First, few non-critical observations:
-
For IP, all bridged interfaces behave as one, so all IP addresses should be directly on bridge, not on individual interfaces. It does not help you in any way, it only makes things confusing. E.g. when you have 192.168.50.254/24 on ether5-SQUID, it’s in fact available on all interfaces of the same bridge.
-
Second DHCP server (name=dhcp2) makes no sense.
Then there are your firewall rules:
/ip firewall filter
add chain=forward
Allows everything. I assume it’s temporary, because otherwise all following are useless.
add chain=forward comment=“redirect cu proxy” disabled=yes dst-port=53 protocol=udp src-address-list=suspendati
add chain=forward comment=“redirect cu proxy” disabled=yes dst-address-list=suspendati protocol=udp src-port=53
Blocks DNS for “suspendati” list addresses. Probably ok. DNS can also use TCP, but UDP is main one, so they’ll notice for sure. Second rule is not really needed. When you block the question, there can be no answer.
add action=drop chain=forward comment=“redirect cu proxy” disabled=yes src-address-list=suspendati
add action=drop chain=forward comment=SUSPENDATI disabled=yes src-address-list=suspendati
Blocks traffic from “suspendati” list addresses. Both rules are the same, you probably wanted one to use dst-address-list=suspendati. But remember that even dstnatted ports go through forward chain, so you must allow access to 192.168.40.20 before this.
/ip firewall nat
add action=dst-nat chain=dstnat disabled=yes protocol=tcp src-address-list=suspendati to-addresses=192.168.40.20 to-ports=8085
It’s most likely useless to dstnat all tcp ports. If that port 8085 runs webserver, it will only show useful info when original destination port is 80.
add chain=srcnat comment=“alocare internet WAN catre LAN” out-interface=bridge2-WAN
Skips srcnat for outgoing traffic via bridge2-WAN. Doesn’t seem to be required by anything.
add action=src-nat chain=srcnat disabled=yes src-address-list=suspendati to-addresses=8x.xx.xx.100
Nonsense.
Regarding your VLAN config, if you previously had only this:
/interface vlan
add interface=bridge_client name=vlan100 vlan-id=100
Then your VLAN did not have any address on router and if clients were in VLAN 100, they were isolated from router. What I wrote would be correct, remove sfp-sfpplus1 from bridge and then:
/interface vlan
add interface=sfp-sfpplus1 name=vlan100 vlan-id=100
/interface bridge port
add bridge=bridge_client interface=vlan100
And move 8x.xx.xx.1/24 from ether4 to bridge_client. That will give you same subnet untagged on ether4, ether5-SQUID and ether7-CLIENT, and tagged on sfp-sfpplus1. All 8x.xx.xx.x devices will be able to communicate with each other (ping will work).
One thing I don’t understand is why you’d need VLAN at all, if you don’t have anything else on sfp-sfpplus1. The other router could deal with that. Also there’s address 192.168.100.100 in one dstnat rule, is it just leftover, or did you filter some stuff from export (other than DHCP leases)?