Hello,
I just bought a new HAP AC2 for a friend and am creating a config on it that is similar to my HAP AC2. Basically I have created bunch of VLANs that are isolated from each other and no network traffic is allowed across VLANs, except what I explicitly allow in the Firewall rules. This config works on my HAP AC2, but for some reason the new HAP AC2 is allowing VLANs to talk to each other without any explicit rules in the Firewall. I’ve done several reviews at this point and I can’t seem to find the needle in the haystack. I’d appreciate if you can take a look at my config below and let me know where I went wrong.
I’ve testing this with connecting two computers connected to different wifi SSIDs on separate VLANs and I’m able to ping IPs from 10.0.10.x segment into 10.0.70.x and vice versa.
Thanks in advance!!
# jul/11/2020 16:17:32 by RouterOS 6.47
# software id = YX1W-QFPB
#
# model = RBD52G-5HacD2HnD
# serial number = B4A00C818D2A
/interface bridge
add admin-mac=48:8F:5A:4E:D4:DD auto-mac=no comment=defconf name=BR1 \
vlan-filtering=yes
/interface ethernet
set [ find default-name=ether2 ] name=ether2-OPEN
set [ find default-name=ether3 ] name=ether3-OPEN
set [ find default-name=ether4 ] name=ether4-OPEN
set [ find default-name=ether5 ] name=ether5-WRST
/interface wireless
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=\
20/40/80mhz-XXXX disabled=no distance=indoors frequency=auto \
installation=indoor mode=ap-bridge ssid=MikroTik-4ED4E2 \
wireless-protocol=802.11
/interface vlan
add interface=BR1 name=GUEST_VLAN vlan-id=70
add interface=BR1 name=HOME_VLAN vlan-id=10
add interface=BR1 name=IOT_VLAN vlan-id=80
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=VLAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" management-protection=\
allowed mode=dynamic-keys name=home-user supplicant-identity=""
add authentication-types=wpa2-psk eap-methods="" management-protection=\
allowed mode=dynamic-keys name=guest-user supplicant-identity=""
add authentication-types=wpa2-psk eap-methods="" management-protection=\
allowed mode=dynamic-keys name=iot-user supplicant-identity=""
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \
disabled=no distance=indoors frequency=auto installation=indoor mode=\
ap-bridge name=wlan-2-home security-profile=home-user ssid=RocketShip
add disabled=no keepalive-frames=disabled mac-address=4A:8F:5A:4E:D4:E1 \
master-interface=wlan-2-home multicast-buffering=disabled name=wlan-guest \
ssid=RocketShipGuest wds-cost-range=0 wds-default-cost=0 wps-mode=\
disabled
add disabled=no keepalive-frames=disabled mac-address=4A:8F:5A:4E:D4:E2 \
master-interface=wlan-2-home multicast-buffering=disabled name=wlan-iot \
ssid=RocketShipIOT wds-cost-range=0 wds-default-cost=0 wps-mode=disabled
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=HOME_POOL ranges=10.0.10.10-10.0.10.254
add name=GUEST_POOL ranges=10.0.70.10-10.0.70.254
add name=IOT_POOL ranges=10.0.80.10-10.0.80.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=BR1 name=defconf
add address-pool=HOME_POOL disabled=no interface=HOME_VLAN name=HOME_DHCP
add address-pool=GUEST_POOL disabled=no interface=GUEST_VLAN name=GUEST_VLAN
add address-pool=IOT_POOL disabled=no interface=IOT_VLAN name=IOT_VLAN
/interface bridge port
add bridge=BR1 comment=defconf frame-types=\
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=\
ether2-OPEN pvid=10
add bridge=BR1 comment=defconf frame-types=\
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=\
ether3-OPEN pvid=10
add bridge=BR1 comment=defconf frame-types=\
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=\
ether4-OPEN pvid=10
add bridge=BR1 comment=defconf frame-types=\
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=\
ether5-WRST pvid=10
add bridge=BR1 comment=defconf frame-types=\
admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=\
wlan-2-home pvid=10
add bridge=BR1 comment=defconf interface=wlan2
add bridge=BR1 frame-types=admit-only-untagged-and-priority-tagged \
ingress-filtering=yes interface=wlan-guest pvid=70
add bridge=BR1 frame-types=admit-only-untagged-and-priority-tagged \
ingress-filtering=yes interface=wlan-iot pvid=80
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=BR1 tagged=BR1 untagged=\
wlan-2-home,ether5-WRST,ether2-OPEN,ether3-OPEN,ether4-OPEN vlan-ids=10
add bridge=BR1 tagged=BR1 untagged=wlan-guest vlan-ids=70
add bridge=BR1 tagged=BR1 untagged=wlan-iot vlan-ids=80
/interface detect-internet
set wan-interface-list=WAN
/interface list member
add comment=defconf interface=BR1 list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=HOME_VLAN list=VLAN
add interface=GUEST_VLAN list=VLAN
add interface=IOT_VLAN list=VLAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=BR1 network=\
192.168.88.0
add address=10.0.10.1/24 interface=HOME_VLAN network=10.0.10.0
add address=10.0.70.1/24 interface=GUEST_VLAN network=10.0.70.0
add address=10.0.80.1/24 interface=IOT_VLAN network=10.0.80.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=10.0.10.0/24 comment="Home Network IPs" domain=home gateway=\
10.0.10.1
add address=10.0.70.0/24 comment="Guest Network IPs" domain=guest gateway=\
10.0.70.1
add address=10.0.80.0/24 comment="IOT Network IPs" domain=iot gateway=\
10.0.80.1
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment="Allow estab & related" \
connection-state=established,related,untracked
add action=accept chain=input comment=\
"Allow VLANs to access router services like DNS, Winbox" disabled=yes \
in-interface-list=VLAN
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=input comment="Drop DNS from WAN" dst-port=53 \
in-interface-list=WAN protocol=udp
add action=drop chain=input comment="Drop DNS from WAN" dst-port=53 \
in-interface-list=WAN protocol=tcp
add action=drop chain=input comment="DropTelnet from WAN" dst-port=23 \
in-interface-list=WAN protocol=udp
add action=drop chain=input comment="Drop Telnet from WAN" dst-port=23 \
in-interface-list=WAN protocol=tcp
add action=accept chain=forward comment="Allow estab & related" \
connection-state=established,related
add action=accept chain=forward in-interface-list=VLAN out-interface-list=WAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related disabled=yes
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new disabled=yes in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/system clock
set time-zone-name=America/New_York
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN