I’m trying to get Bridge VLAN Filtering to work in a fairly easy setup, that consists of a hEX and two Ubiquiti nanoHD, but for some reason, I can’t pull this off.. I have tried to replicate the setup used in the documentation (https://help.mikrotik.com/docs/display/ROS/Bridging+and+Switching#BridgingandSwitching-BridgeVLANFiltering under VLAN Example - Trunk and Hybrid Ports) in order to allow untagged (VLAN 1) and tagged (VLAN 11) traffic between my access points and router. VLAN 1 flows accordingly, but not VLAN 11.
I would be grateful if anyone could help me out. Thanks in advance!
Once i go vlans I go full vlan!!
vlan1 should not be used as it implied workign in the background.
sorry for the guessing but since your post lacks useful information…
Without seeing the whole export, this is only a guess. You didn’t add vlan11 to the LAN interface list. I think your original vlan setup looks like it should work. The bridge interface is sending untagged traffic over the “internal trunk link” to the integrated switch ASIC (assuming you have the RB750Gr3). And that means that the 02.jpg config is correct, and the 03.jpg config is incorrect. Because you don’t have a vlan1 interface, and the vlan interface is what adds a vlan tag on egress and removes the tag on ingress. in other words, the “port on the switch-asic that is connected to the CPU” normally has pvid=1 and expects traffic from vlan 1 to be untagged, not tagged as was hinted by this post.
When I first got my hEX S, and before playing with the vlan-filtering bridge, I removed ether5 from the bridge to have a safe place to work from (so I didn’t saw off the branch I was sitting on). However, even though I could get an ip address from the ether5 interface, I could not get things to work.
The fact that I was able to get an ip address via DHCP tricked me into thinking the firewall was allowing access, but DHCP gets access before the firewall.
Here’s the post where I described the problem, and this is the “extracted portion”
I removed ether5 from the bridge, added an ip address, and dhcp server, but I was still locked out from ether5, even though I was able to get an ip address from the dhcp server. The problem was that I hadn’t added ether5-LAN1 to the LAN interface list, and the default firewall blocks all input to the router if it is not coming from the LAN interface list. After I added ether5-LAN1 to the LAN interface list, I was able to log in from the “emergency access port”, and now I am ready to start playing with adding vlans to the bridge.