Ensure that there is an 192.168.111.0/24 & a 192.168.88.0/24 address on your bridge interface.
Accept LAN to LAN & AP to AP traffic to prevent them from Masquerading behind the routers IP
Masquerade traffic out of your bridge interface.
/ip address
add address=192.168.111.1 interface=bridge
add address=192.168.88.1 interface=bridge
/ip firewall nat
add action=accept src-address=192.168.111.0/24 dst-address=192.168.111.0/24
add action=accept src-address=192.168.88.0/24 dst-address=192.168.88.0/24
# Masquerade to allow either network to talk to either network
add action=masquerade out-interface=bridge
# Or if you want to be more specific so that devices in 192.168.111.0/24 range cannot access 192.168.88.0/24 range.
add action=masquerade out-interface=bridge dst-address=192.168.111.0/24
Hi Mark, That rule prevents the router from masquerading traffic between your LAN devices. Otherwise the IP that would always be seen from the devices perspective is the Mikrotik’s own IP. This doesn’t have an impact on your security. This should not have an effect on your hotspot either unless you are marking packets between your local devices. Normally I always add this rule as it helps in seeing what the true internet usage is.
Hi there, try moving the nat rules to the top above the rest.
Secondly do you make use of any mangle rules? It may be that it is interfering. If you do you can add this to your mangle rules to test to the top of the mangle list: (These rules will stop the internal traffic from being mangled)