Alright, we’re close! Traffic is now routing as expected across the VLAN’s. However, all of my VLANs are available from all of the ports – VLANs 1, 16, 24, and 48 all appear on ether2, ether3, ether4, and ether5. Additionally, the PVID is not being honored (ether5 should be PVID 24, and this should be the only VLAN on that port).
jun/04/2019 18:32:29 by RouterOS 6.44
software id = MD3Y-99MM
model = 960PGS
serial number = AD8B0991DD63
/interface bridge
add admin-mac=B8:69:F4:B6:7D:6F auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] poe-out=off
set [ find default-name=ether3 ] poe-out=off
set [ find default-name=ether4 ] poe-out=off
set [ find default-name=ether5 ] poe-out=off
/interface vlan
add comment=“VLAN 16 - Guest access” interface=bridge name=vlan16 vlan-id=16
add comment=“VLAN 24 - Wireless devices” interface=bridge name=vlan24
vlan-id=24
add comment=“VLAN 48 - Experimental use” interface=bridge name=vlan48
vlan-id=48
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add comment=“All VLAN interfaces” name=all_vlan
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add comment=“VLAN 1 - Default” name=vlan1_pool ranges=
10.242.1.50-10.242.1.250
add comment=“VLAN 16 - Guest access” name=vlan16_pool ranges=
10.242.16.50-10.242.16.250
add comment=“VLAN 24 - Wireless devices” name=vlan24_pool ranges=
10.242.24.50-10.242.24.250
add comment=“VLAN 48 - Experimental use” name=vlan48_pool ranges=
10.242.48.50-10.242.48.250
/ip dhcp-server
add address-pool=vlan1_pool disabled=no interface=bridge name=vlan1_dhcp
add address-pool=vlan16_pool disabled=no interface=vlan16 name=vlan16_dhcp
add address-pool=vlan24_pool disabled=no interface=vlan24 name=vlan24_dhcp
add address-pool=vlan48_pool disabled=no interface=vlan48 name=vlan48_dhcp
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5 pvid=24
add bridge=bridge comment=defconf interface=sfp1
/interface bridge settings
set allow-fast-path=no
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=bridge comment=“VLAN 1 - Default” tagged=bridge untagged=
ether2,ether3,ether4 vlan-ids=1
add bridge=bridge comment=“VLAN 16 - Guest access” tagged=
ether2,ether3,ether4,bridge vlan-ids=16
add bridge=bridge comment=“VLAN 24 - Wireless devices” tagged=bridge
untagged=ether5 vlan-ids=24
add bridge=bridge comment=“VLAN 48 - Experimental use” tagged=
ether2,ether3,ether4,bridge vlan-ids=48
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add comment=“Include VLAN 16 in all_vlan” interface=vlan16 list=all_vlan
add comment=“Include VLAN 24 in all_vlan” interface=vlan24 list=all_vlan
add comment=“Include VLAN 48 in all_vlan” interface=vlan48 list=all_vlan
/ip address
add address=10.242.1.1/24 comment=“VLAN 1 - Default” interface=bridge
network=10.242.1.0
add address=10.242.16.1/24 comment=“VLAN 16 - Guest access” interface=vlan16
network=10.242.16.0
add address=10.242.24.1/24 comment=“VLAN 24 - Wireless devices” interface=
vlan24 network=10.242.24.0
add address=10.242.48.1/24 comment=“VLAN 48 - Experimental use” interface=
vlan48 network=10.242.48.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=
ether1 use-peer-dns=no
/ip dhcp-server network
add address=10.242.1.0/24 comment=“VLAN 1 - Default” dns-server=
8.8.4.4,8.8.8.8,10.242.1.1 gateway=10.242.1.1 netmask=24
add address=10.242.16.0/24 comment=“VLAN 16 - Guest access” dns-server=
8.8.4.4,8.8.8.8,10.242.16.1 gateway=10.242.16.1 netmask=24
add address=10.242.24.0/24 comment=“VLAN 24 - Wireless devices” dns-server=
8.8.4.4,8.8.8.8,10.242.24.1 gateway=10.242.24.1 netmask=24
add address=10.242.48.0/24 comment=“VLAN 48 - Experimental use” dns-server=
8.8.4.4,8.8.8.8,10.242.48.1 gateway=10.242.48.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.4.4,8.8.8.8
/ip firewall filter
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=
“Accept DHCP requests on VLAN interfaces” dst-port=67 in-interface-list=
all_vlan protocol=udp src-port=68
add action=accept chain=input comment=
“Accept DNS requests (UDP) from VLAN interfaces” dst-port=53
in-interface-list=all_vlan protocol=udp
add action=accept chain=input comment=
“Accept DNS requests (TCP) from VLAN interfaces” dst-port=53
in-interface-list=all_vlan protocol=tcp
add action=drop chain=input comment=“defconf: drop all not coming from LAN”
in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid”
connection-state=invalid
add action=drop chain=forward comment=
“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat
connection-state=new in-interface-list=WAN
add action=accept chain=input comment=“Allow VLAN” in-interface-list=all_vlan
add action=drop chain=forward comment=“Block Internet access from VLAN 48”
in-interface=vlan48 out-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade”
ipsec-policy=out,none out-interface-list=WAN
/system clock
set time-zone-name=America/New_York
/system identity
set name=RFRCMDHAVA02
/system ntp client
set enabled=yes primary-ntp=132.163.97.5 secondary-ntp=132.163.96.5
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN