CCR2116 Observations
-Dont use bridge for dhcp
-Lacking some basic structure such as interface list and members…
-Where are your /interface bridge vlan settings???
- diagram does not detail which ports coming out of CCR216 are going to which device and carrying which subnets!
For an internet facing router, your firewall rules are very weak and incomplete ???.
/ip firewall filter
add action=accept chain=input protocol=icmp
add action=fasttrack-connection chain=forward connection-state=
established,related disabled=yes hw-offload=yes
add action=accept chain=forward connection-state=established,related
add action=drop chain=forward connection-state=invalid
add action=accept chain=input connection-state=established
add action=accept chain=input connection-state=related
add action=drop chain=forward dst-address=192.168.0.0/16 in-interface=
private-guest-vlan
add action=drop chain=forward dst-address=192.168.0.0/16 in-interface=
guest-vlan
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Assumes sfp plus ports are going to zyxel/brocade,csr3051G and Netgear.
Other ethernet ports are going to hapac,hapac2,hapac3, basebox2, hexpoe, crs112
The netgear is unmanaged thus not sure how to best setup..so disabled for now.
All managed devices get an IP on the trusted subnet…
Assume ether4 is a trusted subnet available port for the admin to plug into.
Assume connection to basebox is trusted subnet for IP address and config, and only guest wifi…
Assume all other devices can handle 3 WIFIs, trusted, guest and private guest.
Assume ether11 is off bridge for emergency access in case something goes wrong with bridge and can still access device.
(all you need to do is plug your laptop to that port and give it an IP in the 192.168.55.0 subnet- can really save your bacon )
model = CCR2116-12G-4S+
/interface bridge
add name=Bridge-local
/interface ethernet
set [ find default-name=ether1 ] comment=WAN-288-vDSL name=
“WAN1 (vDSL)-ether1”
set [ find default-name=ether2 ] comment=WAN-434-optics name=
“WAN2 (Optics)-ether2”
set [ find default-name=ether3 ] comment=WAN-LTE/5G disabled=yes name=
“WAN3 (LTE-5G))-ether3”
set [ find default-name=sfp-sfpplus1 ] advertise=
1000M-full,10000M-full,2500M-full,5000M-full
set [ find default-name=sfp-sfpplus2 ] auto-negotiation=no
/interface vlan
add interface=Bridge-local name=trusted-vlan vlan-id=5
add interface=Bridge-local name=guest-vlan vlan-id=100
add interface=Bridge-local name=private-guest-vlan vlan-id=200
/interface list
add name=WAN
add name=LAN
add name=MGMT
/interface list members
add interface=“WAN1 (vDSL)-ether1” list=WAN
add interface=“WAN2 (Optics)-ether2” list=WAN
add interface=“WAN3 (LTE-5G))-ether3” list=WAN
add interface=trusted-vlan list=LAN
add interface=guest-vlan list=LAN
add interface=private-guest-vlan list=LAN
add interface=trusted-vlan list=MGMT
add interface=ether11 list=MGMT
/ip neighbor discovery-settings
set discover-interface-list=MGMT
/interface bridge port { all trunk ports except ether4 }
add bridge=Bridge-local interface=ether4 ingress-filtering=yes frame-types=admit-priority-and-untagged-vlans pvid=5 { admin PC or available port }
add bridge=Bridge-local interface=ether5 ingress-filtering=yes frame-types=admit-only-vlan-tagged ( hapac )
add bridge=Bridge-local interface=ether6 ingress-filtering=yes frame-types=admit-only-vlan-tagged ( hapac2 )
add bridge=Bridge-local interface=ether7 ingress-filtering=yes frame-types=admit-only-vlan-tagged ( basebox )
add bridge=Bridge-local interface=ether8 ingress-filtering=yes frame-types=admit-only-vlan-tagged ( hapac3 )
add bridge=Bridge-local interface=ether9 ingress-filtering=yes frame-types=admit-only-vlan-tagged (crs112 )
add bridge=Bridge-local interface=ether10 ingress-filtering=yes frame-types=admit-only-vlan-tagged ( hexpoe )
add bridge=Bridge-local interface=ether12 disabled=yes (spare)
add bridge=Bridge-local interface=ether13 disabled=yes (spare)
