Hello All,
I have a L2 vpls from my ISP to connect 5 locations and access Internet. The ISP has provided a single 1Gbps connection. They provided the below information, but I do not seem to be able to reach the internet from the CCR2116. The ISP says they have tagged all the vlan's and the assigned subnet is routing from the ISP core to the CE IP, and all I need to do is configure a static route from my assigned network pointing to the ISP PE IP. I have not been able to get this working, there is a lot of information about vpls for mikrotik but not from the end customer perspective.
Would anyone have suggestions or hints for what I am missing or doing incorrectly to get this working?
ISP PE IP: 261.555.164.153/30
ISP CE IP: 261.555.164.154/30
Assigned Network Address: 261.444.194.96/28
Assigned customer inside Address: 261.444.194.97/28
Assigned useable IP's: 261.444.194.98...110/28
Config I have so far
create one bridge, set VLAN mode off while we configure
/interface bridge add name=primarybridge comment="Primary Bridge" protocol-mode=none vlan-filtering=no
LAN facing IP address on a MGMT_VLAN
/interface vlan add interface=primarybridge name=40-MGMT vlan-id=40
/ip address add address=10.101.40.254/24 interface=40-MGMT
Set local DNS
/ip dns set servers=8.8.8.8
#######################################
IP Addressing & Routing
#######################################
/interface vlan add interface=ether1 name=101 vlan-id=101
/ip address add interface=101 address=172.16.101.1/30
/interface vlan add interface=ether1 name=102 vlan-id=102
/ip address add interface=102 address=172.16.102.1/30
/interface vlan add interface=ether1 name=103 vlan-id=103
/ip address add interface=103 address=172.16.103.1/30
/interface vlan add interface=ether1 name=104 vlan-id=104
/ip address add interface=104 address=172.16.104.1/30
/interface vlan add interface=ether1 name=105 vlan-id=105
/ip address add interface=105 address=172.16.105.1/30
/interface vlan add interface=ether1 name=106 vlan-id=106
/ip address add interface=106 address=172.16.106.1/30
/interface vlan add interface=ether1 name=990-VPLSNET vlan-id=990
/ip address add interface=990-VPLSNET address=216.444.194.97/28
/ip address add interface=ether1 address=261.555.164.154/30
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=990-VPLSNET
add disabled=no dst-address=261.444.194.96/28 gateway=261.555.164.153
add disabled=no dst-address=10.102.0.0/16 gateway=172.16.102.2
add disabled=no dst-address=10.103.0.0/16 gateway=172.16.103.2
add disabled=no dst-address=10.104.0.0/16 gateway=172.16.104.2
add disabled=no dst-address=10.105.0.0/16 gateway=172.16.105.2
add disabled=no dst-address=10.106.0.0/16 gateway=172.16.106.2
#######################################
IP Services
#######################################
20-SERVICES VLAN interface creation, IP assignment, and DHCP service
/interface vlan add interface=primarybridge name=20-SERVICES vlan-id=20
/ip address add interface=20-SERVICES address=10.101.20.1/24
/ip pool add name=SERVICES_POOL ranges=10.101.20.2-10.101.20.254
/ip dhcp-server add address-pool=SERVICES_POOL interface=20-SERVICES name=SERVICES_DHCP disabled=no
/ip dhcp-server network add address=10.101.20.0/24 dns-server=10.101.20.1 gateway=10.101.20.1
30-DEVICES VLAN interface creation, IP assignment, and DHCP service
/interface vlan add interface=primarybridge name=30-DEVICES vlan-id=30
/ip address add interface=30-DEVICES address=10.101.30.1/24
/ip pool add name=DEVICES_POOL ranges=10.101.30.2-10.101.30.254
/ip dhcp-server add address-pool=DEVICES_POOL interface=30-DEVICES name=DEVICES_DHCP disabled=no
/ip dhcp-server network add address=10.101.30.0/24 dns-server=10.101.30.1 gateway=10.101.30.1
40-MGMT VLAN interface creation, IP assignment, and DHCP service
#/interface vlan add interface=primarybridge name=40-MGMT vlan-id=40
/ip address add interface=40-MGMT address=10.101.40.1/24
/ip pool add name=MGMT_POOL ranges=10.101.40.2-10.101.40.100
/ip dhcp-server add address-pool=MGMT_POOL interface=40-MGMT name=MGMT_DHCP disabled=no
/ip dhcp-server network add address=10.101.40.0/24 dns-server=10.101.40.1 gateway=10.101.40.1
#######################################
-- Limits and L3 HW Offloading --
#######################################
Enable L3 hardware offloading on switch1
/interface/ethernet/switch set 0 l3-hw-offloading=yes
Set limits and enable L3 hardware offloading on all ports
:foreach i in=[/interface/ethernet/switch/port/find where switch=switch1] do={ /interface/ethernet/switch/port set $i limit-broadcasts=yes limit-unknown-multicasts=yes limit-unknown-unicasts=yes storm-rate=1 l3-hw-offloading=yes }
Remove l3-hw-offloading on ether1 so we can use IP Firewall across VPLS/WAN
/interface/ethernet/switch/port set ether1 l3-hw-offloading=no
#######################################
-- Trunk Ports --
#######################################
ingress behavior
All SFP/QSFP ports, leave pvid to default of 1, enable L2 hardware offloading
VLAN Security - Only allow ingress packets WITH tags on Trunk Ports
/interface bridge port
add bridge=primarybridge interface=ether2 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether3 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether4 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether5 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether6 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether7 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether8 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether9 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether10 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=ether11 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=sfp-sfpplus1 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=sfp-sfpplus2 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=sfp-sfpplus3 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
add bridge=primarybridge interface=sfp-sfpplus4 hw=yes ingress-filtering=yes frame-types=admit-only-vlan-tagged
egress behavior
/interface bridge vlan
add bridge=primarybridge tagged=primarybridge,ether2,ether3,ether4,ether5,ether6,ether7,ether8,ether9,ether10,ether11,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4 vlan-ids=20
add bridge=primarybridge tagged=primarybridge,ether2,ether3,ether4,ether5,ether6,ether7,ether8,ether9,ether10,ether11,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4 vlan-ids=30
add bridge=primarybridge tagged=primarybridge,ether2,ether3,ether4,ether5,ether6,ether7,ether8,ether9,ether10,ether11,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4 vlan-ids=40
#######################################
-- Access Ports --
#######################################
ether12 is MGMT port with pvid 40
/interface bridge port
add bridge=primarybridge interface=ether12 hw=yes ingress-filtering=yes pvid=40
egress behavior, handled automatically
#######################################
-- Firewall Rules --
#######################################
Block SYN flood
/ip settings set tcp-syncookies=yes
/interface list
add comment=defconf name=LAN
add comment=defconf name=WAN
/interface list member
add interface=primarybridge list=LAN
add interface=990-VPLSNET list=WAN
/ip firewall address-list
add address=10.101.40.0/24 comment="Management VLAN and Port" list=mgmt-ports
/ip firewall filter
add action=drop chain=input dst-address-list=mgmt-ports dst-port=21,22,23,80,443,8291 protocol=tcp src-address-list=!mgmt-ports
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related
/ip firewall nat
add chain=srcnat action=masquerade out-interface-list=WAN comment="Default Internet masquerade" disabled=no
/interface bridge set primarybridge protocol-mode=rstp vlan-filtering=yes dhcp-snooping=no add-dhcp-option82=no