Thank you, sindy, I’ve tried, but still same effect, after the last command (/ip address set [find where interface=ether1] interface=vlan111 ; /interface bridge port add bridge=bridge_EXT interface=ether1 pvid=111) connectivity gets lost (Request timeout for ping). And the most confusing moment, that I’ve tried the same scenario on another 4011 which is near me, and it worked.
I have no idea why?
The same model, same firmware (7.16.2) The main difference that my local 4011 is getting external IP as DHCP client and I do everything from LAN subnet, so I’ve changed interface from eth1 to vlan111 in DHCP client config, but remote 4011 has static IP configuration and I do everything via WAN.
May be there is a default route issue after changing interface?
Here are my configs. I’m using bridge_EXT and vlan111 for external network in both cases.
Local (working) 4011:
[admin@MikroTik 4011] > interface vlan print
Flags: R - RUNNING
Columns: NAME, MTU, ARP, VLAN-ID, INTERFACE
# NAME MTU ARP VLAN-ID INTERFACE
0 R vlan111 1500 enabled 111 bridge_EXT
[admin@MikroTik 4011] > interface bridge print
Flags: X - disabled, R - running
0 R ;;; defconf
name="bridge" mtu=auto actual-mtu=1500 l2mtu=1592 arp=enabled arp-timeout=auto
mac-address=B8:69:F4:88:1A:69 protocol-mode=rstp fast-forward=yes igmp-snooping=no auto-mac=no
admin-mac=B8:69:F4:88:1A:69 ageing-time=5m priority=0x8000 max-message-age=20s
forward-delay=15s transmit-hold-count=6 vlan-filtering=no dhcp-snooping=no port-cost-mode=short
mvrp=no max-learned-entries=auto
1 R name="bridge_EXT" mtu=auto actual-mtu=1500 l2mtu=1592 arp=enabled arp-timeout=auto
mac-address=00:EB:D8:31:93:3F protocol-mode=rstp fast-forward=yes igmp-snooping=no auto-mac=no
admin-mac=00:EB:D8:31:93:3F ageing-time=5m priority=0x8000 max-message-age=20s
forward-delay=15s transmit-hold-count=6 vlan-filtering=yes ether-type=0x8100 pvid=1
frame-types=admit-all ingress-filtering=yes dhcp-snooping=no port-cost-mode=long mvrp=no
max-learned-entries=auto
[admin@MikroTik 4011] > interface bridge port print
Flags: X - DISABLED, I - INACTIVE; H - HW-OFFLOAD
Columns: INTERFACE, BRIDGE, HW, PVID, PRIORITY, PATH-COST, INTERNAL-PATH-COST, HORIZON
# INTERFACE BRIDGE HW PVID PRIORITY PATH-COST INTERNAL-PATH-COST HORIZON
;;; defconf
0 H ether2 bridge yes 1 0x80 10 10 none
;;; defconf
1 IH ether3 bridge yes 1 0x80 10 10 none
;;; defconf
2 IH ether4 bridge yes 1 0x80 10 10 none
;;; defconf
3 IH ether5 bridge yes 1 0x80 10 10 none
;;; defconf
4 X ether6 bridge 1 0x80 10 10 none
;;; defconf
5 X ether7 bridge 1 0x80 10 10 none
;;; defconf
6 IH ether8 bridge yes 1 0x80 10 10 none
;;; defconf
7 IH ether9 bridge yes 1 0x80 10 10 none
;;; defconf
8 H ether10 bridge yes 1 0x80 10 10 none
9 bonding1 bridge yes 1 0x80 10 10 none
10 ether1 bridge_EXT yes 111 0x80 none
[admin@MikroTik 4011] > ip address print
Flags: D - DYNAMIC
Columns: ADDRESS, NETWORK, INTERFACE
# ADDRESS NETWORK INTERFACE
;;; defconf
0 192.168.1.1/24 192.168.1.0 bridge
1 D x.x.x.222/26 x.x.x.192 vlan111
[admin@MikroTik 4011] > ip route print
Flags: D - DYNAMIC; I - INACTIVE, A - ACTIVE; c - CONNECT, s - STATIC, d - DHCP; H - HW-OFFLOADED
Columns: DST-ADDRESS, GATEWAY, DISTANCE
# DST-ADDRESS GATEWAY DISTANCE
DAd 0.0.0.0/0 x.x.x.193 1
DAc x.x.x.192/26 vlan111 0
DAc 192.168.188.0/24 bridge 0
[admin@MikroTik 4011] > interface list member print
Flags: X - DISABLED
Columns: LIST, INTERFACE
# LIST INTERFACE
;;; defconf
0 LAN bridge
;;; defconf
1 X WAN ether1
2 WAN vlan111
Remote 4011 (Before last command “/ip address set [find where interface=ether1] interface=vlan111 ; /interface bridge port add bridge=bridge_EXT interface=ether1 pvid=111” and loosing connectivity):
