I don’t know VLANs.
I read PCunite’s tutorial 20x, I’ve watched 19 videos, read 18 articles, reviewed 17 threads here, 16 threads elsewhere, and tried 15 times on my own, and given up 14 times already.
Please don’t tell me to study or work harder. If I could have, I would have.
I set up a wAPax I had sitting around, connected its ether2 to my LAN, and got it up and running.
My goal is to get past my major blockage towards understanding and being able to work with VLANs.
My idea here is to set up the wAP so that all wifi connections to the wifi slave interface under wifi2 (5ghz) named “wifiguest-VLAN10” will be on their own VLAN (10) and have no access to anything on the LAN (which is otherwise accessible on ether2). But, wifi connected stations will have connectivity to the Internet (which is the main router at 192.168.2.2).
Here is what I have so far. I know it’s a mess. What would very much help is the most basic configuration to make it work using VLANs. That is, too much and my confusion will cause my brain (CPU) to reject (drop) all.
# 2025-02-18 20:51:23 by RouterOS 7.17.2
# software id = 4R3U-1R3M
#
# model = wAPG-5HaxD2HaxD
# serial number = HH80xxxxxx
/interface bridge
add admin-mac=F4:1E:57:69:AD:13 auto-mac=no comment=defconf name=bridge \
vlan-filtering=yes
/interface wifi
set [ find default-name=wifi1 ] channel.band=2ghz-ax .skip-dfs-channels=\
10min-cac .width=20/40mhz configuration.mode=ap .ssid=MikroTik-69AD14 \
disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes \
.ft-over-ds=yes
set [ find default-name=wifi2 ] channel.band=5ghz-ax .skip-dfs-channels=\
10min-cac .width=20/40/80mhz configuration.mode=ap .ssid=MikroTik-69AD14 \
disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes \
.ft-over-ds=yes
add comment=wifiguest-VLAN10 configuration.mode=ap .ssid=wifiguest-VLAN10 \
disabled=no mac-address=F6:1E:57:69:AD:14 master-interface=wifi2 name=\
wifiguest-VLAN10 security.authentication-types=wpa2-psk
/interface vlan
add interface=wifiguest-VLAN10 name=VLAN10 vlan-id=10
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip ipsec proposal
set [ find default=yes ] disabled=yes
/ip pool
add name=default-dhcp ranges=10.10.10.0/24
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
add bridge=bridge comment=wifiguest-VLAN10 frame-types=\
admit-only-untagged-and-priority-tagged interface=wifiguest-VLAN10 pvid=\
10
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ipv6 settings
set disable-ipv6=yes
/interface bridge vlan
add bridge=bridge tagged=wifiguest-VLAN10 vlan-ids=10
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface ovpn-server server
add mac-address=FE:01:B6:23:41:05 name=ovpn-server1
/ip address
add address=192.168.2.88/24 comment=defconf interface=bridge network=\
192.168.2.0
add address=10.10.10.1/24 interface=wifiguest-VLAN10 network=10.10.10.0
/ip dhcp-client
# Interface not active
add comment=defconf interface=ether1
/ip dhcp-server
add address-pool=default-dhcp interface=VLAN10 name=defconf
/ip dhcp-server alert
add disabled=no interface=bridge
/ip dhcp-server network
add address=10.10.10.0/24 comment=defconf dns-server=10.10.10.1 gateway=\
10.10.10.1
/ip dns
set allow-remote-requests=yes servers=9.9.9.9
/ip dns static
add address=10.10.10.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip ipsec policy
set 0 disabled=yes
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.2.2 \
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
/ipv6 firewall filter
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN"
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN"
/system clock
set time-zone-name=America/New_York
/system identity
set name=WapAX
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=time-a-g.nist.gov
add address=time-a-b.nist.gov
add address=time-a-wwv.nist.gov
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN