Community discussions

MikroTik App
 
Switchthis
just joined
Topic Author
Posts: 1
Joined: Sat Jun 05, 2021 6:05 pm

VLAN and DHCP relay over wifi

Sun Nov 13, 2022 1:32 pm

I have VLANs and DHCP set up on pfsense. I've tried to extend VLAN 120 over the wifi but when connecting to the new virtual wireless interface "NAME_HERE_Guest" I don't get any IP. If I plug in a PC on switch port 4 I do get an IP from the 120 VLAN.

Most likely my AP is missing some configuration setting because I'm very new to all of this.

pfsense ---- port: 8 (switch CSS610-8G-2S+IN) port: 7------ eth: 1 (AP cAP ac)

Switch:

Image
https://imgur.com/a/ET1gphr
Image
https://imgur.com/a/K0grPAZ

AP:
# nov/12/2022 15:17:39 by RouterOS 6.48.6
/interface bridge
add admin-mac=xxxx auto-mac=no comment=defconf name=bridge
add name=bridge_GuestVLAN
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX country=finland disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge \
    ssid=NAME_HERE_2.4GHz wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-onlyac channel-width=20/40/80mhz-XXXX country=finland disabled=no distance=indoors frequency=auto installation=indoor mode=\
    ap-bridge ssid=NAME_HERE wireless-protocol=802.11
add disabled=no mac-address=xxxx master-interface=wlan1 name=NAME_HERE_Guest ssid=NAME_HERE_Guest vlan-id=120 vlan-mode=use-tag wds-default-bridge=bridge \
    wps-mode=disabled
/interface vlan
add interface=NAME_HERE_Guest name=GuestVLAN vlan-id=120
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik wpa2-pre-shared-key=asdf1234
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
add bridge=bridge_GuestVLAN interface=GuestVLAN
add bridge=bridge interface=NAME_HERE_Guest
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=192.168.100.3/24 interface=ether1 network=192.168.100.0
add address=192.168.120.3/24 interface=bridge_GuestVLAN network=192.168.120.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-relay
add dhcp-server=192.168.120.1 disabled=no interface=bridge_GuestVLAN name=DHCP_Relay
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=accept chain=input comment="Allow webconfig access from upstream" dst-address=192.168.100.3 dst-port=80 protocol=tcp src-address=192.168.100.16
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/system clock
set time-zone-name=xxx
/system package update
set channel=long-term
/system routerboard mode-button
set enabled=yes on-event=dark-mode
/system script
add comment=defconf dont-require-permissions=no name=dark-mode owner=*sys policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="\r\
    \n   :if ([system leds settings get all-leds-off] = \"never\") do={\r\
    \n     /system leds settings set all-leds-off=immediate \r\
    \n   } else={\r\
    \n     /system leds settings set all-leds-off=never \r\
    \n   }\r\
    \n "
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

Who is online

Users browsing this forum: Speedr and 29 guests