You don’t need to create a DHCP client manually or bridges.
You need to create the APN profile and set it to the interface. If all is correct you will see a “R” letter on your LTE interface that means that is running.
After this you need to create a DHCP server on your ether1 interface using DHCP setup and masquerade the traffic on IP → Firewall → NAT.
Before all this I recommend reset configuration deleting default configuration.
Or, better yet (if using firewall rules resembling default rules from recent ROS versions) add lte1 interface to WAN interface list. It’ll magically make RB to use all the right firewall rules.
Does internet work on RBM11G itself? You can check it by executing
/ping www.google.com
If this works, then it’s something about LAN setup (either IP settings on router, DHCP settings or firewall rules). If it doesn’t, then it’s something about LTE and/or WAN setup.
Post full configuration of RBM11G … you can get it by executing command /export hide-sensitive in a command window. Hide sensitive data (such as usernames and passwords) and then post it here, enclosing it in [__code][/code] environment for better readability..
/interface print detail
/ip dhcp-client print detail # obfuscate any public data
/ip address print detail # you might want to obfuscate public WAN address here
/ip route print detail # obfuscate the public route
Just try to obfuscate public data following the same pattern, e.g. replace first two octets with some letters (e.g. 8.8.8.8 → aa.bb.8.8 ) and do it the same way for output of all commands so we can clearly see any patterns.
Hmm… the /ip dhcp-server network seems flakey … I’d say you should add dns-servers=8.8.8.8,1.1.1.1 to it so that LAN devices get information about DNS servers to be used for resolving names to IP addresses. You might want to repkace tge IP addresses in my example with IP addresses of your ISP (some forum members feel strongly against it though).
BTW, you’ll have to something about non-existant firewall, right now your RB is easy target for any malicious internet user. Does /system default-configuration print show any useful commands in /ip firewall filter section? If it does, I suggest you to copy-paste them back to command window.
[admin@MikroTik] /ip firewall filter>> /interface print detail
Flags: D - dynamic, X - disabled, R - running, S - slave
0 R name=“ether1” default-name=“ether1” type=“ether” mtu=1500 actual-mtu=1500 l2mtu=1596 max-l2mtu=2026 mac-address=74:4D:28:45:6A:10 last-link-up-time=aug/26/2019 21:39:41 link-downs=0
1 R name=“lte1” type=“lte” mtu=1480 actual-mtu=1480 mac-address=AC:FF:FF:00:00:00 last-link-up-time=aug/26/2019 21:40:20 link-downs=0
IP address print detail
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf
address=192.168.88.1/24 network=192.168.88.0 interface=ether1 actual-interface=ether1
1 D address=aa.bb.92.242/32 network=aa.bb.92.242 interface=lte1 actual-interface=lte1
[admin@MikroTik] /ip firewall filter>> /ip dhcp-client print detail
Flags: X - disabled, I - invalid, D - dynamic
[admin@MikroTik] /ip firewall filter>>
[admin@MikroTik] /ip firewall filter>> /ip route print detail
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=lte1 gateway-status=lte1 reachable distance=2 scope=30 target-scope=10