I took the main configuration from the mentioned website, but here a brief description:
Router Configuration at a glance:

How it all works:
Firewall rules allow visibility for entire VLANs or resources within a VLAN. Customize to suit your needs.
The idea is, that all devices, that connect are by default in the “Default_VLAN”, except the ones, that connect wirelessly over the guest WLAN - they should by default come to the “Guest_VLAN”. Guest VLAN should also only have access to the internet. WLAN access points are http://www.grandstream.com/products/networking-solutions/wifi-access-points/product/gwn7660
The devices (like Webcams, etc), that I do not want that they connect to the internet, but still are able to connect to “default_VLAN” as for example the storage for the camera’s footage is on the “Default_VLAN”. I make those devices static IP set in the 10.10.30.x - that is what they should get when they connect.
“Default_VLAN” should be able to connect to all VLANs.
Here the configuration:
# nov/08/2021 14:28:35 by RouterOS 7.1rc6
# software id =
#
/interface bridge
add name=bridge protocol-mode=none vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] disable-running-check=no
set [ find default-name=ether2 ] disable-running-check=no
set [ find default-name=ether3 ] disable-running-check=no
set [ find default-name=ether4 ] disable-running-check=no
set [ find default-name=ether5 ] disable-running-check=no
set [ find default-name=ether6 ] disable-running-check=no
set [ find default-name=ether7 ] disable-running-check=no
set [ find default-name=ether8 ] disable-running-check=no
/interface vlan
add interface=bridge name=Default_VLAN vlan-id=10
add interface=bridge name=Guest_VLAN vlan-id=20
add interface=bridge name=NoNet_VLAN vlan-id=30
/disk
set sata1 disabled=no
/interface list
add name=WAN
add name=VLAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=Default_POOL ranges=10.10.10.200-10.10.10.254
add name=Guest_POOL ranges=10.10.20.200-10.10.20.254
add name=NoNet_POOL ranges=10.10.30.200-10.10.30.254
/ip dhcp-server
add address-pool=Default_POOL interface=Default_VLAN name=Default_DHCP
add address-pool=Guest_POOL interface=Guest_VLAN name=Guest_DHCP
add address-pool=NoNet_POOL interface=NoNet_VLAN name=NoNet_DHCP
/port
set 0 name=serial0
set 1 name=serial1
/interface bridge port
add bridge=bridge interface=ether2
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
add bridge=bridge interface=ether5
add bridge=bridge interface=ether6
add bridge=bridge interface=ether7
/interface bridge vlan
add bridge=bridge tagged=bridge,ether2,ether3,ether4,ether5,ether6,ether7 \
vlan-ids=10
add bridge=bridge tagged=bridge,ether2,ether3,ether4,ether5,ether6,ether7 \
vlan-ids=20
add bridge=bridge tagged=bridge,ether2,ether3,ether4,ether5,ether6,ether7 \
vlan-ids=30
/interface list member
add interface=ether1 list=WAN
add interface=Default_VLAN list=VLAN
add interface=Guest_VLAN list=VLAN
add interface=NoNet_VLAN list=VLAN
/ip address
add address=192.168.1.0/24 interface=ether1 network=192.168.1.0
add address=10.10.10.1/24 interface=Default_VLAN network=10.10.10.0
add address=10.10.20.1/24 interface=Guest_VLAN network=10.10.20.0
add address=10.10.30.1/24 interface=NoNet_VLAN network=10.10.30.0
/ip dhcp-client
add interface=ether1
/ip dhcp-server lease
add address=10.10.10.3 client-id=8:92:4A:39:04:B0 comment=whs lease-time=1d \
mac-address=28:92:4A:39:04:B0 server=Default_DHCP
add address=10.10.10.4 client-id=0:11:32:54:41:FD comment=nas lease-time=1d \
mac-address=00:11:32:54:41:FD server=Default_DHCP
add address=10.10.10.6 client-id=0:15:99:E1:29:69 comment=printer lease-time=\
1d mac-address=00:15:99:E1:29:69 server=Default_DHCP
add address=10.10.10.7 client-id=C:17:02:0D:4E:3E comment=fibaro lease-time=\
1d mac-address=AC:17:02:0D:4E:3E server=Default_DHCP
add address=10.10.10.10 client-id=C:11:BF:0D:69:55 comment=videonadzor \
lease-time=3d mac-address=4C:11:BF:0D:69:55 server=Default_DHCP
add address=10.10.10.13 client-id=8:27:EB:58:D4:D7 comment=moode lease-time=\
1d mac-address=B8:27:EB:58:D4:D7 server=Default_DHCP
add address=10.10.10.20 client-id=0:74:AD:54:62:54 comment=stenge lease-time=\
3w mac-address=C0:74:AD:54:62:54 server=Default_DHCP
add address=10.10.10.21 client-id=0:74:AD:54:63:1C comment=garaza lease-time=\
3w mac-address=C0:74:AD:54:63:1C server=Default_DHCP
add address=10.10.10.23 client-id=8:27:EB:67:A7:46 comment=Cayenne \
lease-time=1d mac-address=B8:27:EB:67:A7:46 server=Default_DHCP
add address=10.10.10.24 client-id=8:27:EB:32:F2:13 comment=\
"Cayenne + Wireguard + Ubidots" lease-time=1d mac-address=\
B8:27:EB:32:F2:13 server=Default_DHCP
add address=10.10.10.25 client-id=4:FB:E4:82:66:3B comment="unifi cloudkey" \
lease-time=1d mac-address=B4:FB:E4:82:66:3B server=Default_DHCP
add address=10.10.10.26 client-id=C:EC:DA:B6:4D:77 comment=stenge lease-time=\
1d mac-address=FC:EC:DA:B6:4D:77 server=Default_DHCP
add address=10.10.10.27 client-id=4:D9:E7:C6:D9:4E comment=garaza lease-time=\
1d mac-address=44:D9:E7:C6:D9:4E server=Default_DHCP
add address=10.10.10.40 client-id=0:90:3E:DA:1B:47 comment="televizija WLAN" \
lease-time=1d mac-address=00:90:3E:DA:1B:47 server=Default_DHCP
add address=10.10.10.41 client-id=C:5A:6B:C0:86:96 comment="televizija LAN" \
lease-time=1d mac-address=1C:5A:6B:C0:86:96 server=Default_DHCP
add address=10.10.10.42 client-id=C:AD:F8:15:04:3E comment=chromecast \
lease-time=1d mac-address=6C:AD:F8:15:04:3E server=Default_DHCP
add address=10.10.20.100 client-id=0:F5:20:0A:94:3B comment=vremenska \
lease-time=1d mac-address=40:F5:20:0A:94:3B server=Guest_DHCP
add address=10.10.20.101 client-id=0:98:C3:F8:27:22 comment=Toplotna \
lease-time=1d mac-address=10:98:C3:F8:27:22 server=Guest_DHCP
add address=10.10.20.102 client-id=8:E7:DA:51:40:27 comment=zvonec \
lease-time=1d mac-address=48:E7:DA:51:40:27 server=Guest_DHCP
add address=10.10.20.103 client-id=4:91:1E:31:61:E4 comment="klima dnevna" \
lease-time=1d mac-address=F4:91:1E:31:61:E4 server=Guest_DHCP
add address=10.10.20.104 client-id=4:90:C1:6F:6B:DE comment=sesalec \
lease-time=1d mac-address=64:90:C1:6F:6B:DE server=Guest_DHCP
add address=10.10.30.100 client-id=0:BD:1D:4F:F3:B6 comment="Kamera Tim" \
lease-time=1d mac-address=A0:BD:1D:4F:F3:B6 server=NoNet_DHCP
add address=10.10.30.101 client-id=4:52:6A:AA:C6:C7 comment="Kamera leteca" \
lease-time=1d mac-address=24:52:6A:AA:C6:C7 server=NoNet_DHCP
/ip dhcp-server network
add address=10.10.10.0/24 dns-server=9.9.9.9,1.1.1.1,212.18.32.10 gateway=\
10.10.10.1
add address=10.10.20.0/24 dns-server=9.9.9.9,1.1.1.1,212.18.32.10 gateway=\
10.10.20.1
add address=10.10.30.0/24 dns-server=9.9.9.9,1.1.1.1,212.18.32.10 gateway=\
10.10.30.1
/ip dns
set allow-remote-requests=yes servers=9.9.9.9,1.1.1.1,8.8.8.8
/ip firewall filter
add action=fasttrack-connection chain=forward comment=FastTrack \
connection-state=established,related hw-offload=yes
add action=drop chain=forward comment="Drop invalid" connection-state=invalid \
