-mode=none
add name=Main_Network
add name=bridge1
/interface ethernet
set [ find default-name=ether1 ] name=ether1-Lan
set [ find default-name=ether2 ] name=ether2-Wan
/caps-man datapath
add bridge=Bridge_Wireless1 name=Default
add bridge=Main_Network name=datapath1
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=security1 passphrase=xxxxxxx
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=security2 passphrase=xxxxxx
/caps-man configuration
add channel=Default24 country=“united states3” mode=ap name=cfg1 security=security1 ssid=capstest24
add channel=Default5g country=“united states3” datapath=datapath1 mode=ap name=cfg2 security=security2 ssid=segment25g
/caps-man interface
add channel=Default24 configuration=cfg1 configuration.ssid=Segment1_24 disabled=no l2mtu=1600 mac-address=08:55:31:63:AC:4E master-interface=none name=Segment1 radio-mac=08:55:31:63:AC:4E
radio-name=08553163AC4E security=security1
add channel=Default5g configuration=cfg2 datapath=Default disabled=no l2mtu=1600 mac-address=0A:55:31:63:AC:4E master-interface=Segment1 name=Segment2 radio-mac=00:00:00:00:00:00 radio-name=“”
security=security1
add channel=Default24 configuration=cfg1 configuration.mode=ap configuration.ssid=segment3_24 datapath=Default disabled=no l2mtu=1600 mac-address=0A:55:31:63:AC:4F master-interface=Segment1 name=
segment3 radio-mac=00:00:00:00:00:00 radio-name=“” security=security1
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=Main_Pool ranges=192.168.1.30-192.168.1.254
add name=Segment1_Pool ranges=192.168.5.2-192.168.5.254
add name=wireless ranges=192.168.3.20-192.168.3.254
add name=Segment3_Pool ranges=192.168.10.2-192.168.10.254
add name=dhcp_pool20 ranges=192.168.20.2-192.168.20.254
add name=Segment2_Pool ranges=192.168.3.2-192.168.3.254
/ip dhcp-server
add address-pool=Main_Pool disabled=no interface=Main_Network lease-time=10h name=dhcp1
add address-pool=Segment1_Pool disabled=no interface=Bridge_Wireless1 lease-time=1h name=Wireless_Segment1
add address-pool=wireless interface=Bridge_Wireless1 name=wirelesstest
add address-pool=Segment3_Pool disabled=no interface=Bridge_Wireless3 name=Wireless_Segment3
add address-pool=dhcp_pool20 disabled=no interface=VLAN20 name=dhcp20
add address-pool=Segment2_Pool disabled=no interface=Bridge_Wireless2 name=Wireless_Segment2
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes upgrade-policy=require-same-version
/caps-man provisioning
add action=create-dynamic-enabled slave-configurations=*5
/interface bridge port
add bridge=Main_Network interface=ether1-Lan
add bridge=Bridge_Wireless1 interface=Segment1
add bridge=Bridge_Wireless2 interface=Segment2
add bridge=Bridge_Wireless3 interface=segment3
/interface bridge settings
set use-ip-firewall=yes
/interface list member
add interface=ether2-Wan list=WAN
add interface=Segment1 list=LAN
/ip address
add address=192.168.1.1/24 interface=Main_Network network=192.168.1.0
add address=192.168.3.1/24 interface=Segment2 network=192.168.3.0
add address=192.168.5.1/24 comment=“hotspot network” interface=Segment1 network=192.168.5.0
add address=192.168.10.1/24 interface=segment3 network=192.168.10.0
/ip dhcp-client
DHCP client can not run on slave interface!
