Afternoon,
I am trying to tweak a setup that we’ve had running for somewhere like 5-10 years but have been banging head against the wall trying to get what I want to work, with no luck. Hopefully someone can point at what I’m doing wrong? Our documentation is a bit outdated as it was written back when we first set this system up and while the devices have been updated, the documentation hasn’t been as we hadn’t changed the configuration…
We have two sites, the main site has a RB2011, and the secondary site has a 750. Rather than mess with the running equpment while we’re all working remotely, I also have an RB941 at home which I have configured in the same way, and that is what I’m using for testing so that I can fix it when I lock myself out. All devices are running 6.45.9.
The satellite sites have home-grade ADSL connections, the Mikrotiks are there to perform an SSTP VPN tunnel between the device and the RB2011 in the primary site, and to bridge the local ports with the VPN interface back to the main site. This is a L2 tunnel, so it carries multiple VLANs so that we can have a WiFi AP plugged into it which tags the traffic from different SSIDs and passes that tagged traffic back over the VPN tunnel. This has worked fine for well over 5 years. On all devices, one interface is the connection to local network, one for backdoor management and the rest of the ports bridged together with the SSTP endpoint(s)
There is now a need to connect another device to a port on the Mikrotik which needs to be in a particular VLAN, but which is not capable of tagging its own packets. So the port on the Mikrotik needs to be an untagged member of the appropriate VLAN. I cannot get that to work
The existing devices have no VLANs defined (except for the management VLAN which we use for managing it remotely), so currently it presumably just passes tagged data through unchanged from the WiFi AP, which comes out at the other end.
I have attempted to follow various samples in the wiki - I’ve set PVID on the bridge port, added the VLAN to the bridge VLAN table and added the port as untagged but when I enable vlan-filtering, it stops passing all traffic, both on the native VLAN and on the defined VLANs (management + the one I’m trying to configure).
Unlike the sample in the Bridge_VLAN_Table page on the wiki, I can’t add the uplink interface as tagged for that VLAN as it’s a dynamic SSTP interface and is not a valid option. It appears by default to be a trunk however. I can’t imagine that I’d need to enable VLAN filtering on the primary site end of the connection as well? Presumably it would just operate as it currently does, receiving all VLANs over the SSTP tunnel?
Does anyone have any thoughts? Happy to provide whatever command output or diagrams if it helps make anything clearer?
There are probably better ways to do this nowadays anyway, and I will look at EoIP in due course, but for now while I don’t have easy access to the remote site, I want to just get it to work with as little reconfiguration as possible!