log=yes log-prefix=invalid
add action=accept chain=input comment="Allow Estab & Related" \
connection-state=established,related
add action=accept chain=input comment="Allow VLAN" in-interface-list=VLAN
add action=accept chain=forward comment="Allow Estab & Related" \
connection-state=established,related
add action=accept chain=forward comment="VLAN Internet Access only" \
connection-state=new in-interface-list=VLAN out-interface-list=WAN
add action=drop chain=forward comment=Drop
add action=fasttrack-connection chain=forward comment=FastTrack \
connection-state=established,related hw-offload=yes log-prefix=FastTrack
add action=accept chain=forward comment="ZVONEC povezave" log-prefix=ZVONEC \
src-address=10.10.20.102
add action=accept chain=forward comment="dostop WireGuard private list" \
dst-port=8080 in-interface=ether1 log-prefix=\
"dostop WireGuard private list" protocol=udp src-address-list=PrivateIPs
add action=accept chain=forward comment="dostop WireGuard AT list" dst-port=\
8080 in-interface=ether1 log-prefix="dostop WireGuard AT list" protocol=\
udp src-address-list=AT
add action=accept chain=forward comment="dostop WireGuard HR list" dst-port=\
8080 in-interface=ether1 log-prefix="dostop WireGuard AT list" protocol=\
udp src-address-list=HR
add action=accept chain=forward comment="dostop WireGuard SI list" dst-port=\
8080 in-interface=ether1 log-prefix="dostop WireGuard AT list" protocol=\
udp src-address-list=SI
add action=drop chain=forward comment="Tim kamera v WAN" dst-address=\
!10.10.10.0/24 log-prefix="WIFI Kamera OUT" src-address=10.10.30.100
add action=drop chain=forward comment="Leteca kamera v WAN" dst-address=\
!10.10.10.0/24 log-prefix="WIFI Kamera OUT" src-address=10.10.30.101
add action=drop chain=forward comment="Leteca kamera v WAN" dst-address=\
!10.10.10.0/24 log-prefix="WIFI Kamera OUT" src-address=10.10.30.102
add action=drop chain=forward comment="Sesalec v LAN" dst-address=\
10.10.10.0/24 log=yes log-prefix="Sesalec local" src-address=10.10.20.104
add action=accept chain=forward comment=\
"Allow the Private IP ranges to be forwarded by the router" \
connection-state=new log-prefix="Allow Private IP ranges" \
src-address-list=PrivateIPs
add action=accept chain=forward comment=\
"Allow current valid connections as well as valid related packets" \
connection-state=established,related log-prefix=\
"Allow current valid connections"
add action=accept chain=forward comment="dostop videonadzor SI list" \
dst-port=37777 in-interface=ether1 log=yes log-prefix=\
"dostop videonadzor SI list" protocol=tcp src-address-list=SI
add action=accept chain=forward comment="dostop videonadzor HR list" \
dst-port=37777 in-interface=ether1 log=yes log-prefix=\
"dostop videonadzor HR list" protocol=tcp src-address-list=HR
add action=accept chain=forward comment="dostop videonadzor AT list" \
dst-port=37777 in-interface=ether1 log=yes log-prefix=\
"dostop videonadzor AT list" protocol=tcp src-address-list=AT
add action=add-src-to-address-list address-list="Videonadzor BlackList" \
address-list-timeout=none-dynamic chain=forward comment=\
"dostop Videonadzor" dst-port=37777 in-interface=ether1 log=yes \
log-prefix="Videonadzor => Videonadzor BlackList" protocol=tcp
add action=accept chain=forward comment="dostop do interneta" in-interface=\
bridge log-prefix="BRIDGE LAN"
add action=accept chain=forward comment="dostop nas" dst-port=\
21,80,5000,5001,5005,5506,500,5678 log-prefix="dostop do nas" protocol=\
tcp
add action=accept chain=forward comment=\
"dostop do MikroTik private IP (winbox)" dst-port=\
80,443,8291,8728,8729,20561 log=yes log-prefix=\
"Dostop do Mikrotik private IP" protocol=tcp src-address=10.10.10.0/24 \
src-address-list=PrivateIPs
add action=accept chain=output content="530 Login incorrect" dst-limit=\
1/1m,9,dst-address/1m protocol=tcp
add action=add-dst-to-address-list address-list=ftp_blacklist \
address-list-timeout=4w2d chain=output content="530 Login incorrect" \
protocol=tcp
add action=add-src-to-address-list address-list=icmp_ping \
address-list-timeout=12w6d chain=input dst-address=192.168.1.10 \
in-interface=ether1 log-prefix="PING add to blacklist" protocol=icmp \
src-address-list=!PrivateIPs
add action=accept chain=input in-interface=bridge log-prefix=PING protocol=\
icmp
add action=accept chain=input connection-state=established
add action=accept chain=input connection-state=related
/ip firewall nat
add action=masquerade chain=srcnat comment="Default masquerade" \
out-interface-list=WAN
add action=masquerade chain=srcnat comment="LAN => WAN" out-interface=ether1
add action=masquerade chain=srcnat comment="lokalno do nas" dst-address=\
10.10.10.4 dst-port=21,80,5001,5000,5005,5506,500,5678,443 out-interface=\
bridge protocol=tcp src-address=10.10.10.0/24
add action=masquerade chain=srcnat comment="lokalno do MikroTik" dst-address=\
10.10.10.1 dst-port=80,443,8291,8728,8729,20561 log=yes log-prefix=\
"Local IP do MikroTik NAT" out-interface=bridge protocol=tcp src-address=\
10.10.10.0/24
add action=masquerade chain=srcnat comment="lokalno do MikroTik" dst-address=\
10.10.10.1 dst-port=80,443,8291,8728,8729,20561 log=yes log-prefix=\
"Local IP do MikroTik NAT" out-interface=bridge protocol=tcp src-address=\
10.6.0.0/24
add action=masquerade chain=srcnat comment="lokalno do whs" dst-address=\
10.10.10.3 dst-port=3389 out-interface=bridge protocol=tcp src-address=\
10.10.10.0/24
add action=masquerade chain=srcnat comment="lokalno do meteohub" dst-address=\
10.10.10.2 dst-port=8080 out-interface=bridge protocol=tcp src-address=\
10.10.10.0/24
add action=masquerade chain=srcnat comment="lokalno do videonadzor" \
dst-address=10.10.10.10 dst-port=37777,37778,37779 out-interface=bridge \
protocol=tcp src-address=10.10.10.0/24
add action=dst-nat chain=dstnat comment="nas ftp" dst-address=192.168.1.10 \
dst-port=21 protocol=tcp to-addresses=10.10.10.4 to-ports=21
add action=dst-nat chain=dstnat comment="nas http" dst-address=192.168.1.10 \
dst-port=80 log-prefix=web-in protocol=tcp to-addresses=10.10.10.4 \
to-ports=80
add action=dst-nat chain=dstnat comment="nas https" dst-address=192.168.1.10 \
dst-port=443 protocol=tcp to-addresses=10.10.10.4 to-ports=443
add action=dst-nat chain=dstnat comment="nas 500" dst-address=192.168.1.10 \
dst-port=500 protocol=tcp to-addresses=10.10.10.4 to-ports=500
add action=dst-nat chain=dstnat comment="nas admin" dst-address=192.168.1.10 \
dst-port=5000 protocol=tcp to-addresses=10.10.10.4 to-ports=5000
add action=dst-nat chain=dstnat comment="rdp whs" dst-address=192.168.1.10 \
dst-port=3389 log=yes log-prefix="RDP WHS Private IP" protocol=tcp \
src-address-list=PrivateIPs to-addresses=10.10.10.3 to-ports=3389
add action=add-src-to-address-list address-list=rdp_blacklist \
address-list-timeout=none-static chain=dstnat comment=\
"3389 whs => Blockedlist" dst-address=192.168.1.10 dst-port=3389 log=yes \
log-prefix="3389 WHS => RDP Blacklist NAT" protocol=tcp to-addresses=\
10.10.10.3 to-ports=3389