add comment=defconf disabled=no interface=Segment1
add disabled=no interface=ether2-Wan
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=192.68.1.1,1.1.1.1 gateway=192.168.1.1
add address=192.168.3.0/24 dns-server=1.1.1.1,8.8.8.8 gateway=192.168.3.1
add address=192.168.5.0/24 comment=“hotspot network” gateway=192.168.5.1
add address=192.168.10.0/24 dns-server=8.8.8.8,1.1.1.1 gateway=192.168.10.1
add address=192.168.20.0/24 dns-server=8.8.8.8,1.1.1.1 gateway=192.168.20.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,9.9.9.9
/ip firewall address-list
add address=192.168.1.0/24 list=support
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment=“6to4 relay Anycast [RFC 3068]” list=not_in_internet
add address=192.168.1.0/24 list=Main_network
add address=192.168.10.0/24 list=Segment_3_Network
/ip firewall filter
add action=passthrough chain=unused-hs-chain comment=“place hotspot rules here” disabled=yes
add action=add-src-to-address-list address-list=Syn_Flooder address-list-timeout=30m chain=input comment=“Add Syn Flood IP to the list” connection-limit=30,32 protocol=tcp tcp-flags=syn
add action=drop chain=input comment=“Drop to syn flood list” src-address-list=Syn_Flooder
add action=add-src-to-address-list address-list=Port_Scanner address-list-timeout=1w chain=input comment=“Port Scanner Detect” protocol=tcp psd=21,3s,3,1
add action=drop chain=input comment=“Drop to port scan list” src-address-list=Port_Scanner
add action=jump chain=input comment=“Jump for icmp input flow” jump-target=ICMP protocol=icmp
add action=drop chain=input comment=“Block all access to the winbox - except to support list # DO NOT ENABLE THIS RULE BEFORE ADD YOUR SUBNET IN THE SUPPORT ADDRESS LIST” disabled=yes dst-port=8291
protocol=tcp src-address-list=!support
add action=jump chain=forward comment=“Jump for icmp forward flow” jump-target=ICMP protocol=icmp
add action=drop chain=forward comment=“Drop to bogon list” dst-address-list=bogons
add action=add-src-to-address-list address-list=spammers address-list-timeout=3h chain=forward comment=“Add Spammers to the list for 3 hours” connection-limit=30,32 dst-port=25,587 limit=30/1m,0
protocol=tcp
add action=drop chain=forward comment=“Avoid spammers action” dst-port=25,587 protocol=tcp src-address-list=spammers
add action=accept chain=input comment=“Accept DNS - UDP” port=53 protocol=udp
add action=accept chain=input comment=“Accept DNS - TCP” port=53 protocol=tcp
add action=accept chain=input comment=“Accept to established connections” connection-state=established
add action=accept chain=input comment=“Accept to related connections” connection-state=related
add action=accept chain=input comment=“Full access to SUPPORT address list” src-address-list=support
add action=drop chain=input comment=“Drop anything else! # DO NOT ENABLE THIS RULE BEFORE YOU MAKE SURE ABOUT ALL ACCEPT RULES YOU NEED” disabled=yes
add action=accept chain=ICMP comment=“Echo request - Avoiding Ping Flood, adjust the limit as needed” icmp-options=8:0 limit=2,5 protocol=icmp
add action=accept chain=ICMP comment=“Echo reply” icmp-options=0:0 protocol=icmp
add action=accept chain=ICMP comment=“Time Exceeded” icmp-options=11:0 protocol=icmp
add action=accept chain=ICMP comment=“Destination unreachable” icmp-options=3:0-1 protocol=icmp
add action=accept chain=ICMP comment=PMTUD icmp-options=3:4 protocol=icmp
add action=drop chain=ICMP comment=“Drop to the other ICMPs” protocol=icmp
add action=jump chain=output comment=“Jump for icmp output” jump-target=ICMP protocol=icmp
add action=drop chain=input src-address=157.100.174.188
add action=drop chain=input src-address=187.235.40.8
add action=drop chain=input src-address=77.0.213.160
add action=drop chain=input src-address=101.255.149.166
add action=drop chain=input src-address=190.237.16.76
add action=drop chain=input src-address=173.249.19.24
add action=drop chain=input src-address=177.13.253.238
add action=drop chain=input src-address=103.238.228.117
add action=drop chain=input comment=“Segment 3 Block Firewall Access” dst-address=192.168.10.1 protocol=tcp src-address-list=Segment_3_Network src-port=80,21,22,23,9291
add action=drop chain=forward dst-address=192.168.1.0/24 in-interface=Bridge_Wireless3 out-interface=Main_Network src-address=192.168.10.0/24
/ip firewall nat
add action=passthrough chain=unused-hs-chain comment=“place hotspot rules here” disabled=yes
add action=masquerade chain=srcnat out-interface-list=WAN
/ip service
set telnet address=192.168.1.0/24 disabled=yes
set ftp address=192.168.1.0/24 disabled=yes
set www address=192.168.1.0/24
set ssh address=192.168.1.0/24
set www-ssl address=192.168.1.0/24
set api address=192.168.1.0/24
set winbox address=192.168.1.0/24
set api-ssl address=192.168.1.0/24
/ip upnp
set enabled=yes
/system clock
set time-zone-name=America/New_York
/system identity
set name=MainRtr
Revision: Network Diagram added
Revision: I resolved my issue the rule on my filter was to low on my priority list. I moved it up and now it works properly I cannot pass traffic between the subnets.