A
bridge spans multiple ports. So you'll need two bridges, one spanning ether2 and ether3, the other spanning ether4 and ether5.
Bridges come with implicitly created interfaces, which are members of same bridge. These interfaces allow ROS to interact with subnet. So you assign IP addresses to those interfaces, bind DHCP server with appropriate pool of addresses, ...
RB750Gr3, being router, will happily pass packets between its L3 interfaces (those with IP address set). If you don't want some traffic to pass, you have to block it using firewall filter rules.
Now, in order to have decent firewall filters in place and overall decent base for making adjustments, I suggest you to reset router to factory defaults. Which comes with ether1 configured for WAN and the rest of ports bridged in LAN. Next you have to do these changes:
- connect using ether2 or ether3
- remove ports ether4 and ether5 from bridge
- create another bridge (name it what ever you want, e.g. bridgeIOT) and add ports ether4 and ether5
- add IP address to it
- create DHCP address pool, DHCP network settings and bind DHCP server to bridgeIOT interface
This leaves default IP subnet (192.168.88.0/24) for your LAN. If you don't like it, change it (and default DHCP server settings).
Next you have to add firewall filter rules which prevent talking between LAN and IOT. If you want to stay true to spirit of default firewall, you should create interface list called e.g. IOT and add bridgeIOT to it. Then add the following two rules to the end of firewall filter rules
filter add chain=forward action=drop connection-state=new in-interface-list=IOT out-interface-list=LAN
filter add chain=forward action=drop connection-state=new in-interface-list=LAN out-interface-list=IOT
If you want to allow connections initiated from LAN and not connections initiated from IOT, then disable (or remove) second rule and keep the first one.
If you'll configure router for providing any services to IOT subnet (e.g. set router's IP address as DNS server in DHCP server settings), then you'll have to add some rules allowing access to those services for
in-interface-list=IOT.