[admin@MikroTik] > interface vlan print
Flags: R - RUNNING
Columns: NAME, MTU, ARP, VLAN-ID, INTERFACE
# NAME MTU ARP VLAN-ID INTERFACE
0 R vlan111 1500 enabled 111 bridge_EXT
[admin@MikroTik] > interface bridge print
Flags: X - disabled, R - running
0 R ;;; defconf
name="bridge" mtu=auto actual-mtu=1500 l2mtu=1592 arp=enabled arp-timeout=auto mac-address=2C:C8:1B:63:43:31
protocol-mode=rstp fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=2C:C8:1B:63:43:31 ageing-time=5m
priority=0x8000 max-message-age=20s forward-delay=15s transmit-hold-count=6 vlan-filtering=no dhcp-snooping=no
port-cost-mode=short mvrp=no max-learned-entries=auto
1 R name="bridge_EXT" mtu=auto actual-mtu=1500 l2mtu=65535 arp=enabled arp-timeout=auto mac-address=2C:C8:1B:63:43:30
protocol-mode=rstp fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=2C:C8:1B:63:43:30 ageing-time=5m
priority=0x8000 max-message-age=20s forward-delay=15s transmit-hold-count=6 vlan-filtering=yes ether-type=0x8100 pvid=1
frame-types=admit-all ingress-filtering=yes dhcp-snooping=no port-cost-mode=long mvrp=no max-learned-entries=auto
2 X name="bridge_PVE" mtu=1500 arp=enabled arp-timeout=auto mac-address=2C:C8:1B:63:43:31 protocol-mode=rstp fast-forward=yes
igmp-snooping=no auto-mac=yes ageing-time=5m priority=0x8000 max-message-age=20s forward-delay=15s
transmit-hold-count=6 vlan-filtering=no dhcp-snooping=no port-cost-mode=long mvrp=no max-learned-entries=auto
[admin@MikroTik] > interface bridge port print
Flags: I - INACTIVE; H - HW-OFFLOAD
Columns: INTERFACE, BRIDGE, HW, PVID, PRIORITY, PATH-COST, INTERNAL-PATH-COST, HORIZON
# INTERFACE BRIDGE HW PVID PRIORITY PATH-COST INTERNAL-PATH-COST HORIZON
;;; defconf
0 ether2 bridge_PVE yes 1 0x80 10 10 none
;;; defconf
1 ether3 bridge_PVE yes 1 0x80 10 10 none
;;; defconf
2 IH ether4 bridge yes 1 0x80 10 10 none
;;; defconf
3 IH ether5 bridge yes 1 0x80 10 10 none
;;; defconf
4 IH ether6 bridge yes 1 0x80 10 10 none
;;; defconf
5 IH ether7 bridge yes 1 0x80 10 10 none
;;; defconf
6 IH ether8 bridge yes 1 0x80 10 10 none
;;; defconf
7 IH ether9 bridge yes 1 0x80 10 10 none
;;; defconf
8 IH ether10 bridge yes 1 0x80 10 10 none
;;; defconf
9 I sfp-sfpplus1 bridge yes 1 0x80 10 10 none
[admin@MikroTik] > ip address print
Flags: X - DISABLED, I - INVALID
Columns: ADDRESS, NETWORK, INTERFACE
# ADDRESS NETWORK INTERFACE
;;; defconf
0 192.168.8.1/24 192.168.8.0 bridge
;;; Main
1 x.x.x.207/26 x.x.x.192 ether1
;;; PVE
2 X 192.168.29.1/24 192.168.29.0 ether2
[admin@MikroTik] > ip route print
Flags: D - DYNAMIC; X - DISABLED, I - INACTIVE, A - ACTIVE; c - CONNECT, s - STATIC
Columns: DST-ADDRESS, GATEWAY, DISTANCE
# DST-ADDRESS GATEWAY DISTANCE
1 As 0.0.0.0/0 x.x.x.193 1
DAc x.x.x.192/26 ether1 0
DAc 192.168.8.0/24 bridge 0
DAc 192.168.29.0/24 ether2 0
[admin@MikroTik] > interface list member print
Columns: LIST, INTERFACE
# LIST INTERFACE
;;; defconf
0 LAN bridge
;;; defconf
1 WAN ether1
2 WAN vlan111
Firewall rules in both cases also doesn’t have any rules with interface specification (ether1), only WAN list. So I have no idea what’s the problem.
Loosely related to the topic, you say your 3 IP addresses are not in the same “block” - does it just mean that they are not adjacent but still within the same subnet or they come even from different subnets? If from different subnets, did the ISP give you also the gateways for the two new IPs? Because if not, they may expect your 4011 to route the traffic to them.
Yes, they are not adjacent, but in the same /26 subnet (x.x.x.207, x.x.x.233, x.x.x.240)