Private wireless office & public-access hotspot on one radio

Greetings, Mikrotik Community!

One of our clients has a private wireless office network (which includes devices such as printers, whose firmware may not support encryption). We would like to replace their consumer-grade box with a MT and retain their office functionality, while also supporting a hotspot within their establishment, using the same radio. How would we configure the MT to:

o let all the office systems connect transparently (e.g., enable MAC login for recognized MACs only);
o let all the office systems communicate with each other;
o run a hotspot on the same radio; and
o block all non-office systems from seeing/accessing the office machines and each other?

My background is in software, not networking, so I am familiar with some of the concepts, but not with a lot of the terminology in the MT 2.9 RefMan. If someone could just point me to the appropriate command areas (VLAN? policy routing?), it would save me a ton of trial-and-error (heavy on the error). Thanks!

On a related note:

I would like to designate specific machines (e.g., by MAC) to be granted access to the LAN behind our APs, to perform field maintenance wirelessly, and block all others. Where in the manual should I direct my research? Thanks in advance.

Make sure you use an AtherOS based wireless card in the MikroTik router, e.g. R52 or CM9. AtherOS based cards support Virtual Access Points, where multiple virtual APs with different SSIDs and other characteristics can be configured on one physical interface. Prism based wireless cards do not support virtual APs, although confusingly RouterOS happily allows you to configure them!

If your background is not in networking, then you’ve got a steep learning curve. You might be better off contacting a certified MikroTik consultant and get them to implement this for you.

Make sure you use an AtherOS based wireless card in the MikroTik router, e.g. R52 or CM9. AtherOS based cards support Virtual Access Points, where multiple virtual APs with different SSIDs and other characteristics can be configured on one physical interface. Prism based wireless cards do not support virtual APs, although confusingly RouterOS happily allows you to configure them!

If your background is not in networking, then you’ve got a steep learning curve. You might be better off contacting a certified MikroTik consultant and get them to implement this for you.

Thanks CMac. AFAIK we’re only using AtherOS. As for the learning curve, I am already a year into it: hands-on training while we develop our network and business. As I said, I understand the concepts, and have a pretty good idea how I would accomplish some of these things; I just don’t always know the proper names for them. For example, VLAN sounds like a likely place to solve the private business network issue, but I didn’t even know it was there until today. And I know that I want our MTs to grant access to our LAN based on MAC address, but I don’t know (yet) which command you use to do that.

VLANs are probably a step further than you need to go at present. There are other ways that are easier to implement on simple networks, e.g. Firewall rules, routing and subnets. Whilst you may feel you just want a simple bridged solution initially, it’s easier to expand a routed solution, bridged solutions don’t size well.

When creating vAPs I leave the wlanX top level config for each wireless card for WDS and then create a vAP under it for each wireless service I want to provide. I find it makes a more logical layout in Winbox config. If you’re not going to use WDS right now then just leave the interface without an SSID and “Default Authenticate” unchecked, if you then find you need WDS later it’s easy to implement it.

I have been creating 6 vAPs per router, give each vAP a different SSID:-

vap1 Private Unencrypted, SSID GBB-Private
vap2 Private WEP Encrypted, SSID GBB-Private-WEP
vap3 Private WPA/WPA2 Encrypted, SSID GBB-Private-WPA

vap4 Public Unencrypted, SSID GBB-Hoptspot
vap5 Public WEP Encrypted, SSID GBB-Hotspot-WEP
vap6 Public WPA/WPA2 Encrypted, SSID GBB-Hotspot-WPA

I then create two bridges vapprivate and vappublic, allocate ports vap1-3 to vapprivate and vap4-6 to vappublic, then allocate IP address ranges to the bridges. I generally use a 22 bit subnet, e.g. 10.0.0.0/22, reserving 10.0.0.1-10.0.0.254 for fixed IP addresses and create an IP pool of 10.0.1.1-10.0.3.254 for DHCP allocated addresses. The second subnet for the Public users would be 10.0.4.0/22, reserving 10.0.4.1 - 10.0.4.254 for fixed IPs and creating an IP pool of 10.0.5.1 - 10.0.7.254 for DHCP. Create DHCP servers for each bridge and create a Hotspot on the vappublic bridge.

For multiple Routers in a WDS cluster I just use higher subnet blocks, e.g. router2 would use 10.0.16.0/22 and 10.0.20.0/22. I allocate a 20bit subnet per router to allow for expansion on other physical interfaces, e.g. a second wireless card or multiple ethernet ports.

I then use the second octet to identify separate WDS clusters linked by a backbone network, e.g. site1 is 10.0.0.0/16, site2 is 10.1.0.0/16. This makes it much easier to implement routing and when tracing IP addresses, to easily identify where they are physically located.

Here’s some pointers to your requirements in the order you list them:-

o let all the office systems connect transparently (e.g., enable MAC login for recognized MACs only);

Add the MAC addresses for all “Allowed” users to the Wireless Access List, you need an entry for each MAC address for each vAP that you want it to be able to access. Then uncheck “Default Authenticate” for each vAP you want to protect.

o let all the office systems communicate with each other;

Personally I use routing and allocate a different subnet to each vAP or bridge if you using the example above and then use Firewall rules to determine which subnets can talk to one another, e.g. bridge vapprivate 10.0.0.0/22, bridge vappublic 10.0.4.0/22, this would give around 1,000 IP addresses per subnet. It’s better to allocate a subnet range at least twice the size you think you need, it much easier to have too many addresses than having to renumber later if you run out.

o run a hotspot on the same radio;

Configure Hotspot on second virtual AP.

o block all non-office systems from seeing/accessing the office machines and each other?

To stop wireless users seeing each other, uncheck the “Default Forward” parameter in the Wireless tab of the vAP’s config.
Implement Firewall rules, this stops Public users seeing Private systems.

Regards

Chris Macneill
Glenkens Broadband Ltd. - Bringing Wireless Broadband to the Glens of South West Scotland.

Wow: this is exactly what I needed–and in more detail than I had hoped for! I would have spent months reading through the reference manual, without coming up with the right combination of features to do what I’m trying to do. With this, I can look forward to a few weeks of real progress instead.

Thanks much, Chris. Cheers!