I suggest you to upgrade the RouterOS to 6.11 and BIOS [firmware] to 3.1x
- It can already do, if 172.21.16.1 is the right gateway, and have internet access, just set DNS, paste this on Terminal:
/ip dns
set allow-remote-requests=yes max-udp-packet-size=4096 servers=8.8.8.8,8.8.4.4
- you intend: “all the devices on ether3”? paste this on terminal:
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1 src-address=172.18.1.0/27
the devices linked to ether3 must have one IP on range 172.18.1.2-172.18.1.29 subnet 255.255.255.224 (/27) gateway and DNS 172.18.1.1
3 and 4) Whit this configuration, working in this way:
ether3 to internet OK
ether3 to local pc on ether1 OK
ether3 to ether2 OK
ether2 to internet KO
ether2 to one local pc on ether1 OK
ether2 to ether3 OK
ether1 to internet OK
communications started on local pc on ether1 to ether2 KO (depend on configuration of 172.21.16.1*)
communications started on local pc on ether1 to ether3 KO (depend on configuration of 172.21.16.1*)
- for working you must ser two route on 172.21.16.1 gateway:
destination address 10.0.0.0/24 gateway 172.21.16.72
destination address 172.18.1.0/27 gateway 172.21.16.72
and on previous NAT rule add dst-address=!172.21.16.0/24
If I have helped you, remember to add Karma!
To control traffic between the subnets/interfaces use filters in the forward chain of IP Firewall.
http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Filter
rextended,
are sure about out-interface=ether3, i am thinking about out-interface=ether1
Yes, are ether1 the right ethernet, I have fixed the post, sorry.