Hi, for some time now I try to get my hAP ac lite configured so that I have:
- regular private network access including access to my own network devices, and
- a guest network which limits the access to the internet
As a starting point I used the set of rules for the WISP AP mode. Based on information from the forum I’ve come up with the below configuration. The private connection to the internet works fine, and the guest access (MyTik_2G_2) does allow to connect and allows access to the internet (added NAT/masquerade for the guest network) but I cannot isolate it from my home-network. What firewall rules do I need to add to make the guest-network guest-proof?
Thanks
Mike
Current configuration
(please notice that the network configured by defconf (192.168.88.0) has been disabled)
mar/25/2022 12:26:31 by RouterOS 6.49.5
software id = AUD0-SZKJ
model = RB952Ui-5ac2nD
serial number = CC3E0EE9FF44
/interface bridge
add admin-mac=2C:C8:1B:D8:DB:1C auto-mac=no comment=defconf name=bridge-private
add name=bridge-public/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX country=netherlands disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MyTik_2G wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX country=netherlands disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MyTik_5G wireless-protocol=802.11
add disabled=no keepalive-frames=disabled mac-address=2E:C8:1B:D8:DB:22 master-interface=wlan1 multicast-buffering=disabled name=wlan3 ssid=MyTik_2G_2 wds-cost-range=0 wds-default-cost=0 wps-mode=disabled/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik wpa-pre-shared-key=12345678 wpa2-pre-shared-key=12345678
add authentication-types=wpa2-psk eap-methods=“” management-protection=allowed mode=dynamic-keys name=private supplicant-identity=“” wpa2-pre-shared-key=12345678/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
add name=public ranges=10.10.10.2-10.10.10.254/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge-private name=defconf
add address-pool=public disabled=no interface=bridge-public name=public/interface bridge port
add bridge=bridge-private comment=defconf interface=ether2
add bridge=bridge-private comment=defconf interface=ether3
add bridge=bridge-private comment=defconf interface=ether4
add bridge=bridge-private comment=defconf interface=ether5
add bridge=bridge-private comment=defconf interface=wlan1
add bridge=bridge-private comment=defconf interface=wlan2
add bridge=bridge-private interface=ether1
add bridge=bridge-public interface=wlan3/ip neighbor discovery-settings
set discover-interface-list=LAN/interface list member
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=wlan2 list=LAN
add interface=wlan1 list=LAN/ip address
add address=192.168.88.1/24 comment=defconf disabled=yes interface=bridge-private network=192.168.88.0
add address=10.10.10.1/24 interface=bridge-public network=10.10.10.0/ip dhcp-client
add comment=defconf disabled=no interface=bridge-private/ip dhcp-server network
add address=0.0.0.0/24 comment=defconf dns-server=192.168.88.1 gateway=0.0.0.0 netmask=24
add address=10.10.10.0/24 gateway=10.10.10.1/ip dns
set allow-remote-requests=yes/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=drop chain=input comment=“defconf: drop all not coming from LAN” in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept in ipsec policy” ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy” ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new in-interface-list=WAN/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat comment=“NAT Guest” out-interface=bridge-private src-address=10.10.10.0/24/system clock
set time-zone-name=Europe/Amsterdam
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
