(1) /ip pool (missing rest of pools)
add name=BASE_POOL ranges=172.16.1.10-172.16.1.50
(2) /ip dhcp-server (missing rest of dhcp-servers)
add address-pool=BASE_POOL disabled=no interface=BASE_VLAN lease-time=4h
name=BASE_DHCP
(3a) If you want to make ether 2 an access port (aka connected to a non vlan aware device such as a PC).
/interface bridge port
add bridge=BR1 frame-types=admit-only-untagged and priority tagged
interface=ether2 pvid=(whatever vlan its supposed to be on)
(3b) /interface bridge vlan
add bridge=BR1 tagged=BR1,ether3,ether4,ether5,sfp1 untagged=ether2 vlan-ids=(whatever vlan ether2 is an access port on)
(4) /ip dhcp-server network (missing the rest of the networks)
add address=172.16.1.0/24 dns-server=172.16.1.254 gateway=172.16.1.254
(5) The first rule includes the second rule so the second one is redundant.
/ip firewall filter
add action=accept chain=input comment=“Allow VLAN” in-interface-list=VLAN
add action=accept chain=input comment=“Allow Base_Vlan Full Access”
in-interface=BASE_VLAN
However, for better security one should only allow the admin full access to the router itself and for everybody else, just the services they require with the most common being DNS and yes this includes other users (not the admin) on the base vlan.
So I would change the two rules and for example provide 3…
/ip firewall filter
add action=accept chain=input comment=“Allow Admin” in-interface-list=BASE_VLAN src-address-list=adminaccess
add action=accept chain=input comment=“Allow VLAN DNS queries-UDP”
dst-port=53 in-interface-list=VLAN protocol=udp
add action=accept chain=input comment=“Allow VLAN DNS queries - TCP”
dst-port=53 in-interface-list=VLAN protocol=tcp
where
/ip firewall address-list
add address=192.xxxx list=adminaccess comment=“admin desktop”
add address=192.xxxy list=adminaccess comment=“admin laptop”
add address=192.xxxz list=adminaccess comment=“admin smartphone”
(6) Finally, it absolutely makes sense for your base vlan not to be able to ping other vlans. The VLANs themselves create layer 2 blocking AND due to your last rule in the forward chain ‘drop all else’ ( an excellent rule to have), you have only permitted vlan to wan traffic in the forward chain!
If you want the base vlan to be able to access the other vlans then make the necessary firewall rule.
Do you want this for all base vlan users or just yourself??
/ip firewall filter (all base vlan users)
add action=accept chain=forward comment=“Allow Base VLAN to VLANS” in-interface-list=BASE_VLAN
out-interface-list=VLAN
/ip firewall filter (just the admin)
add action=accept chain=forward comment=“Allow Admin” to all VLANS" in-interface-list=BASE_VLAN
out-interface-list=VLAN src-address-list=adminaccess