Subnet isolation help needed

Hi, I’m trying to create an isolated subnet on my home network for some work things.

I first tried to use a VLAN, and followed the very helpful guide here http://forum.mikrotik.com/t/using-routeros-to-vlan-your-network/126489/1 but it knocked my ethernet speed down to 33% and wifi speed to almost 10%, so maybe the hAP ac is not suited to handle a number of virtual LANs.

So now, I’m just trying to isolate the work devices behind another physical router. I’d like it so that nothing on the “home” network (192.168..) can see the work network (10...*) and vice versa.

Ideally something like this:
nettopo.png
Building off the default config, and following a couple posts, I was able to remove ether3 from the default bridge, and create a new dchp pool for it
http://forum.mikrotik.com/t/configure-multiple-subnets-with-dhcp/79416/1
http://forum.mikrotik.com/t/remove-port-from-the-default-brige/125811/1

So far, the work pc gets assigned an IP in the 10.10.50.* range, but it can’t reach the internet, despite the following rules:

/ip firewall filter
add action=accept chain=forward comment="work access to WAN" out-interface-list=WAN src-address=10.0.0.0/8
add action=drop chain=forward comment="drop any other work" src-address=10.0.0.0/8

It doesn’t appear to be able to reach the MT router either.

I’m pretty new to networking, and I feel like the issue is something to do with the firewall rules, but I don’t have a good understanding of them to know what’s wrong or how to fix it.

Also, is the work-bridge necessary, or can I do everything off the ether3 interface directly?
isolated-subnet.rsc (4.19 KB)

Paste this on terminal

/interface list member
add interface=work-bridge list=LAN

But for my point of view, and also for other consideration about experience,
10./8 is really excessive.
In some cases your router can hang or reboot… also for some AV installed on devices…

You can use 192.168.9.x/24, for example, and have same separation (if the rest is configured correctly)

{
/ip pool
set work ranges=192.168.9.101-192.168.9.199
/ip address
remove [find where interface=work-bridge]
add address=192.168.9.1/24 interface=work-bridge
/ip dhcp-server network
set [find where comment="work lan"] address=192.168.9.0/24 gateway=192.168.9.1 netmask=24
/ip firewall filter
set [find where src-address=10.0.0.0/8] src-address=192.168.9.0/24
}

And about isolation, remove the 2 firewall rules “work access to WAN” and “drop any other work”
and add something like that on top:

/ip firewall filter
add action=drop chain=forward in-interface=bridge out-interface=work-bridge
add action=drop chain=forward in-interface=work-bridge out-interface=bridge