I agree that something like EoIP-over-IPsec would be the most secure setup if you really want to run corporate
and external users over one shared infrastructure and need to maintain intra-site Layer 2 connectivity.
What I understand from sorvar’s description of his network there is actually no encryption on the wired (Ethernet)
links in his current setup, just plain 802.1q VLAN trunks. Encryption only happens on the wireless parts of the
network, but the wired links connecting the wireless clouds to each other are not secure?
If you want to keep using this design, it is possible with RouterOS.
You’d have to setup virtual access points (one per SSID, with encryption as needed) and VLAN interfaces on the
ethernet (wired) links, then you can create bridges (one per VLAN/SSID) to bind the virtual accesspoints to
their corresponding ethernet VLANs.
Here are some configuration fragments for a setup using two VLANs (70 and 71).
First, the VLAN interfaces on the ethernet side.
/ interface vlan
add name="ether1-vlan70" mtu=1500 arp=disabled vlan-id=70 interface=ether1 \
comment="" disabled=no
add name="ether1-vlan71" mtu=1500 arp=disabled vlan-id=71 interface=ether1 \
comment="" disabled=no
(Physical interface ether1 is the 802.1q trunk).
Now the virtual access points, defined on top of the physical interface wlan1
/ interface wireless
add name="wlan1-vlan70" mtu=1500 mac-address=02:90:4B:DC:06:96 arp=disabled \
disable-running-check=no master-interface=wlan1 ssid="wlan1-vlan70" area="" \
max-station-count=2007 wds-mode=disabled wds-default-bridge=none \
wds-default-cost=100 wds-cost-range=50-150 wds-ignore-ssid=no \
default-authentication=yes default-forwarding=no default-ap-tx-limit=0 \
default-client-tx-limit=0 hide-ssid=no security-profile=default comment="" \
disabled=no
add name="wlan1-vlan71" mtu=1500 mac-address=02:90:4B:DC:06:97 arp=disabled \
disable-running-check=no master-interface=wlan1 ssid="wlan1-vlan71" area="" \
max-station-count=2007 wds-mode=disabled wds-default-bridge=none \
wds-default-cost=100 wds-cost-range=50-150 wds-ignore-ssid=no \
default-authentication=yes default-forwarding=no default-ap-tx-limit=0 \
default-client-tx-limit=0 hide-ssid=no security-profile=default comment="" \
disabled=no
and finally the bridges
/ interface bridge
add name="bridge70" mtu=1500 arp=enabled stp=no priority=32768 ageing-time=5m \
forward-delay=15s garbage-collection-interval=4s hello-time=2s \
max-message-age=20s comment="" disabled=no
add name="bridge71" mtu=1500 arp=enabled stp=no priority=32768 ageing-time=5m \
forward-delay=15s garbage-collection-interval=4s hello-time=2s \
max-message-age=20s comment="" disabled=no
/ interface bridge port
add interface=ether1-vlan70 bridge=bridge70 priority=128 path-cost=10 \
comment="" disabled=no
add interface=wlan1-vlan70 bridge=bridge70 priority=128 path-cost=10 comment="" \
disabled=no
add interface=ether1-vlan71 bridge=bridge71 priority=128 path-cost=10 \
comment="" disabled=no
add interface=wlan1-vlan71 bridge=bridge71 priority=128 path-cost=10 comment="" \
disabled=no
If you need IP addresses on top of that, put them on the bridge interfaces.
–Tom