Not a firewall or network guy, so please bear with me.
I am using WebFig/routerOS v6.7, and can also telnet to the CLI.
I am trying to setup the following topology with a Mikrotik Routerboard Model RB2011UiAS-RM. I have 5 physical unmanaged switches and physical cabling to connect the 5 networks to the Routerboard. This is for a residential ISP (FiOS) connection.
I’d like to set it up like this:
Inet(FiOS demarc) <> Routerboard <> Switch[1/2/3/4/5] <> PCs.
Or do I ned a residential router (Linksys, Netgear, etc) between the Inet and Routeroard, like this?
Inet(FiOS demarc) <> [Linksys or Netgear] <> Routerboard <> Switch[1/2/3/4/5] <> PCs.
I do like the relative security that a garden-variety residential router provides, so let me know your thoughts…
OK, here goes…
I set up 5 networks, each on their own physical interface:
192.168.1.1/24; network 192.168.1.0; eth6; ether6-master-local;
192.168.2.1/24; network 192.168.2.0; eth7; ether7-slave-local
192.168.3.1/24; network 192.168.3.0; eth8; ether8-slave-local
192.168.4.1/24; network 192.168.4.0; eth9; ether9-slave-local
192.168.5.1/24; network 192.168.5.0; eth10; ether10-slave-local
DHCP Pools:
192.168.88.10-192.168.88.254 default-dhcp
192.168.1.101-192.168.1.199 pool1
192.168.2.101-192.168.2.199 pool2
192.168.3.101-192.168.3.199 pool3
192.168.4.101-192.168.4.199 pool4
192.168.5.101-192.168.5.199 pool5
I want total segregation/isolation to/from each other on all of these networks, but all should have Inet access via NAT.
Are the below rules the correct (or a sane) way to go about this?
(.1 to .2 isolation)
ip firewall filter add chain=forward action=drop src-address=192.168.1.0/24 dst-address=192.168.2.0/24
ip firewall filter add chain=forward action=drop src-address=192.168.2.0/24 dst-address=192.168.1.0/24
(.1 to .3 isolation)
ip firewall filter add chain=forward action=drop src-address=192.168.1.0/24 dst-address=192.168.3.0/24
ip firewall filter add chain=forward action=drop src-address=192.168.3.0/24 dst-address=192.168.1.0/24
(.1 to .4 isolation)
ip firewall filter add chain=forward action=drop src-address=192.168.1.0/24 dst-address=192.168.4.0/24
ip firewall filter add chain=forward action=drop src-address=192.168.4.0/24 dst-address=192.168.1.0/24
(.1 to .5 isolation)
ip firewall filter add chain=forward action=drop src-address=192.168.1.0/24 dst-address=192.168.5.0/24
ip firewall filter add chain=forward action=drop src-address=192.168.5.0/24 dst-address=192.168.1.0/24
How do I handle all going out to the Inet through a masquerade rule in the NAT portion of the firewall?
I’d prefer to use the 192.168.1.1 as the default gateway for all networks, but is this going to compromise security if I want all of the networks to be fully isolated from each other? Should I use 192.168.0.1 (or something else) for the WAN port’s IP?
Is this accurate?
NAT Configuration:
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.1.0/24 out-interface=WAN
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.2.0/24 out-interface=WAN
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.3.0/24 out-interface=WAN
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.4.0/24 out-interface=WAN
/ip firewall nat add chain=srcnat action=masquerade src-address=192.168.5.0/24 out-interface=WAN
If I have an example of how to set one network up, I can edit for the others.
This seems to me to be a lot of info to ask for, but for some of you, it is hopefully a no-brainer…