Hi there,
I have (basic?) questions about interface lists.
My new RB5009 comes with two interface lists: WAN and LAN.
By default, the bridge interface is the only member of the LAN list:
/interface list member
add comment=defconf interface=bridge list=LAN
The LAN list is then used in several places:
/ip firewall filter
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip neighbor discovery-settings
set discover-interface-list=LAN
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
So far so good. Now I added some VLANs, for example:
/interface vlan
add interface=bridge name=vlan-10-trusted vlan-id=10
/ip pool
add name=dhcp_pool2 ranges=10.0.10.2-10.0.10.254
/ip dhcp-server
add address-pool=dhcp_pool2 interface=vlan-10-trusted name=dhcp-10-trusted
/interface bridge port
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=ether4 pvid=10
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=ether7 pvid=10
/interface bridge vlan
add bridge=bridge tagged=ether1,bridge vlan-ids=10
/ip address
add address=10.0.10.1/24 interface=vlan-10-trusted network=10.0.10.0
/ip dhcp-server network
add address=10.0.10.0/24 gateway=10.0.10.1
As you can see, I setup a VLAN interface (vlan-10-trusted) which is a child of the bridge and I also configured a DHCP server for that network.
I then disabled the above mentioned firewall rule (just for resting):
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
The first thing I noticed is that in Winbox, neighbor discovery was not working when my PC was in my VLAN 10.
This makes sense to me because of this sentence from the docs:
Care must be taken when working with bridges and lists. Adding a bridge as a member is not the same as adding all its ports! And adding all slave ports as members is not the same as adding the bridge itself. This can particularly impact functionality of neighbor discovery.
OK, so when I added vlan-10-trusted to the LAN list, neighbor discovery was working from VLAN 10 as expected.
But let us assume, I did not add vlan-10-trusted to LAN list.
Since allowed-interface-list of the mac-winbox server was set to LAN as well, I assumed that I cannot connect using Winbox.
But it works. Why is that? ![]()
It looks a bit inconsitent to me, compared to the neighbor discovery case above.
If I enable the firewall rule again, I cannot connect via Winbox anymore from my VLAN.
The firewall rule referenced the LAN list. And since I did not add vlan-10-trusted to that list explicitly, incoming traffic from the VLAN is blocked. So this is similar to the neighbor discovery case.
But now comes the bonus question:
Let us say, I do not add vlan-10-trusted to LAN list, so the list contains just the bridge, and I keep the firewall rule as it is (blocking everything not coming via LAN … the bridge).
I would assume that DHCP traffic from the VLAN to the router is blocked just like the winbox traffic.
But it is not. All my VLAN clients successfully get an IP address from the router. Why? ![]()
Can somebody give me some insights here on what I am missing? ![]()