Community discussions

MikroTik App
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Why does this work with Cisco and Not with Mikrotik-?

Tue Mar 22, 2022 10:49 pm

Or really what am i doing wrong that i do not understand. Work is being done on the CRS3XX series switches using the bridge.

So i do events and there are times where we get multiple ISPs. and the ISPs will have publics that i will handout to some of the services that need it. in the past when cisco gear i will just take an ISP and plug it into my Cisco switch with the simple commands
switchport mode access
switchport access vl 100
(for example) and that is it..

From there i can hand out publics just by creating access ports on the connecting switches for them to connect and also for the wan interfaces of my routers.

But with mikrotik i have not been able to get this done by just.. creating a vlan.. untagging the vlan on the port i want to have the publics on... and then going to the port and changing the PVID to the vlan i need. and allow untagged and priority tagged, (ive also tried admit all frames)
one thing that has worked when ive been able to speak to the engineers on the other side, If they add this config to the port giving me internet. It works. "bpdu-filter enable"
But in the case im in right now im just getting the internet from one of the isps on just a normal ATT modem. There arent features like that on it. Please help me understand what im doing wrong.

My goal is to use my CRS317-1G-16S+ as the switch I use to receive internet at all these events. since it has the 10gig interfaces. But in the cases i can not get with someone to enable bpdu-filter enable on the ISP side, i end up putting a 1 GIG cisco 2960 just to receive the internet.
You do not have the required permissions to view the files attached to this post.
 
Dude2048
Member Candidate
Member Candidate
Posts: 212
Joined: Thu Sep 01, 2016 4:04 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Tue Mar 22, 2022 10:54 pm

 
tdw
Forum Guru
Forum Guru
Posts: 1847
Joined: Sat May 05, 2018 11:55 am

Re: Why does this work with Cisco and Not with Mikrotik-?  [SOLVED]

Tue Mar 22, 2022 11:17 pm

interface SOMEPORT
switchport mode access
switchport access vlan P

translates to
/interface bridge port
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=PORTNAME pvid=P

this dynamically adds untagged membership to the VLAN in /interface bridge vlan

For trunk ports see viewtopic.php?p=818741#p818741

If you wish to block spanning tree BPDUs from both being transmitted and processed if received then include edge=yes in the /interface bridge port statement(s). The bridge itself should be have protocol-mode=rstp
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 12:15 am

interface SOMEPORT
switchport mode access
switchport access vlan P

translates to
/interface bridge port
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=PORTNAME pvid=P

this dynamically adds untagged membership to the VLAN in /interface bridge vlan

For trunk ports see viewtopic.php?p=818741#p818741

If you wish to block spanning tree BPDUs from both being transmitted and processed if received then include edge=yes in the /interface bridge port statement(s). The bridge itself should be have protocol-mode=rstp
with this..
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus4 pvid=600
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus5 pvid=600
I can not connect from the att modem on port sfp-sfplus4 and then get internet on port sfp-plus5..

on a cisco tho..
if i have two ports just as
switchport mode access
switch port access vlan 100

it works just fine and i can move that att vlan anywhere with whatever tag i tag it with.
i tried also setting both of my ports sfpplus4 and 5 to edge=yes and still nothing..
Again this has happened before and what was done on the remote/isp side was .. BDPU filter enable and i was able to take their untagged traffic and tag it no problem.
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 12:23 am

Thank you for the link. Because of that video i actually started really using the CRS328 and 317 that ive had for over a YEAR! but did know how to use it.. Luckily this event i was able to receive the 10 gig hand off with the crs317 because of the whole BPDU filter enable allowing me to tag the ISP connection. But at my last event i could and have to use a 1 gig Cisco 2960 purely because I needed to Tagg the ISP connection.

:(
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 1:02 am

In the image below is what i can not get to work. taking in a connection and assigning it a tag to the redistribute it on my network.
You do not have the required permissions to view the files attached to this post.
 
tdw
Forum Guru
Forum Guru
Posts: 1847
Joined: Sat May 05, 2018 11:55 am

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 1:48 am

Post your configuration from /export hide-sensitive
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 1:51 am

Post your configuration from /export hide-sensitive
/interface bridge
add admin-mac=2C:C8:1B:2F:B7:CD auto-mac=no comment=defconf name=bridge vlan-filtering=yes
/interface ethernet
set [ find default-name=sfp-sfpplus16 ] auto-negotiation=no name=ER4Wan-SFP+16
set [ find default-name=sfp-sfpplus15 ] auto-negotiation=no name=Er6-WAN-sfp+15
set [ find default-name=sfp-sfpplus1 ] name=Hotwire-sfpplus1
set [ find default-name=sfp-sfpplus13 ] name=Mikrotik24p-sfp+13
set [ find default-name=sfp-sfpplus14 ] name=PFWan-SFP+14
set [ find default-name=sfp-sfpplus2 ] auto-negotiation=no loop-protect=on
set [ find default-name=sfp-sfpplus3 ] auto-negotiation=no loop-protect=on
/interface vlan
add interface=bridge name=Management200 vlan-id=200
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/snmp community
add addresses=::/0 name=bigredsnmp
/interface bridge port
add bridge=bridge comment=defconf interface=ether1
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=Hotwire-sfpplus1 pvid=400
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus2 pvid=600
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus3 pvid=600
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus4 pvid=600
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=sfp-sfpplus5 pvid=600
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus6
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus7
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus8
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus9
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus10
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus11
add bridge=bridge comment=defconf ingress-filtering=yes interface=sfp-sfpplus12
add bridge=bridge comment=defconf frame-types=admit-only-vlan-tagged ingress-filtering=yes interface=Mikrotik24p-sfp+13
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=PFWan-SFP+14 pvid=400
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=Er6-WAN-sfp+15 pvid=400
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=ER4Wan-SFP+16 pvid=400
/interface bridge vlan
add bridge=bridge tagged="bridge,Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp-sfppl\
    us11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=200
add bridge=bridge tagged=\
    sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp-sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13 \
    untagged=Hotwire-sfpplus1,PFWan-SFP+14,ER4Wan-SFP+16,Er6-WAN-sfp+15 vlan-ids=400
add bridge=bridge disabled=yes tagged="sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp-sfpplus11,sfp-sf\
    pplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=10
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=30
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=40
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=50
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=60
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=69
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=70
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=79
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=80
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=90
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=100
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=110
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=130
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=140
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=150
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=160
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=169
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=170
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=179
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=180
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=190
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=210
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=230
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=240
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=250
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=260
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=269
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=270
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=280
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=290
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=401
add bridge=bridge disabled=yes tagged="Hotwire-sfpplus1,sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5,sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp\
    -sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13,PFWan-SFP+14,Er6-WAN-sfp+15,ER4Wan-SFP+16" vlan-ids=63
add bridge=bridge tagged=sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus9,sfp-sfpplus10,sfp-sfpplus11,sfp-sfpplus12,Mikrotik24p-sfp+13 untagged=\
    sfp-sfpplus2,sfp-sfpplus3,sfp-sfpplus4,sfp-sfpplus5 vlan-ids=600
/interface list member
add interface=ether1 list=WAN
add interface=Hotwire-sfpplus1 list=LAN
add interface=sfp-sfpplus2 list=LAN
add interface=sfp-sfpplus3 list=LAN
add interface=sfp-sfpplus4 list=LAN
add interface=sfp-sfpplus5 list=LAN
add interface=sfp-sfpplus6 list=LAN
add interface=sfp-sfpplus7 list=LAN
add interface=sfp-sfpplus8 list=LAN
add interface=sfp-sfpplus9 list=LAN
add interface=sfp-sfpplus10 list=LAN
add interface=sfp-sfpplus11 list=LAN
add interface=sfp-sfpplus12 list=LAN
add interface=Mikrotik24p-sfp+13 list=LAN
add interface=PFWan-SFP+14 list=LAN
add interface=Er6-WAN-sfp+15 list=LAN
add interface=ER4Wan-SFP+16 list=LAN
/ip address
add address=192.168.2>XX>XX4 interface=Management200 network=192.168.X>>x
/ip dns
set servers=8.8.8.8
/ip route
add distance=1 gateway=192.168.X>XX
/snmp
set enabled=yes trap-community= 
/system clock
set time-zone-name=America/New_York
/system identity
set name=MikroTik-10G
/system routerboard settings
set boot-os=router-os
/system swos
set address-acquisition-mode=static allow-from-ports=p1,p2,p3,p4,p5,p6,p7,p8,p9,p10,p11,p12,p13,p14,p15,p16,p17 identity=MikroTik static-ip-address=192.168.XXX>XXX
/tool romon
set enabled=yes
pvid 400 is working in the way id like my new isp to work but the isp giving me the internet for vl 400 is doing bpdu filter enable.. the new isp is just a normal att modem
 
tdw
Forum Guru
Forum Guru
Posts: 1847
Joined: Sat May 05, 2018 11:55 am

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 2:51 am

It doesn't make sense to have a bridge port with frame-types=admit-only-untagged-and-priority-tagged and listed in bridge vlan tagged=, this will likely leak VLANs out. Other than that the configuration looks OK, as mentioned previously having a bridge port with edge=yes will stop BPDUs being sent and not require filtering at their end.

How are you connecting the AT&T modem? Is the interface running?
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 2:57 am

At the moment I moved it over to my 3750 just so I could keep working. But I really want to learn this so I could keep using the mikrotik for my event hand offs.. I’ll try anything you recommend lol. I tried the edge=yes and it didn’t work. Should I of done that on both interfaces. I believe I did
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 2:58 am

It doesn't make sense to have a bridge port with frame-types=admit-only-untagged-and-priority-tagged and listed in bridge vlan tagged=, this will likely leak VLANs out. Other than that the configuration looks OK, as mentioned previously having a bridge port with edge=yes will stop BPDUs being sent and not require filtering at their end.

How are you connecting the AT&T modem? Is the interface running?
And in this case I don’t believe that modem even does that kinda stuff like stp.
 
tdw
Forum Guru
Forum Guru
Posts: 1847
Joined: Sat May 05, 2018 11:55 am

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:06 am

Spanning tree may be ignored, but for the other ISP it obviously isn't if they have to apply filtering.

You didn't answer the question about thow the AT&T modem is connected - it has RJ45 sockets for LAN connections, sfpplus4 where you were connecting it is an SFP cage.
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:20 am

Spanning tree may be ignored, but for the other ISP it obviously isn't if they have to apply filtering.

You didn't answer the question about thow the AT&T modem is connected - it has RJ45 sockets for LAN connections, sfpplus4 where you were connecting it is an SFP cage.
Sorry i was driving.. Well the thing is that internet they gave us was in another building and we have fiber running to the core from there. so i put a media converter and then at the office connected it using SFPs.
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:34 am

It doesn't make sense to have a bridge port with frame-types=admit-only-untagged-and-priority-tagged and listed in bridge vlan tagged=, this will likely leak VLANs out. Other than that the configuration looks OK, as mentioned previously having a bridge port with edge=yes will stop BPDUs being sent and not require filtering at their end.

How are you connecting the AT&T modem? Is the interface running?
on what port did i do this ?
lol im trying to find it now
 
tdw
Forum Guru
Forum Guru
Posts: 1847
Joined: Sat May 05, 2018 11:55 am

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:36 am

Not all vendors SFPs interoperate. Also an optical 1G SFP in a SFP+ cage requires the link speed to be forced to 1G full-duplex, e.g.
/interface ethernet set sfp-sfpplus4 auto-negotiation=no speed=1Gbps full-duplex=yes
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:44 am

Not all vendors SFPs interoperate. Also an optical 1G SFP in a SFP+ cage requires the link speed to be forced to 1G full-duplex, e.g.
/interface ethernet set sfp-sfpplus4 auto-negotiation=no speed=1Gbps full-duplex=yes
Right ive noticed this.. i did have the interface set to 1000 and full duplex.. i tested it at the office before the event so thats how i found out about forcing the negotiation. when i accepted the vlan on the cisco it worked properly on the routers afterward, just couldnt accept the internet that way..
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 3:56 am

It doesn't make sense to have a bridge port with frame-types=admit-only-untagged-and-priority-tagged and listed in bridge vlan tagged=, this will likely leak VLANs out. Other than that the configuration looks OK, as mentioned previously having a bridge port with edge=yes will stop BPDUs being sent and not require filtering at their end.

How are you connecting the AT&T modem? Is the interface running?
on what port did i do this ?
lol im trying to find it now
Sorry to bug but where did i do this ?
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 4:01 am



on what port did i do this ?
lol im trying to find it now
Sorry to bug but where did i do this ?
Wait sorry are you saying that if i have a admit untagged and priority tagged only port.. i shouldnt have all the vlans tagged on that port
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 4:06 am



Sorry to bug but where did i do this ?
Wait sorry are you saying that if i have a admit untagged and priority tagged only port.. i shouldnt have all the vlans tagged on that port
so sorry i know i keep making this thread so long.. i do have most of the vlans disabled tho that are not being used.. this switch is just for really handling the internet isps.. i do have another crs328-4c-20s-4S+
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 4:16 am

I really appreciate you being active on this topic.. When i get on site tomorrow ill probably continue to troubleshoot this. Hopefully with a little of your help i can get this figured out.. It will change a lot for me. I am ordering another 5 crs328-24ps-4s+ and i really want all my layer 2 to be mikrotik. But getting these 10g hand offs to work is one big issue for me. Im sure ill get there.

Thanks again
 
User avatar
StubArea51
Trainer
Trainer
Posts: 1739
Joined: Fri Aug 10, 2012 6:46 am
Location: stubarea51.net
Contact:

Re: Why does this work with Cisco and Not with Mikrotik-?

Wed Mar 23, 2022 6:05 am

Sounds like you're off to a good start...here is a Cisco to MikroTik guide for switching and VLANs that may be helpful.

https://stubarea51.net/2019/02/06/cisco ... and-vlans/
 
joshhboss
Member Candidate
Member Candidate
Topic Author
Posts: 273
Joined: Thu Aug 01, 2019 2:13 pm

Re: Why does this work with Cisco and Not with Mikrotik-?

Fri Apr 01, 2022 1:10 am

interface SOMEPORT
switchport mode access
switchport access vlan P

translates to
/interface bridge port
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged ingress-filtering=yes interface=PORTNAME pvid=P

this dynamically adds untagged membership to the VLAN in /interface bridge vlan

For trunk ports see viewtopic.php?p=818741#p818741

If you wish to block spanning tree BPDUs from both being transmitted and processed if received then include edge=yes in the /interface bridge port statement(s). The bridge itself should be have protocol-mode=rstp
After trying this in the office, you were corrected now it is working just as you said. Thank you!!

Who is online

Users browsing this forum: savage, urbok and 84 guests