A diagram would really help!!
Let me get it straight.
One ethernet cable from fiber modem(ont) will go into ether1 of the mikrotik.
You have a block of 5 IPs to work with, all have the same gateway IP.
You need to have three of the public IPs be directly associated with 3 networks.
Each network will be associated with an etherport.
So something like,
Lets say gateway common gateway IP is 10.10.10.1
ether1-WAN
ether2-Network2 uses public IP 10.10.10.2 with LAN structure of 192.168.2.0/24
ether3-Network3 uses public IP 10.10.10.3 with LAN structure of 192.168.3.0/24
ether4-Network4 uses public IP 10.10.10.4 with LAN structure of 192.168.4.0/24
ether5-LAN1_adminLAN (private LAN behind the router) associated with 10.10.10.5 with LAN structure of 192.168.1.0/24
/IP route 0.0.0.0/0 gatewayip=10.10.10.1 routing-mark=network2 pref-src=10.10.10.2 distance=1
/IP route 0.0.0.0/0 gatewayip=10.10.10.1 routing mark=network3 pref-src=10.10.10.3 distance=1
/IP route 0.0.0.0/0 gatewayip=10.10.10.1 routing-mark=network4 pref-src=10.10.10.4 distance=1
/IP route 0.0.0.0/0 gatewayip=10.10.10.1 pre-src=10.10.10.5 distance=1
/ip firewall mange
add chain=prerouting action=mark-connection new-connection-mark=cm_network2 in-interface=LAN src-address=192.168.2.0/24 passthrough=yes
add chain=prerouting action=mark-route connection-mark=cm_network2 new-routing-mark=network2 passthrough=no
add chain=prerouting action=mark-connection new-connection-mark=cm_network3 in-interface=LAN src-address=192.168.3.0/24 passthrough=yes
add chain=prerouting action=mark-route connection-mark=cm_network3 new-routing-mark=network3 passthrough=no
add chain=prerouting action=mark-connection new-connection-mark=cm_network4 in-interface=LAN src-address=192.168.4.0/24 passthrough=yes
add chain=prerouting action=mark-route connection-mark=cm_network4 new-routing-mark=network4 passthrough=no
The above networks should not be accessible to each other at layer 2 (not bridged).
However the mikrotik could route between them so you would have to make block rules or NOT depending upon FW concept.
Mine would be no need for FW rules… as drop all is the default, if not explicitly allowed its dropped!
/ip firewall filter {forward chain}
- accept connected established untracked
- drop invalid
- allow in-inferface-list=LAN out-interface-list=WAN
- allow adminaccess to all networks (if you need this)
- log=yes prefix="Initially monitor all traffic being dropped here to see if adjustments need to be made)
- drop all else.
/ip firewall NAT (all outgoing traffic needs to be translated on the way back)
add chain=srcnat out-interface=WAN action=srcnat to-addresses=10.10.10.2
add chain=srcnat out-interface=WAN action=srcnat to-addresses=10.10.10.3
add chain=srcnat out-interface=WAN action=srcnat to-addresses=10.10.10.4
add chain=srcnat out-interface=WAN action=srcnat to-addresses=10.10.10.5
Will also need the appropriate entries in winbox but I will be frank with I am real shaky at how to deal with multiple WAN IPs???
For example where I am most nervous is how to fill out
/ip addresses and IP DCHP Client
Also what will /interface list look like.
WAN- ether1
LAN - network2 ether2
LAN - network3 ether3
LAN -network4 ether4
LAN-LAN1_adminLAN ether5
also need
/ip pool
/ip dhcp server
/ip dhcp network