add action=add-src-to-address-list address-list=rdp_blacklist \
address-list-timeout=none-static chain=dstnat comment=\
"23 whs => Blockedlist" dst-address=192.168.1.10 dst-port=23 log=yes \
log-prefix="23 WHS => RDP Blacklist NAT" protocol=tcp to-addresses=\
10.10.10.3 to-ports=3389
add action=add-src-to-address-list address-list=rdp_blacklist \
address-list-timeout=none-static chain=dstnat comment=\
"22 whs => Blockedlist" dst-address=192.168.1.10 dst-port=22 log=yes \
log-prefix="22 WHS => RDP Blacklist NAT" protocol=tcp to-addresses=\
10.10.10.3 to-ports=3389
add action=dst-nat chain=dstnat comment="dostop WireGuard Private" \
dst-address=192.168.1.10 dst-port=8080 log=yes log-prefix=\
"dostop WireGuard VPN PrivateIP" protocol=udp src-address-list=PrivateIPs \
to-addresses=10.10.10.24 to-ports=8080
add action=dst-nat chain=dstnat comment="dostop WireGuard SI" dst-address=\
192.168.1.10 dst-port=8080 log-prefix="dostop WireGuard piVPN" protocol=\
udp src-address-list=SI to-addresses=10.10.10.24 to-ports=8080
add action=dst-nat chain=dstnat comment="dostop WireGuard HR" dst-address=\
192.168.1.10 dst-port=8080 log-prefix="dostop WireGuard piVPN" protocol=\
udp src-address-list=HR to-addresses=10.10.10.24 to-ports=8080
add action=dst-nat chain=dstnat comment="dostop WireGuard AT" dst-address=\
192.168.1.10 dst-port=8080 log-prefix="dostop WireGuard piVPN" protocol=\
udp src-address-list=AT to-addresses=10.10.10.24 to-ports=8080
add action=dst-nat chain=dstnat comment=videonadzor dst-address=192.168.1.10 \
dst-port=37777 log-prefix="Videonadzor dostop NAT Private IP" protocol=\
tcp to-addresses=10.10.10.10 to-ports=37777
add action=dst-nat chain=dstnat comment="nas webdaw" dst-address=192.168.1.10 \
dst-port=5005 protocol=tcp to-addresses=10.10.10.4 to-ports=5005
add action=dst-nat chain=dstnat comment="nas webdaw" dst-address=192.168.1.10 \
dst-port=5506 protocol=tcp to-addresses=10.10.10.4 to-ports=5506
add action=dst-nat chain=dstnat comment="nas torrent" dst-address=\
192.168.1.10 dst-port=5678 protocol=tcp src-address=0.0.0.0 to-addresses=\
10.10.10.4 to-ports=5678
add action=dst-nat chain=dstnat comment="nas admin" dst-address=192.168.1.10 \
dst-port=5001 protocol=tcp to-addresses=10.10.10.4 to-ports=5000
add action=masquerade chain=srcnat comment="lokalno do unify" dst-address=\
10.10.10.10 dst-port=8443 out-interface=bridge protocol=tcp src-address=\
10.10.10.0/24
/ip firewall raw
add action=drop chain=prerouting comment="Drop WAN connections from 'RDP' blac\
klisted hosts <- Src. Address List: RDP_Blacklist" in-interface-list=WAN \
log-prefix="raw RDP Blacklist Drop" src-address-list=rdp_blacklist
add action=drop chain=prerouting comment="Drop WAN connections from 'Videonadz\
or' blacklisted hosts <- Src. Address List: VideonadzorBlackList" \
in-interface-list=WAN log-prefix="raw Videonazdor Blaclikst Drop" \
src-address-list="Videonadzor BlackList"
add action=drop chain=prerouting comment="Drop WAN connections from 'CMP_PING\
\" blacklisted hosts <- Src. Address List: icm_ping" disabled=yes \
in-interface-list=WAN log=yes log-prefix="raw PING blocklist" \
src-address-list=icmp_ping
/ip route
add distance=1 gateway=192.168.1.254
/system clock
set time-zone-name=Europe/Ljubljana
/system identity
set name=Router
As I wrote, that after applying this setup, I can not access the router anymore. SO I did that using the Windows version and a Virtual box - there I do not lose the connection. But in my real environment, it is not working.
Thank you!