Unable to see another network subnet in both directions

Hello,

I’m not real sure what I might be doing wrong here, but I have 2 networks 192.168.11.x and 192.168.16.x. I have finally gotten the .11.x network to see the other, but not in reverse. Both networks have access to the internet and I’m drawing a blank as to why the .16.x network cannot see the other.

Here is the relevant info:

/interface bridge
add mtu=1500 name=bridge1
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-onlyg comment="To Pit 10 - Outside" \
    disabled=no frequency=auto l2mtu=1600 mode=ap-bridge ssid=Outside \
    wireless-protocol=802.11
set [ find default-name=wlan2 ] band=2ghz-onlyg comment=Office disabled=no \
    frequency=auto l2mtu=1600 mode=ap-bridge wireless-protocol=802.11
/interface wireless manual-tx-power-table
set wlan1 comment="To Pit 10 - Outside"
set wlan2 comment=Office
/interface wireless nstreme
set wlan1 comment="To Pit 10 - Outside"
set wlan2 comment=Office
/interface vlan
add interface=wlan1 l2mtu=1596 name=vlan1 vlan-id=1
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge port
add bridge=bridge1 interface=wlan1
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=wlan2
add bridge=bridge1 interface=vlan1
/interface l2tp-server server
set default-profile=default

/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1 to-addresses=0.0.0.0

/ip firewall filter
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=22 protocol=tcp
add action=drop chain=input comment="drop telnet brute forcers" dst-port=23 protocol=tcp src-address-list=telnet_blacklist
add action=add-src-to-address-list address-list=telnet_blacklist address-list-timeout=1w3d chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage3
add action=add-src-to-address-list address-list=telnet_stage3 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage2
add action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp src-address-list=telnet_stage1
add action=add-src-to-address-list address-list=telnet_stage1 address-list-timeout=1m chain=input connection-state=new dst-port=23 protocol=tcp
add action=drop chain=forward comment=ads connection-state=new dst-address-list=ads_list protocol=tcp
add action=drop chain=forward comment=dshield connection-state=new dst-address-list=dshield_list protocol=tcp
add action=drop chain=forward comment=openbl connection-state=new dst-address-list=openbl_list protocol=tcp

/ip address
add address=208.xxx.xxx.xxx interface=ether1 network=208.xxx.xxx.xxx
add address=192.168.11.1/24 interface=wlan1 network=192.168.11.0
add address=192.168.11.2/24 interface=wlan2 network=192.168.11.0
add address=192.168.16.1/24 interface=vlan1 network=192.168.16.0

Any idea on why it won’t work the other way around?

Thank you.

Edit: Also is there a way to only have specific machines from the .11.x network access the other?

So you have everything except WAN bridged together. At the same time, you have IP addresses on individual interfaces instead on bridge where they should be. And you even have VLAN bridged together with its parent interface. That does not look right to me at all.

That aside, I don’t see anything in firewall that would prevent those two networks seeing each other, unless their addresses are on one of the lists (ads_list, dshield_list, openbl_list), but if what you posted is your whole config, those are empty (so your forward chain currently does not block anything at all). As long as the hosts on those networks have 192.168.16.1 and 192.168.11.1 (or 192.168.11.2) as their default gateways, it should work.

I would start by removing vlan1 from bridge1, that might be enough.

Thanks for responding!

Well your right, something did break while I was gone for the night. I came back and I could not get anything from my workstation. Something I did screwed up everything that was connected to wlan1. Luck was with me though because I did make a backup before I starting breaking things just in case.

Here’s a diagram that might help a little. What I’m trying to do is add a 192.168.16.x (ConSpec) subnet to the system that is separate from the rest, and hopefully only accessible by a few machines on the 192.168.11.x network. That network runs a system that tracks equipment and personnel underground, but I need to display some of that information on a few machines on the other subnet.

I’m not a real network guy, just someone who has enough knowledge to get himself in trouble. Any help in cleaning this up would help me out.

I hope this hasn’t confused anyone like it’s done to me.

Ok, so important parts here are main RB433 and RB433GL on the left. Now we need a little more info about RB433GL and beyond, how exactly is everything connected, including WRT54G.

Is it RB433GL’s wireless client interface (connected to Outside) bridged with AP Underground, with WRT54G connected as wireless client to that, and ConSPEC, Staging and Underground Manager connected to WRT54G using ethernet? Or is it something different?

Does ConSPEC need to be separated also from Staging and Underground Manager?

How well do you need ConSPEC separated?

You could do it quick’n’easy way by simply dropping vlan1 and adding 192.168.16.1/24 directly to bridge1 on RB433. Then you could add few firewall rules, allow which 192.168.11.x addresses can access 192.168.16.x and reject the rest. That would work well against lets say accidental access. But it’s not good enough if someone wants to purposedly tamper with it. Proper isolation may be a little harder to do, if WRT54G is in the way as I think it is (I believe that DD-WRT does have the ability to be configured properly for it, but I don’t have experience with it).

That is exactly right regarding the WRT54G. It’s connected via wireless to the Underground AP, think of something like a CPE. All systems mentioned are connected to the WRT54G via ethernet cables.

I would prefer not to allow anything, save for a few machines, to access ConSpec if I can help it. (Safety, Underground Manager, and Staging systems need to be able to connect to the ConSpec system.)

Edit: I might be able to remove the WRT54G in favor of a SXT that was bought for another purpose but was scrapped. Would that work any better for what I’m trying to do?

The most secure way would be to isolate ethernet port on WRT used for ConSpec and do filtering there (on WRT). But I’m not sure if you can split one port from its HW switch. Plus if you would like to make it efficient and avoid unnecessary packet trips over wireless, it would require static routes set on all hosts allowed to access ConSPEC.

Another option is to do filtering on RB433GL. All hosts behind it (Staging and Underground Manager) are allowed to access ConSpec anyway, so you would only have to protect it from the rest of LAN. It could be partially done by bridge filters, but if you want ConSpec on separate IP subnet, it would still have to involve routing and static routes. It is possible, but it starts to feel unnecessarily complicated.

Which brings me to last idea. Do you really need ConSpec on separate IP subnet? What if it was still part of .11 subnet, but protected from unauthorized access from rest of LAN? That could be done using just bridge filters on RB433GL:

/interface bridge filter
add action=accept chain=forward in-interface=<Outside client> out-interface=<Underground AP> \
    mac-protocol=ip dst-address=192.168.11.<ConSpec>/32 src-address=192.168.11.<Safety>/32
add action=drop chain=forward in-interface=<Outside client> out-interface=<Underground AP> \
    mac-protocol=ip dst-address=192.168.11.<ConSpec>/32

It can also use MAC filtering instead of IP. Staging and Underground Manager are at the same side of bridge, so their access to ConSpec is not limited.

I have seen the light!!!

Thank you so much for the info sir! That last idea is exactly what I needed.

The problem that I had was that ConSpec is actually a group of systems comprised of a server and networked RFID readers taking up a lot of space on the network. (or they will before we are done with them). That was the reason that I wanted them on a separate subnet, but given what you suggested and me looking at the hardware I think I can make it all work. I didn’t know that the server hosting the data had a separate NIC, so I can add it to the .11.x subnet and filter it as you suggested.

Didn’t know you could do that!! :open_mouth: :open_mouth: (stated in Dave Chappelle’s voice)

Again thank you soooo much for the insight. I’d upvote you more than +3 if the system would allow me to.