I have setup a Guest Wifi for a Camera system in my block, it’s connected to that Wifi, the guest network is blocked to access my network (I’m ok with that) but is it possible to open a port between a device connected on the guest wifi to my internat network ? so i can be able to access the Cameras ?
Sorry but i don’t know how to do a diagram, i thought that my question was clear.
I did a Guest wifi network (wlan3), the PVP (192.168.88.192) is connected to that WIFI, my computer (192.168.88. is connected to the Mikrotik on the port 2, i want to access the web page of the pvr at the port 88 but the Mikrotik block it. Is it possible to unblock that port ?
A. Guest Network
i. wifi camera is in guest network
ii. neighbours are also on guest network so they can view the cameras
iii. guest network only has access to the internet
B. Home Network.
i. has access to the internet only
ii You wish to access the wifi camera for viewing or setup etc…
This is dirt simple
Firewall filter Forward Chain rule,
Allow your IP(sourceip) access to destinationIP(WIFI camera).
Thats it in general concepts. However without posting your config here its only a concept.
How to best do this or to do it safely depends on how your router is configured.
Please post it…
/export hide-sensitive file=yourconfig
Is what I need.
Just ensure that you remove your wanip and wanip gateway and you should be good to go.
I believe the above removes your wifi passwords as well but safe to check…
Ensure your IP services dont show your winbox port number or enter in a fake one…
You have no idea how many creative ways to (mis)configure things people find. Also when a person says that they did X, you never know if they really did X, or they only think they did and actually did Y.
To do what you want you need to have the notion of connection tracking: allow connection from lan to guest (and related responses, so conn tracking needed) but don’t allow connections (new) from guest to lan.
Bridge firewall doesn’t have that capability. You could try “use-ip-firewall” (which will further burden the cpu)… BUT
Why not isolate guest to different ip range, then it becomes much more straight-forward: guest = “dmz”, allow outbound to dmz, not inbound. → simple firewall config?
Ok, so the idea is to have guest LAN. But not the usual boring one which is completely separated (independent interface or bridge with own subnet). Rather make it part of main LAN bridge, let it use the same DHCP server and everything. Except it should be separate, so let’s cut if off with bridge filters. Yep, it’s creative.
My suggestion is to switch normal guest LAN. Make another bridge, put wlan3 and wlan4 there, give it own IP subnet and DHCP server, use IP firewall to manage access. It’s simple and manageable. Or is there any reason for what you have now that I’m missing?
If you’d like to keep what you have, you’d need some exception from current bridge filters. You’d need to allow access between wlan3/4 and device(s) in main LAN. It should work too, but you’d need to allow more stuff, because bridge filters are stateless and don’t see connections as IP firewall does. So you’d need to allow arp first, then traffic from guest to device(s) and also traffic from device(s) to guests.
Other possible solution could be bridge’s use-ip-firewall option, but I’d avoid it, that thing is strange.