Yep, exactly. I'm running such a setup with a hotspot on the bridge interface and it works beautifully to prohibit direct client-to-client communication between two hotspot users that are associated to different access points (I'm running one VLAN to each AP, within the same AP default-forwarding=no handles this, of course).you could bridge the 10 vlans and setup the dhcp-server on the bridge interface. you'd need to add a drop all rule in bridge firewall forward chain.
Put the gateway ip, hotspot and dhcpserver on bridge interface.Dear Sten and Tneumann,
Thanks for your information. Right now my 10 VLAN client can get IP Address from 1 DHCP Pool. But there is a new problem. When they try to access to internet, the Microtic doesn't redirect them to username and password page. The clients also can't ping to the gateway.
What should i do to enable them to access the internet?
Basically yes, but it gives you the ability to put layer 2 filters between the vlans. This is useful in situations where layer 2 connectivity is called for (such as for hotspot) but you would like to gain more control over the communication between different segments of the layer 2 network.isn't adding 10 vlans into a bridge the same thing as not using vlans?
It is kind of backwards and is not something you'd wanna do unless you have no other choice. If you drop all traffic between them the users on the different vlans can't talk to each other. The risk of sudden failure is moderate, which is usually too risky for me.isn't adding 10 vlans into a bridge the same thing as not using vlans? Why VLAN if you are just going to bridge them back to a single port? Seems backwards but maybe I am missing something.
That, routing between vlans, would be the better way to go about (considerably lower risk of failure). You could additionally go without relaying to further reduce risk of failure. However if you were to use ISC dhcpd then you might need to do some minor alterations to the source code to permit many interfaces.Are you giving each client on their own vlan their own subnet range? I think you can use the dhcp relay agent for that, one dhcp server that servers many subnets. The DHCP server listens on the local IP on each subnet and relays it to the main server.