Thanks to @pcunite and @mkx - for the help in an earlier post. I was attempting to setup a home network with a CRS125 series, but, decided to switch to the above hardware.
It appears I have all of my hard wired vlans working (and of course now I need a diagram).
First things first - I’ll list out my vlans and what I’m trying to do.
VLANS (note that I’m using smaller networks because its a home and I figure I’ll never need more than 30-60 addresses per vlan)
vlan10 - Home/Work - ether2 - access port - 10.1.10.0/27 - (Needs WiFi through CAP AC)
vlan20 - Gaming - ether3 - access port - 10.1.20.0/27
vlan30 - Servers - ether4 - access port - 10.1.30.0/27
vlan40 - IOT (Internet of Things) - ether6, ether7 - access port - 10.1.40.0/26 (Needs WiFi through CAP AC)
vlan50 - Guest WiFi - ether10 with connected cap AC - 10.1.50.0/27 (Needs WiFi through CAP AC)
vlan60 - Printers - ether8 - 10.1.60.0/27 (Needs WiFi through CAP AC)
vlan100 - Management vlan for network gear - ether5 - 10.1.100.0/27 (don’t ask me why I chose port 5… didn’t feel like redoing everything)
All of my wired ports seem to be working ok. I don’t have any inter-vlan routing setup, which I may need for certain devices.
I’ll post my current config here:
Interface
/interface bridge
add name=bridge-p2-10 protocol-mode=none vlan-filtering=yes
/interface vlan
add interface=bridge-p2-10 name=GAMING vlan-id=20
add interface=bridge-p2-10 name=HOME_WORK vlan-id=10
add interface=bridge-p2-10 name=IOT vlan-id=40
add interface=bridge-p2-10 name=MGMT_VLAN vlan-id=100
add interface=bridge-p2-10 name=PRINTERS vlan-id=60
add interface=bridge-p2-10 name=SERVERS vlan-id=30
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add name=WAN
add name=MGMT
add name=VLANS
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge port
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether2 pvid=10
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether3 pvid=20
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether4 pvid=30
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether6 pvid=40
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether7 pvid=40
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether8 pvid=60
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether10
add bridge=bridge-p2-10 frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ether5 pvid=100
/interface bridge vlan
add bridge=bridge-p2-10 tagged=bridge-p2-10 untagged=ether4 vlan-ids=30
add bridge=bridge-p2-10 tagged=bridge-p2-10,ether10 untagged=ether6,ether7 vlan-ids=40
add bridge=bridge-p2-10 tagged=bridge-p2-10,ether10 untagged=ether8 vlan-ids=60
add bridge=bridge-p2-10 tagged=bridge-p2-10,ether10 untagged=ether2 vlan-ids=10
add bridge=bridge-p2-10 tagged=bridge-p2-10 untagged=ether3 vlan-ids=20
add bridge=bridge-p2-10 tagged=bridge-p2-10,ether10 vlan-ids=50
add bridge=bridge-p2-10 tagged=bridge-p2-10,ether10 untagged=ether5 vlan-ids=100
/interface list member
add interface=ether1 list=WAN
add interface=MGMT_VLAN list=MGMT
add interface=HOME_WORK list=VLANS
add interface=GAMING list=VLANS
add interface=SERVERS list=VLANS
add interface=IOT list=VLANS
add interface=PRINTERS list=VLANS
IP
/ip pool
add name=HOME_WORK_POOL ranges=10.1.10.2-10.1.10.30
add name=GAMING_POOL ranges=10.1.20.2-10.1.20.30
add name=SERVERS_POOL ranges=10.1.30.2-10.1.30.30
add name=IOT_POOL ranges=10.1.40.2-10.1.40.62
add name=PRINTERS_POOL ranges=10.1.60.2-10.1.60.30
add name=MGMT_POOL ranges=10.1.100.2-10.1.100.30
/ip dhcp-server
add address-pool=HOME_WORK_POOL disabled=no interface=HOME_WORK name=HOME_WORK_DHCP
add address-pool=GAMING_POOL disabled=no interface=GAMING name=GAMING_DHCP
add address-pool=SERVERS_POOL disabled=no interface=SERVERS name=SERVERS_DHCP
add address-pool=IOT_POOL disabled=no interface=IOT name=IOT_DHCP
add address-pool=PRINTERS_POOL disabled=no interface=PRINTERS name=PRINTERS_DHCP
add address-pool=MGMT_POOL disabled=no interface=MGMT_VLAN name=MGMT_DHCP
/ip address
add address=10.1.100.1/27 interface=MGMT_VLAN network=10.1.100.0
add address=10.1.10.1/27 interface=HOME_WORK network=10.1.10.0
add address=10.1.20.1/27 interface=GAMING network=10.1.20.0
add address=10.1.30.1/27 interface=SERVERS network=10.1.30.0
add address=10.1.40.1/26 interface=IOT network=10.1.40.0
add address=10.1.60.1/27 interface=PRINTERS network=10.1.60.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dhcp-server network
add address=10.1.10.0/27 dns-server=10.1.100.1 gateway=10.1.10.1
add address=10.1.20.0/27 dns-server=10.1.100.1 gateway=10.1.20.1
add address=10.1.30.0/27 dns-server=10.1.100.1 gateway=10.1.30.1
add address=10.1.40.0/26 dns-server=10.1.100.1 gateway=10.1.40.1
add address=10.1.60.0/27 dns-server=10.1.100.1 gateway=10.1.60.1
add address=10.1.100.0/27 dns-server=10.1.100.1 gateway=10.1.100.1
/ip dns
set allow-remote-requests=yes
/ip firewall address-list
add address=10.1.10.0/27 list=HOME_WORK_VLAN
add address=10.1.20.0/27 list=GAMING_VLAN
add address=10.1.30.0/27 list=SERVERS_VLAN
add address=10.1.40.0/26 list=IOT_VLAN
add address=10.1.50.0/27 list=GUEST_WIFI_VLAN
add address=10.1.60.0/27 list=PRINTERS_VLAN
add address=10.1.100.0/27 list=MGMT_VLAN
/ip neighbor discovery-settings
set discover-interface-list=MGMT
/ip firewall filter
add action=drop chain=input comment=“Rule 1 Input Chain Drop Invalid #LMB” connection-state=invalid
add action=drop chain=forward comment=“Rule 2 Forward Chain Drop Invalid #LMB” connection-state=invalid
add action=accept chain=input comment=“Rule 3 Modified for interface list #LMB” in-interface-list=MGMT
add action=accept chain=input comment=“Related to Rule 3 Accept internal vlans for dns input chain” in-interface-list=VLANS
add action=accept chain=input comment=“Rule 4 Input Chain Accept established #LMB” connection-state=established
add action=drop chain=input comment=“Rule 5 Drop all others to router #LMB”
add action=accept chain=forward comment=“Rule 6 Modified allow new connections from all VLANS #LMB” connection-state=new in-interface-list=VLANS out-interface-list=WAN
add action=accept chain=forward comment=“Rule 7 Forward Chain Allow related connections through router #LMB” connection-state=related
add action=accept chain=forward comment=“Rule 8 Forward Chain Allow established connections through router #LMB” connection-state=established
add action=drop chain=forward comment=“Rule 9 Drop all other connections through router”
/ip firewall nat
add action=masquerade chain=srcnat comment=“Masq for internet wan port ether 1” out-interface-list=WAN
Now for my questions:
So now I’m confused what to do with the CAP AC?
(Technically, I would like to have wifi on vlans 10, 40, 50, and 60 (probably with all seperate SSID’s)
Do I need CAPSMan?
(I can’t see myself ever having more than one CAP AC for the next few years- although one day I may have more.)
Do I need get rid of the default vlan of 0 on interface ethernet switch port? If so, what do I set it to?