I did add another vlan and wanted to reach this config
port 1: no config: port to manage the switch
I first made sure that all ports were part of bridge1 for hardware
# Create bridge1
/interface bridge
add name=bridge1
# Hardware switch together all ports
/interface bridge port
add bridge=bridge1 interface=ether1 hw=yes
...
add bridge=bridge1 interface=ether24 hw=yes
Then I configured the access ports that should have untagged vlan traffic (port 5-24 carry various vlans)
/interface ethernet switch ingress-vlan-translation
add ports=ether5 customer-vid=0 new-customer-vid=10
add ports=ether6 customer-vid=0 new-customer-vid=10
add ports=ether7 customer-vid=0 new-customer-vid=20
add ports=ether8 customer-vid=0 new-customer-vid=20
add ports=ether9 customer-vid=0 new-customer-vid=40
add ports=ether10 customer-vid=0 new-customer-vid=40
add ports=ether11 customer-vid=0 new-customer-vid=40
add ports=ether12 customer-vid=0 new-customer-vid=40
add ports=ether13 customer-vid=0 new-customer-vid=70
add ports=ether14 customer-vid=0 new-customer-vid=70
add ports=ether15 customer-vid=0 new-customer-vid=70
add ports=ether16 customer-vid=0 new-customer-vid=70
add ports=ether17 customer-vid=0 new-customer-vid=80
add ports=ether18 customer-vid=0 new-customer-vid=80
add ports=ether19 customer-vid=0 new-customer-vid=80
add ports=ether20 customer-vid=0 new-customer-vid=80
add ports=ether21 customer-vid=0 new-customer-vid=90
add ports=ether22 customer-vid=0 new-customer-vid=90
add ports=ether23 customer-vid=0 new-customer-vid=90
add ports=ether24 customer-vid=0 new-customer-vid=90
port 2: Trunk coming from pfsense, carrying vlan 10, 20, 40, 70, 80, 90, tagged traffic. Pfsense serves as router, firewall and dhcp server, so IPs are assigned from there
/interface ethernet switch egress-vlan-tag
# incoming trunk from pfsense
add tagged-ports=ether2 vlan-id=10
add tagged-ports=ether2 vlan-id=20
add tagged-ports=ether2 vlan-id=40
add tagged-ports=ether2 vlan-id=70
add tagged-ports=ether2 vlan-id=80
add tagged-ports=ether2 vlan-id=90
port 3: should carry tagged vlan traffic for 40, 70, 80 and 90 towards a ubiquity wireless AP. However this step failed with “failure: already have such switch egress vlan tag entry”
/interface ethernet switch egress-vlan-tag
# outgoing to ubiquity AP
add tagged-ports=ether3 vlan-id=40
add tagged-ports=ether3 vlan-id=70
add tagged-ports=ether3 vlan-id=80
add tagged-ports=ether3 vlan-id=90
Anyone has an idea how to make this work? Port 3 should forward traffic coming from the pfsense device on port 2 for vlan 40, 70, 80 and 90 towards ubiquity
Then I finished the configuration with:
# Add entries to the VLAN table to specify VLAN memberships for each port and each VLAN ID
/interface ethernet switch vlan
add ports=ether2,ether5,ether6 vlan-id=10
add ports=ether2,ether7,ether8 vlan-id=20
add ports=ether2,ether3,ether9,ether10,ether11,ether12 vlan-id=40
add ports=ether2,ether3,ether13,ether14,ether15,ether16 vlan-id=70
add ports=ether2,ether3,ether17,ether18,ether19,ether20 vlan-id=80
add ports=ether2,ether3,ether21,ether22,ether23,ether24 vlan-id=90
# After valid VLAN configuration has been setup, you can enable unknown/invalid VLAN filtering
/interface ethernet switch
set drop-if-invalid-or-src-port-not-member-of-vlan-on-ports=ether2,ether3,ether4,ether5,ether6,ether7,ether8,ether9,ether10,ether11,ether12,ether13,ether14,ether15,ether16,ether17,ether18,ether19,ether20,ether21,ether22,ether23,ether24
In addition to the error I have configuring port 3: would I need additional settings for security?