- Missing stuff for security setup such as interface list, interface list members.
- Missing the management vlan definition???
- Modified /interface bridge entry
- Failed to identify management vlan, needs address - for example I have
given the switch 192.168.10.2 assuming its the management vlan with vlanid=100
- Dont see ether1 console defined???
- defined spf1.spf7, fsfp15,sfp16 like other ports for frame type
- MISSING LAGPORT on bridge ports ???
- Since all vlans come from the pfsense, every /interface vlan entry should have the LaggpfSense as a tagged entry. Only the management vlan needs the bridge tagged.
- Your settings appear wrong,
for example your bridge ports state that spf4 is an access port for vlan40.
your bridge vlan states that spf5 is the access port for vlan40 while spf4 is a trunk port??? Also spf1 was tagged instead of untagged while on bridge ports defined as an access port.
I have fixed them to what I think they should be but since you didnt have any comments for the bridge ports I could be messing stuff up.
- The management vlan should go to every smart device attached to the switch......and it appears you have many trunk ports but most do not get the management vlan, Very confusing. I have added the management vlan to them
- port TRUNK WK was very confusing as you have it both as a trunk port but then in bridge ports gave it a pvid of 50, so will assume its a HYBRID Port, expecting vlan50 untagged with all other vlans tagged.
- Be advised vlan100 doesnt go anywhere it arrives at the switch but has no destination, future traffic??
- Ordered bridge vlans lowest to highest vlanid for easy reading.
RECOMMEND making all changes from laptop connected to console port.
Modify laptop ivp4 settings to 192.168.55.2 and with username and password you can make the the rest of the changes.
So, first modify ether1 name to the below
Add the console address
Add the interface list and interface list members
Then you should be able to access the router on the port.
The reason to do this, is that MTs are finicky when you apply bridge changes and thus being off the bridge allows you not to get kicked offline if the router burps. Safer!! So I know you use ether1 for management which is fine but console off bridge use is recommended when making any bridge changes.
/interface bridge
add admin-mac=08:55:31:67:62:2A auto-mac=no comment=defconf name=bridge \
vlan-filtering=yes frame-types=admit-only-vlan-tagged
/interface ethernet
set [ find default-name=ether1] Name=Console
set [ find default-name=sfp-sfpplus1 ] advertise="1G-baseT-full,1G-baseX,2.5G-\
baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR" name=\
01_MngtLan
set [ find default-name=sfp-sfpplus2 ] advertise="1G-baseT-half,1G-baseT-full,\
1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR\
" name=02_FiberNT
set [ find default-name=sfp-sfpplus3 ] advertise="1G-baseT-full,1G-baseX,2.5G-\
baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR" name=\
03_Vlan06
set [ find default-name=sfp-sfpplus4 ] advertise="1G-baseT-full,1G-baseX,2.5G-\
baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR" name=\
04_FritzboxMK
set [ find default-name=sfp-sfpplus5 ] advertise="1G-baseT-full,1G-baseX,2.5G-\
baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR" name=\
05_SW-N&L
set [ find default-name=sfp-sfpplus6 ] advertise="1G-baseT-half,1G-baseT-full,\
1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR\
" name=06_KVM-SW-MK
set [ find default-name=sfp-sfpplus7 ] advertise="100M-baseT-half,100M-baseT-f\
ull,1G-baseT-half,1G-baseT-full,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10\
G-baseT,10G-baseSR-LR,10G-baseCR" name=07_DirectConn
set [ find default-name=sfp-sfpplus8 ] advertise="100M-baseT-full,1G-baseT-hal\
f,1G-baseT-full,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-base\
SR-LR,10G-baseCR" name=08_IOT-MK
set [ find default-name=sfp-sfpplus9 ] advertise="1G-baseT-half,1G-baseT-full,\
1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseCR\
" l2mtu=9084 mtu=9000 name=09_pfSenseLagg
set [ find default-name=sfp-sfpplus10 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" l2mtu=9084 mtu=9000 name=10_pfSenseLagg
set [ find default-name=sfp-sfpplus11 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" name=11_InterSwitchLnk
set [ find default-name=sfp-sfpplus12 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" l2mtu=9084 mtu=9000 name=12_Lion
set [ find default-name=sfp-sfpplus13 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" l2mtu=9084 mtu=9000 name=13_Panda
