Simplify: One bridge 3 vlans ( home, iot, guest )
Internet access - guest, home, iot
guest/iot access - only the admin on home vlan.
/interface vlan
add interface=bridge name=Guest_vl vlan-id=108
add interface=bridge name=Home_vl vlan-id=88
add interface=bridge name=IoT_vl vlan-id=98
The aruba should get an IP address on the home subnet.
We know aruba is vlan capable, what we dont know is if it can accept all vlans tagged or if it needs the trusted vlan coming in untagged ???
/ip dhcp-server
add address-pool=default-dhcp allow-dual-stack-queue=no disabled=no
interface=Home_vl bridge lease-time=1d name=defconf
add address-pool=Guest_pool allow-dual-stack-queue=no bootp-support=none
disabled=no interface=Guest_vl name=Guest_dhcp
add address-pool=IoT_pool allow-dual-stack-queue=no bootp-support=none
disabled=no interface=IoT_vl lease-time=1d name=IoT_dhcp
/interface list member
add comment=defconf interface=sfp1 list=WAN
add interface=Home_vl list=LAN
add interface=Guest_vl list=LAN
add interface=IoT_vl list=LAN
/ip address
add address=192.168.88.1/26 comment=defconf interface=Home_vl network=
192.168.88.0
add address=192.168.108.1/27 interface=Guest_vl network=192.168.108.0
add address=192.168.98.1/29 interface=IoT_vl network=192.168.98.0
add address=192.168.78.1/24 comment=“Dedicated MGMT Port” interface=ether1
network=192.168.78.0
( no idea what this is ??? is it the static Ip assigned to the router ?? )
Okay now I know! It looks like you are trying to set an Admin access port which is fine, but just remove ether1 from the bridge
This is actually recommended so that you can configure the router especially to any part of the bridge while safely off the bridge.
/interface bridge port
add bridge=bridge ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether2 pvid=88
add bridge=bridge ingress-fitering=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether3 pvid=88
add bridge=bridge ingress-fitering=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether4 pvid=88
add bridge=bridge fast-leave=yes ingress-filtering=yes frame-types=admit-only-tagged-vlans interface=ether 5 trusted=yes
/interfac bridge vlans
add bridge=bridge tagged=bridge,ether5 vlan-ids=98,108
add bridge=bridge tagged=bridge,ether5 untagged=ether2,ether3,ether4 vlan-ids=88
Whats at 192.168.88.7 ???
Why these????
/ip dns static
add address=192.168.88.1 comment=defconf disabled=yes name=router.lan
add address=192.168.88.1 comment=defconf name=router.home.arpa
add address=192.168.88.4 disabled=yes name=ix2.local
How do you expect IoT devices to find their cloud homes if you block port 53?
I imagine your simply using them locally on NAS etc and dont want them to connect to the internet and thus part of that is block DNS access?
Probably a more efficient way to handle that.
I dont get your allowing ICMP by firewall address list. Its unecessary. Simply use the following default rule.
add action=accept chain=input protocol=icmp
In fact your input chain is not consistent with your intent.
You allow all from LAN, why should all user have access to the router?? Certainly not wifi guests or iot and probably nobody that is not the admin.
How to handle that properly is the following. FIXED, cleaner, for your needs.
…
/ip firewall filter
{Input Chain}
[add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input in-interface-list=LAN src-address-list=Authorized comment="admin only"
add action=accept chain=input comment="VPN TGE" dst-port=1723 protocol=tcp src-address-list=LATAM
add action=accept chain=input comment="Allow LAN DNS queries-UDP/NTP dst-port=53,123 in-interface-list=LAN protocol=udp
add action=accept chain=input comment="Allow LAN DNS queries - TCP" dst-port=53 in-interface-list=LAN protocol=tcp
add action=drop chain=input comment="drop all else"
{forward chain}
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=forward comment="allow internet traffic" in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="allow port forwarding" connection-nat-state=dstnat
add action=drop chain=forward comment="drop all else"
NOTE1: IF you want to exclude the iot subnet from access to DNS services in the INPUT CHAIN, and also from wan access in the FORWARD CHAIN, then modify the rules as follows:
add action=accept chain=input comment="Allow LAN DNS queries-UDP/NTP dst-port=53,123 in-interface-list=LAN protocol=udp src-address=!192.168.98.0/29
add action=accept chain=input comment=“Allow LAN DNS queries - TCP” dst-port=53 in-interface-list=LAN protocol=tcp src-address=!192.168.98.0/29
add action=accept chain=forward add action=accept chain=forward comment=“allow internet traffic” in-interface-list=LAN out-interface-list=WAN src-address=!192.168.98.0/29
NOTE2: You will need to make a firewall address list for admin IPs. ( static leases set in dhcp )
add address=adminDesktop list=Authorized
add address=adminLaptop list=Authorized
add address=adminIpad/Iphone list=Authorized
add address=admin VPN remote IP list=Authorized
add address=192.168.78.X list=Authorized. whatever IP you will use for ether1 access.
What is the purpose of this routing rule?? It is not required as its local to the router and thus the router is already aware and in fact already has DAC routes for all local subnets.
/ip route
add check-gateway=arp distance=1 dst-address=192.168.0.0/23 gateway=bridge
Set this to NONE as [mac server by itself] its not a secure access method to the router.
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN