To frequent request, my config:
# apr/10/2022 15:45:21 by RouterOS 7.2
# software id = ZU1X-J0KM
#
# model = RB5009UG+S+
/interface bridge
add name=bridge1 vlan-filtering=yes
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether8 keepalive-timeout=\
disabled name=pppoe-wan service-name=XXX user=XXX
/interface eoip
add allow-fast-path=no !keepalive mac-address=00:00:00:00:00:00 name=\
eoip-001 remote-address=192.168.255.101 tunnel-id=42
add !keepalive mac-address=00:00:00:00:00:00 name=eoip-map01 remote-address=\
10.31.0.8 tunnel-id=4711
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface vlan
add interface=bridge1 name=vlan_31 vlan-id=31
add interface=bridge1 name=vlan_32 vlan-id=32
add interface=bridge1 name=vlan_33 vlan-id=33
add interface=bridge1 name=vlan_34 vlan-id=34
add interface=bridge1 name=vlan_35 vlan-id=35
/caps-man datapath
add bridge=bridge1 client-to-client-forwarding=yes local-forwarding=yes name=\
datapath-31 vlan-id=31 vlan-mode=use-tag
add bridge=bridge1 client-to-client-forwarding=no local-forwarding=yes name=\
datapath-32 vlan-id=32 vlan-mode=use-tag
add bridge=bridge1 client-to-client-forwarding=no local-forwarding=yes name=\
datapath-34 vlan-id=34 vlan-mode=use-tag
add bridge=bridge1 client-to-client-forwarding=yes local-forwarding=yes name=\
datapath-35 vlan-id=35 vlan-mode=use-tag
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=wpa2-psk-aes
/caps-man configuration
add country=germany datapath=datapath-31 multicast-helper=full name=\
wlan_trusted security=wpa2-psk-aes ssid=XXX
add country=germany datapath=datapath-32 multicast-helper=full name=\
wlan_untrusted security=wpa2-psk-aes ssid=XXX
add country=germany datapath=datapath-34 multicast-helper=full name=\
wlan_guest security=wpa2-psk-aes ssid=XXX
add country=germany datapath=datapath-35 multicast-helper=full name=\
wlan_smarthome security=wpa2-psk-aes ssid=XXX
/caps-man interface
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=ac-cap01-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=ac-cap01-1 name=ac-cap01-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=ac-hap01-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=ac-hap01-1 name=ac-hap01-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=ac-hap02-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=ac-hap02-1 name=ac-hap02-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=ac-hap03-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=ac-hap03-1 name=ac-hap03-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=gn-cap01-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-cap01-1 name=gn-cap01-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_guest disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-cap01-1 name=gn-cap01-1-2 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_smarthome disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-cap01-1 name=gn-cap01-1-3 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=gn-hap01-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap01-1 name=gn-hap01-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_guest disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap01-1 name=gn-hap01-1-2 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_smarthome disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap01-1 name=gn-hap01-1-3 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=gn-hap02-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap02-1 name=gn-hap02-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_guest disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap02-1 name=gn-hap02-1-2 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_smarthome disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap02-1 name=gn-hap02-1-3 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_trusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=none name=gn-hap03-1 radio-mac=\
00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_untrusted disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap03-1 name=gn-hap03-1-1 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_guest disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap03-1 name=gn-hap03-1-2 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
add configuration=wlan_smarthome disabled=no l2mtu=1600 mac-address=\
00:00:00:00:00:00 master-interface=gn-hap03-1 name=gn-hap03-1-3 \
radio-mac=00:00:00:00:00:00 radio-name=000000000000
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=pool_31 ranges=10.31.0.100-10.31.0.254
add name=pool_32 ranges=10.32.0.100-10.32.0.254
add name=pool_33 ranges=10.33.0.100-10.33.0.254
add name=pool_34 ranges=10.34.0.100-10.34.0.254
add name=pool_35 ranges=10.35.0.100-10.35.0.254
add name=pool_test ranges=192.168.10.100-192.168.10.200
/ip dhcp-server
add address-pool=pool_31 interface=vlan_31 lease-time=1d name=dhcp_31
add address-pool=pool_32 interface=vlan_32 lease-time=1d name=dhcp_32
add address-pool=pool_33 interface=vlan_33 lease-time=1d name=dhcp_33
add address-pool=pool_34 interface=vlan_34 lease-time=6h name=dhcp_34
add address-pool=pool_35 interface=vlan_35 lease-time=1d name=dhcp_35
add address-pool=pool_test bootp-support=none interface=ether5 lease-time=5m \
name=testserver
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes
/caps-man provisioning
add action=create-enabled hw-supported-modes=gn master-configuration=\
wlan_trusted name-format=prefix-identity name-prefix=gn \
slave-configurations=wlan_untrusted,wlan_guest,wlan_smarthome
add action=create-enabled hw-supported-modes=ac master-configuration=\
wlan_trusted name-format=prefix-identity name-prefix=ac \
slave-configurations=wlan_untrusted
/interface bridge port
add bridge=bridge1 comment="trunk port: main switch" interface=ether2 pvid=31
add bridge=bridge1 comment="trunk port" interface=ether3 pvid=31
add bridge=bridge1 comment="VLAN 32: Pi-Hole" interface=ether4 pvid=32
add bridge=bridge1 comment="trunk port: hap03" interface=ether7
add bridge=bridge1 interface=eoip-001 pvid=31
add bridge=bridge1 comment="VLAN 31 untagged" interface=ether6 pvid=31
add bridge=bridge1 comment="VLAN 32 for EoIP to map01" interface=eoip-map01 \
pvid=32
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,ether3,ether2,ether7,eoip-001 \
vlan-ids=31
add bridge=bridge1 tagged=bridge1,ether3,ether2,ether7,eoip-001 \
vlan-ids=32
add bridge=bridge1 tagged=bridge1,ether3,ether2,ether7,eoip-001 \
vlan-ids=33
add bridge=bridge1 tagged=bridge1,ether3,ether2,ether7,eoip-001 \
vlan-ids=34
add bridge=bridge1 tagged=bridge1,ether3,ether2,ether7,eoip-001 \
vlan-ids=35
/interface ovpn-server server
set auth=sha1,md5
/interface wireguard peers
add allowed-address=10.39.0.2/32 comment="iPhone" interface=\
wireguard1 public-key="XXX"
/ip address
add address=10.31.0.1/24 interface=vlan_31 network=10.31.0.0
add address=10.32.0.1/24 interface=vlan_32 network=10.32.0.0
add address=10.33.0.1/24 interface=vlan_33 network=10.33.0.0
add address=192.168.30.1/24 interface=ether8 network=192.168.30.0
add address=10.34.0.1/24 interface=vlan_34 network=10.34.0.0
add address=10.35.0.1/24 interface=vlan_35 network=10.35.0.0
add address=192.168.255.100/24 interface=ether1 network=192.168.255.0
add address=10.39.0.1/24 interface=wireguard1 network=10.39.0.0
add address=192.168.10.1/24 interface=ether5 network=192.168.10.0
/ip dhcp-server lease
...
/ip dhcp-server network
add address=10.31.0.0/24 dns-server=10.32.0.2 domain=trusted.local gateway=\
10.31.0.1 netmask=24 ntp-server=10.31.0.1
add address=10.32.0.0/24 dns-server=10.32.0.2 domain=untrusted.local gateway=\
10.32.0.1 ntp-server=10.32.0.1
add address=10.33.0.0/24 dns-server=10.32.0.2 domain=phone.local gateway=\
10.33.0.1 ntp-server=10.33.0.1
add address=10.34.0.0/24 dns-server=10.32.0.2 domain=guest.local gateway=\
10.34.0.1 ntp-server=10.34.0.1
add address=10.35.0.0/24 dns-server=10.32.0.2 domain=smarthome.local gateway=\
10.35.0.1 ntp-server=10.35.0.1
add address=192.168.10.0/24 dns-server=8.8.8.8 domain=test.local gateway=\
192.168.10.1 ntp-server=192.168.10.1
/ip dns
set servers=10.32.0.2
/ip firewall filter
add action=accept chain=input protocol=icmp
add action=drop chain=input comment="drop invalid input packets" \
connection-state=invalid
add action=drop chain=input comment="drop input packets with TCP urgent flag" \
protocol=tcp tcp-flags=urg
add action=accept chain=input comment="allow all input from trusted VLAN 31" \
in-interface=vlan_31
add action=accept chain=input comment=\
"allow input from ether 5 (testing interface)" in-interface=ether5
add action=accept chain=input comment="allow all input from WireGuard" \
in-interface=wireguard1
add action=accept chain=input comment="DHCP, NTP for all but external" \
dst-port=67,68,123 in-interface=!pppoe-wan protocol=udp
add action=accept chain=input comment=\
"allow input for established and related" connection-state=\
established,related
add action=accept chain=input comment="allow UDP WireGuard" dst-port=13231 \
protocol=udp
add action=drop chain=input comment="final DROP rule on input" log-prefix=\
DROP_IN
add action=drop chain=forward comment="drop invalid forward packets" \
connection-state=invalid
add action=drop chain=forward comment=\
"drop forward packets with TCP urgent flag" protocol=tcp tcp-flags=urg
add action=accept chain=forward comment="forward established and related" \
connection-state=established,related
add action=accept chain=forward comment=\
"forward to everywhere from trusted VLAN 31" in-interface=vlan_31
add action=accept chain=forward comment=\
"allow forwarding on ether 5 to everywhere (for testing)" in-interface=\
ether5
add action=accept chain=forward comment=\
"forward to everywhere from WireGuard" in-interface=wireguard1
add action=accept chain=forward comment=\
"forward TCP DNS requests to Pi-Hole as long as not coming via WAN" \
dst-address=10.32.0.2 dst-port=53 in-interface=!pppoe-wan protocol=tcp
add action=accept chain=forward comment=\
"forward UDP DNS requests to Pi-Hole as long as not coming via WAN" \
dst-address=10.32.0.2 dst-port=53 in-interface=!pppoe-wan protocol=udp
add action=accept chain=forward comment="allow internet from VLAN 33 (phone)" \
out-interface=pppoe-wan src-address=10.33.0.0/24
add action=accept chain=forward comment="allow internet for VLAN 34 (guests)" \
out-interface=pppoe-wan src-address=10.34.0.0/24
add action=accept chain=forward comment="allow internet for Home Assistant" \
out-interface=pppoe-wan src-address=10.35.0.2
add action=accept chain=forward comment="allow SNMP for Home Assistant" \
dst-port=161,162 protocol=udp src-address=10.35.0.2
add action=accept chain=forward comment="allow syslog to praios" dst-address=\
10.31.0.10 dst-port=514 in-interface=!pppoe-wan protocol=udp
add action=accept chain=forward comment=\
"allow homeassistant to modem (for SNMP queries)" out-interface=ether8 \
src-address=10.35.0.2
add action=accept chain=forward comment=\
"forward Home Assistant to untrusted LAN" dst-address=10.32.0.0/24 \
dst-port="" src-address=10.35.0.2
add action=jump chain=forward comment=\
"apply specific rules for outbound WAN from untrusted VLAN 32" \
in-interface=vlan_32 jump-target=forward_untrusted out-interface=\
pppoe-wan
add action=drop chain=forward comment="final DROP rule on forward" \
log-prefix=DROP_FWD
add action=accept chain=forward_untrusted comment=\
"allow internet for Pi-Hole" src-address=10.32.0.2
add action=accept chain=forward_untrusted comment=\
"allow internet for internet radio" src-mac-address=\
00:00:00:00:00:00
add action=accept chain=forward_untrusted comment=\
"Amazon Fire TV Stick" src-mac-address=00:00:00:00:00:00
add action=drop chain=forward_untrusted comment=\
"final DROP rule on forward_untrusted" log-prefix=DROP_32_WAN
/ip firewall mangle
add action=change-mss chain=forward comment="workaround for MTU issues (https:\
//forum.mikrotik.com/viewtopic.php\?t=127108#p625671)" new-mss=\
clamp-to-pmtu passthrough=yes protocol=tcp tcp-flags=syn
/ip firewall nat
add action=masquerade chain=srcnat comment="masquerade VLAN 31 (trusted)" \
out-interface=pppoe-wan src-address=10.31.0.0/24
add action=masquerade chain=srcnat comment="masquerade VLAN 32 (untrusted)" \
out-interface=pppoe-wan src-address=10.32.0.0/24
add action=masquerade chain=srcnat comment="masquerade VLAN 33 (phone)" \
out-interface=pppoe-wan src-address=10.33.0.0/24
add action=masquerade chain=srcnat comment="masquerade VLAN 34 (guest)" \
out-interface=pppoe-wan src-address=10.34.0.0/24
add action=masquerade chain=srcnat comment="masquerade VLAN 35 (smarthome)" \
out-interface=pppoe-wan src-address=10.35.0.0/24
add action=masquerade chain=srcnat comment="masquerade WireGuard clients" \
out-interface=pppoe-wan src-address=10.39.0.0/24
add action=masquerade chain=srcnat comment=\
"masquerade testing interface ether5" out-interface=pppoe-wan \
src-address=192.168.10.0/24
add action=dst-nat chain=dstnat comment="redirect TCP DNS over Pi-Hole" \
dst-address=!10.32.0.2 dst-port=53 in-interface=!pppoe-wan protocol=tcp \
src-address=!10.32.0.2 to-addresses=10.32.0.2
add action=dst-nat chain=dstnat comment="redirect UDP DNS over Pi-Hole" \
dst-address=!10.32.0.2 dst-port=53 in-interface=!pppoe-wan protocol=udp \
src-address=!10.32.0.2 to-addresses=10.32.0.2
/ip ssh
set always-allow-password-login=yes
/snmp
set enabled=yes
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=router
/system ntp client
set enabled=yes
/system ntp server
set broadcast=yes broadcast-addresses=\
10.31.0.255,10.32.0.255,10.33.0.255,10.34.0.255,10.35.0.255 enabled=yes \
manycast=yes
/system ntp client servers
add address=192.53.103.104
add address=192.53.103.108
On the RB5009, wired VLAN tests conducted over ether6, wired âdirectâ tests over ether5.
Sure, thereâs some wifi behind it, but as the issue is reproducible on the RB5009 alone, Iâm curious what you find out.