Dear all-knowing forum, I need your help.
Intro
I bought an old house with massive stone walls and partial wood construction. Therefore I currently use 5 hAP ac to cover the area I need.
With the house came an unmanaged 16 port switch that - according to the manufacturer description - supports jumbo frames and 802.1Q VLAN packet transparency. Lets assume this is true. Also, I have some IoT devices that were already in the house. They connect mostly via WLAN.
I have some experience in networking, but I am not an expert, especially not in layer 2 topics.
Current situation
In an effort to separate IoT and guest WLAN traffic, I have created configurations based on the information from "Router-Switch-AP all in one" at Router-Switch-AP all in one on my hAPs. At the moment, the hAPs use a brigde with VLAN filtering. The WLAN interfaces are masqueraded and each of the hAPs has its own DHCP service set up on the WLAN interfaces (one for IoT and one for the guest WLAN). Following some configuration extracts for better understanding of the setup. Firewall rules omitted for brevity.
/interface wireless add name=wlan-iot ssid=**** master-interface=wlan1
/interface wireless add name=guest ssid=**** master-interface=wlan1
/interface bridge add name=br0 protocol-mode=none vlan-filtering=no
/interface bridge port
# Blue VLAN -> local LAN
add bridge=br0 interface=ether1 pvid=10
add bridge=br0 interface=ether2 pvid=10
add bridge=br0 interface=ether3 pvid=10
add bridge=br0 interface=ether4 pvid=10
add bridge=br0 interface=sfp1 pvid=10
add bridge=br0 interface=wlan1 pvid=10
add bridge=br0 interface=wlan2 pvid=10
# Green VLAN -> IoT
add bridge=br0 interface=ether5 pvid=20
add bridge=br0 interface=wlan-iot pvid=20
# Yellow VLAN -> Guest WLAN
add bridge=br0 interface=guest pvid=30
/interface bridge vlan
add bridge=br0 tagged=br0 vlan-ids=10
add bridge=br0 tagged=br0 vlan-ids=20
add bridge=br0 tagged=br0 vlan-ids=30
# add an interface for IP connectivity to the hAP
/interface vlan add interface=br0 name=BLUE_VLAN vlan-id=10
/ip address add address=192.168.0.31/24 interface=BLUE_VLAN
/ip route add dst-address=0.0.0.0/0 gateway=192.168.0.1
# Green VLAN interface creation, IP assignment, and DHCP service (yellow is set up the same way)
/interface vlan add interface=br0 name=GREEN_VLAN vlan-id=20
/ip address add interface=GREEN_VLAN address=10.0.21.1/24
/ip pool add name=GREEN_POOL ranges=10.0.21.20-10.0.21.250
/ip dhcp-server add address-pool=GREEN_POOL interface=GREEN_VLAN name=GREEN_DHCP disabled=no
/ip dhcp-server network add address=10.0.21.0/24 dns-server=8.8.8.8 gateway=10.0.21.1
# Only allow ingress packets without tags on Access Ports
/interface bridge port
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=ether1]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=ether2]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=ether3]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=ether4]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=ether5]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wlan1]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wlan2]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=wlan-iot]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=guest]
set bridge=br0 ingress-filtering=yes frame-types=admit-only-untagged-and-priority-tagged [find interface=sfp1]
/interface bridge set br0 vlan-filtering=yes
Each of the five hAPs is set up this way, only their LAN IP addresses differ. This works really nicely regarding connectivity and separation but has some drawbacks. First, it is not easily possible to connect from the local LAN directly to an IoT device and I would prefer to avoid static IP addressing. Second, the IoT WLAN networks on the individual hAPs cannot see each other.
Internet connectivity is realized through a hEX as gateway / router. Currently, there is no VLAN setup present on the router, it acts as NAT and firewall device. Traffic coming from the IoT and guest networks to the Internet is masqueraded on the hAP, therefore the internet router sees only the local LAN IP of the hAP.
Desired setup
It would be great to extend the VLANs over all hAPs and to set up the DHCP service centrally on the Internet router. As far as I understood, that would require VLAN trunking between the Internet router and the hAPs. I have experimented with the example "Hybrid Ports Example for Switch with a separate router (RoaS)" from Hybrid Ports Example for Switch with a separate router (RoaS) but wasn't successful. Also I am unsure what the ideal / technically correct setup would be and would greatly appreciate help. Getting a new central switch with management would be possible, but running additional physical cabling is not an option.


