I have a RB5009 router where the SFP is my WAN (internet service provider) and all other ports are bridged. Ethernet port 1 has a wireless AP and has a single Guest SSID with VLAN ID of 30. I have not extended other SSIDs with different VLANs yet. I’ve gone through the guide below (WAN yellow, all other ports purple). I also watched the youtube video which follows several of the steps in the guide. The rest of the devices on the RB5009 are on the ‘main’ network without a separate vlan assigned. Once I get the guest vlan working, I’ll add another one for IOT devices on a separate SSID from the wireless AP.
http://forum.mikrotik.com/t/using-routeros-to-vlan-your-network/126489/1
One of last steps in the guide is to enable vlan filtering on the bridge. If the vlan filtering is disabled, the guest vlan (192.168.30.x/24) is able to access the internet and is also isolated from the rest of the devices on the network (192.168.0.x/24). When I enable vlan filtering, the guest device loses internet access. I’m trying to understand why this is occurring. Maybe I do not understand the vlan-filtering feature but I thought this lets the switch chip perform the work instead of the cpu. The DNS is setup to go through the main router for all devices and vlans. I’ve included a copy of my config below:
# 2024-08-04 11:30:40 by RouterOS 7.13
# software id = XXXX
#
# model = RB5009UPr+S+
# serial number = XXXX
/interface bridge
add name=local
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface vlan
add comment="GUEST VLAN" interface=local name=GUEST_VLAN_30 vlan-id=30
/interface list
add name=WAN
add name=LAN
add name=VLAN
/ip pool
add name=dhcp_pool0 ranges=192.168.0.100-192.168.0.254
add name=GUEST_POOL ranges=192.168.30.50-192.168.30.254
add name=dhcp_pool4 ranges=192.168.30.2-192.168.30.200
/ip dhcp-server
add address-pool=dhcp_pool0 interface=local lease-time=1d name=dhcp1
add address-pool=dhcp_pool4 interface=GUEST_VLAN_30 lease-time=23h59m name=\
dhcp2
/interface bridge port
add bridge=local interface=ether1
add bridge=local interface=ether2
add bridge=local interface=ether3
add bridge=local interface=ether4
add bridge=local interface=ether5
add bridge=local interface=ether6
add bridge=local interface=ether7
add bridge=local interface=ether8
/interface bridge vlan
add bridge=local tagged=local vlan-ids=30
/interface list member
add interface=sfp-sfpplus1 list=WAN
add interface=local list=LAN
add interface=wireguard1 list=LAN
add interface=GUEST_VLAN_30 list=VLAN
/interface wireguard peers
add allowed-address=192.168.100.2/32 comment=laptop interface=wireguard1 \
public-key="XXXXXXXXX"
add allowed-address=192.168.100.3/32 comment=phone interface=wireguard1 \
public-key="XXXXXXX"
/ip address
add address=192.168.0.1/24 interface=local network=192.168.0.0
add address=192.168.100.1/24 interface=wireguard1 network=192.168.100.0
add address=192.168.30.1/24 comment=GUEST_VLAN_IP interface=GUEST_VLAN_30 \
network=192.168.30.0
/ip dhcp-client
add interface=sfp-sfpplus1
/ip dhcp-server network
add address=192.168.0.0/24 dns-server=192.168.0.1,8.8.8.8 gateway=192.168.0.1
add address=192.168.30.0/24 dns-server=192.168.0.1 gateway=192.168.30.1
/ip dns
set allow-remote-requests=yes
/ip firewall filter
add action=accept chain=input comment="accept established,related" \
connection-state=established,related
add action=accept chain=input comment="Allow VLAN" in-interface-list=VLAN
add action=drop chain=input connection-state=invalid
add action=accept chain=input comment="allow ICMP" in-interface=sfp-sfpplus1 \
protocol=icmp
add action=accept chain=input comment="WG handshake" dst-port=13231 log=yes \
log-prefix="Wireguard handshake: " protocol=udp
add action=accept chain=input in-interface-list=LAN
add action=drop chain=input comment="drop everything else from WAN port" \
in-interface=sfp-sfpplus1
add action=fasttrack-connection chain=forward comment="defconf: fasttrace" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established, related" connection-state=\
established,related
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid log=yes log-prefix="drop invalid: "
add action=accept chain=forward comment="GUEST VLAN Internet Access Only" \
connection-state=new in-interface-list=VLAN out-interface-list=WAN
add action=accept chain=forward comment="internet traffic from LAN to WAN" \
in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment="Wireguard to LAN" in-interface=\
wireguard1 log=yes log-prefix="Wireguard Forward: " out-interface-list=\
LAN
add action=drop chain=forward comment="drop all else" log=yes log-prefix=\
"forward drop all: "
/ip firewall nat
add action=masquerade chain=srcnat out-interface=sfp-sfpplus1
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.0.0/24,192.168.100.0/24
set ssh disabled=yes
set api disabled=yes
set winbox address=192.168.0.0/24
set api-ssl disabled=yes
/ip ssh
set strong-crypto=yes
/system clock
set time-zone-name=America/Chicago
/system note
set show-at-login=no
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=none