set [ find default-name=sfp-sfpplus14 ] advertise="100M-baseT-half,100M-baseT-\
full,1G-baseT-half,1G-baseT-full,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,1\
0G-baseT,10G-baseSR-LR,10G-baseCR" name=14_Wasbeertje
set [ find default-name=sfp-sfpplus15 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" l2mtu=9084 mtu=9000 name=15_MAIN
set [ find default-name=sfp-sfpplus16 ] advertise="1G-baseT-half,1G-baseT-full\
,1G-baseX,2.5G-baseT,2.5G-baseX,5G-baseT,10G-baseT,10G-baseSR-LR,10G-baseC\
R" l2mtu=9084 mtu=9000 name=16_TrunkWK
set [ find default-name=ether1 ] name=Console
/interface bonding
add mode=802.3ad mtu=9000 name=LaggpfSense slaves=\
09_pfSenseLagg,10_pfSenseLagg transmit-hash-policy=layer-2-and-3
/interface vlan
add interface=bridge name=vlanMGMT vlan-id=100
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/port
set 0 name=serial0
/interface list
add name=TRUSTED
/interface bridge port
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=01_MngtLan pvid=10
add bridge=bridge frame-types=admit-only-vlan-tagged interface=02_FiberNT
add bridge=bridge frame-types=admit-only-vlan-tagged interface=03_Vlan06
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=04_FritzboxMK pvid=40
add bridge=bridge frame-types=admit-only-vlan-tagged interface=05_SW-N&L
add bridge=bridge frame-types=admit-only-vlan-tagged interface=06_KVM-SW-MK
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=07_DirectConn pvid=230
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=08_IOT-MK pvid=30
add bridge=bridge frame-types=admit-only-vlan-tagged interface=LaggpfSense \
comment="Bonded ports to pfsense"
add bridge=bridge frame-types=admit-only-vlan-tagged interface=11_InterSwitchLnk
add bridge=bridge frame-types=admit-only-vlan-tagged interface=12_Lion
add bridge=bridge frame-types=admit-only-vlan-tagged interface=13_Panda
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=14_Wasbeertje pvid=14
add bridge=bridge frame-types=admit-priority-and-untagged \
interface=15_MAIN pvid=50
add bridge=bridge frame-types=admit-all comment="Hybrid Port??" \
interface=16_TrunkWK pvid=50
/ip neighbor discovery-settings
set discover-interface-list=TRUSTED
/interface list members
add interface=vlanMGMT list=TRUSTED
add interface=Console list=TRUSTED
/ip address
add address=192.168.10.2/24 interface=vlanMGMT network=192.168.10.0
add address=192.168.55.1/30 interface=Console network=192.168.55.0
/interface bridge vlan
add bridge=bridge comment=WAN-IPTV tagged=LaggpfSense,02_FiberNT vlan-ids=4
add bridge=bridge comment=INTERNET tagged=LaggpfSense,02_FiberNT,\
03_Vlan06 vlan-ids=6
add bridge=bridge comment="Voip (old)" tagged=LaggpfSense,02_FiberNT vlan-ids=7
add bridge=bridge comment=MngtLan tagged=bridge,LaggpfSense,11_InterSwitchLnk,\
02_FiberNT,03_Vlan06,05_SW-N&L,06_KVM-SW-MK,16_TrunkWK,12_Lion,13_Panda,\
untagged=01_MngtLan vlan-ids=10
add bridge=bridge comment=ConsoleLan tagged=LaggpfSense,11_InterSwitchLnk,\
06_KVM-SW-MK vlan-ids=12
add bridge=bridge comment=Wasbeertje tagged=LaggpfSense untagged=\
14_Wasbeertje vlan-ids=14
add bridge=bridge comment=GreenZone tagged=LaggpfSense,12_Lion,13_Panda,\
16_TrunkWK vlan-ids=18
add bridge=bridge comment=IOT-LAN tagged=LaggpfSense untagged=08_IOT-MK \
vlan-ids=30
add bridge=bridge comment=PCLAN tagged=LaggpfSense,1_InterSwitchLnk,\
05_SW-N&L untagged=04_FritzboxMK,1 vlan-ids=40
add bridge=bridge comment=PRIV10G tagged=LaggpfSense untagged=\
15_MAIN,16_TrunkWK vlan-ids=50
add bridge=bridge comment=Applications tagged=LaggpfSense,12_Lion,13_Panda,\
16_TrunkWK vlan-ids=70
add bridge=bridge comment=ServerLan tagged=LaggpfSense,12_Lion,13_Panda,\
16_TrunkWK vlan-ids=80
add bridge=bridge comment=RedZone tagged=LaggpfSense vlan-ids=100
add bridge=bridge comment=DomainWebsite tagged=LaggpfSense,12_Lion,16_TrunkWK \
vlan-ids=110
add bridge=bridge comment=DomainElise tagged=LaggpfSense,16_TrunkWK,12_Lion \
vlan-ids=120
add bridge=bridge comment=DomainGroetjes tagged=LaggpfSense,12_Lion,\
16_TrunkWK vlan-ids=130
add bridge=bridge comment=DirectConn tagged=LaggpfSense11_InterSwitchLnk \
untagged=07_DirectConn vlan-ids=230
/ip dns
set servers=192.168.10.1
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=192.168.10.1 \
routing-table=main suppress-hw-offload=no
/system swos
set address-acquisition-mode=static allow-from-vlan=2001 identity=CRS_317 \
static-ip-address=10.0.0.254
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=TRUSTED