add bridge=Bridge-local interface=sfp-sfpplus1 ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=Bridge-local interface=sfp-sfpplus2 ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=Bridge-local interface=sfp-sfpplus3 ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=Bridge-local interface=sfp-sfpplus4 disabled=yes ingress-filtering=yes frame-types=admit-priority-and-untagged-vlan pvid=X ( netgear )
/interface bridge vlan
add bridge=Bridge-local tagged=Bridge-local,sfp-sfpplus1,sfp-sfpplus2,spf-sfpplus3,ether5,ether6,ether7,ether8,ether9,ether10 untagged=ether4 vlan-ids=5
add bridge=Bridge-local tagged=Bridge-local,sfp-sfpplus1,sfp-sfpplus2,spf-sfpplus3,ether5,ether6,ether7,ether8,ether9,ether10 vlan-ids=100
add bridge=Bridge-local tagged=Bridge-local,sfp-sfpplus1,sfp-sfpplus2,spf-sfpplus3,ether5,ether6,ether8,ether9,ether10 vlan-ids=200
/ip address
add address=192.168.0.1/24 interface=trusted-vlan network=192.168.0.0
add address=192.168.2.2/24 interface=“WAN1 (vDSL)-ether1” network=192.168.2.0
add address=192.168.3.2/24 interface=“WAN3 (LTE-5G))-ether3” network=
192.168.3.0
add address=192.168.4.1/24 interface=guest-vlan network=192.168.4.0
add address=192.168.5.2/24 interface=“WAN2 (Optics)-ether2” network=
192.168.5.0
add address=192.168.6.1/24 interface=private-guest-vlan network=192.168.6.0
add address=192.168.55.1/24 interface=ether11 network=192.168.55.0 comment=“Emergency Access off Bridge”
/ip firewall filter
{Input Chain}
(default rules)
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
(admin rules)
add action=accept chain=input in-interface-list=MGMT
add action=accept chain=input in-interface-list=LAN dst-port=53 protocol=tcp
add action=accept chain=input in-interface-list=LAN dst-port=53 protocol=udp
add action=drop chain=input comment=“drop all else” { put this in as very last change to entire config }
{forward chain}
(default rules)
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
(admin rules)
add action=accept chain=forward comment=“allow internet traffic” in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment=“allow port forwarding” connection-nat-state=dstnat
add action=drop chain=forward comment=“drop all else”
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=MGMT
If you elect to go this way, then the rest of the MIKROTIK DEVICES USING ROS can be set up as follows…
/interface bridge
add ingress-filtering=no name=bridge vlan-filtering=yes
/interface ethernet
/interface vlan
add interface=bridge name=TRUSTED vlan-id=5 { Only vlan required to be identified }
/interface list
add name=management
/interface wireless _ as per your requirements!!!
/interface bridge port
add bridge=bridge ingress-filtering=yes interface=ether1 { trunk port for traffic to/fro CCR2116 }
add bridge=bridge ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged interface=name_of_WLAN-A pvid=5
add bridge=bridge ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged interface=name_of_WLAN-B pvid=100
add bridge=bridge ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged interface=name_of_WLAN-C pvid=200
etc…
/ip neighbor discovery-settings
set discover-interface-list=management
/interface bridge vlan
add bridge=bridge tagged=bridge,ether1 untagged=WLAN-A vlan-ids=5
add bridge=bridge tagged=bridge,ether1 untagged=WLAN-B vlan-ids=100
add bridge=bridge tagged=bridge,ether1 untagged=WLAN-C vlan-ids=200
/interface list member
add interface=TRUSTED list=management
/ip address { assumes device to be given an IP of 192.168.0.77 }
add address=192.168.0.77/24 interface=TRUSTED network=192.168.0.0 comment=“IP of MT device on trusted subnet”
/ip dns
set allow-remote-requests=yes servers=192.168.0.1 comment=“dns through trusted subnet gateway”
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=192.168.0.1 comment=“ensures route avail through trusted subnet gateway”
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=management