Community discussions

MikroTik App
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Proper Way to Create Separate Network Not Bridged

Tue Jan 04, 2022 3:04 am

What is the proper way to create separate network that are not bridged?
I have the new RB450x4 and I would like to separate my LAN from my guest network, but would like to keep default firewall
Screen Shot 2022-01-03 at 6.31.31 PM.png
I can easily take port five (5) off the bridge but if I try port two (2), I am locked out since that's the port I am connected.
I would like port two (2) my LAN to have 10.0.8.0/24 and port five (5) my guest 172.17.9.0/24
If I configure the router say using port three (3) would that retain the default address 192.168.88.1?
This bridge is confusing...I had to open up the router to reset it.
You do not have the required permissions to view the files attached to this post.
Last edited by Nollitik on Sat Jan 08, 2022 6:29 am, edited 1 time in total.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Tue Jan 04, 2022 4:08 am

To make changes so you dont get locked out.
create one port off the bridge like this and do all your config from there......
viewtopic.php?t=181718
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Tue Jan 04, 2022 5:45 am

To make changes so you dont get locked out.
create one port off the bridge like this and do all your config from there......
viewtopic.php?t=181718
Okay I used port three to reconfigure the router; however, the step I am having issue with is where do I add say ether 2 to the trusted list so I can access the router?
I just tried login and it seems that it not accepting the admin user on that interface. I don't want keep connecting to the router with an Ethernet cable on ether 3 when my WIFI is on ether 2.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Tue Jan 04, 2022 6:42 pm

You add the WLAN interface to the list NOT the port........ but much thanks it was not clear on my article and have just made some modifications.
See if it reads better for you now!!

add interface=WLAN name list=manage
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Tue Jan 04, 2022 8:18 pm

You add the WLAN interface to the list NOT the port........ but much thanks it was not clear on my article and have just made some modifications.
See if it reads better for you now!!

add interface=WLAN name list=manage
I am not using Wlan...this is what I have setup...see images and it seems that I am dropping all traffic from the NolliLAN...how do I make both LAN(s) apart of default LAN so I don't need to create separate and more rules...just use default firewall rules? I only allow a pool of eight (8) on GuestLAN because I should not have more than eight guest needing to connect to my Internet at any time.
Screen Shot 2022-01-04 at 11.12.22 AM.png
Screen Shot 2022-01-04 at 12.00.09 PM.png
Screen Shot 2022-01-04 at 11.53.34 AM.png
Screen Shot 2022-01-04 at 11.50.29 AM.png
Screen Shot 2022-01-04 at 11.36.52 AM.png
Screen Shot 2022-01-04 at 11.17.09 AM.png
You do not have the required permissions to view the files attached to this post.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Wed Jan 05, 2022 2:38 pm

Pictures are nice but need to see the config
/export hide-sensitive file=anynameyou wish.

I should add that my advice was NOT to create a separate network but to create a separate access to the router for config purposes.
For a completely different subnet, besides IP address you need IP pool, dhcp server, dhcp server network etc.........
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Wed Jan 05, 2022 6:16 pm

Pictures are nice but need to see the config
/export hide-sensitive file=anynameyou wish.

I should add that my advice was NOT to create a separate network but to create a separate access to the router for config purposes.
For a completely different subnet, besides IP address you need IP pool, dhcp server, dhcp server network etc.........
Yes, I did create different subnets and all that's needed. Now, all I want to do is how to add those subnets to the default firewall rules
so that I don't need to create new rules.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Wed Jan 05, 2022 7:31 pm

Post your lastest config for assistance.
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Wed Jan 05, 2022 11:55 pm

Post your lastest config for assistance.
I am using Mac so cannot copy from Mikrotik terminal so I hope a pic will help. I didn't see any list called deconfig...
Screen Shot 2022-01-05 at 2.34.09 PM.png
Screen Shot 2022-01-05 at 2.39.11 PM.png
You do not have the required permissions to view the files attached to this post.
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 12:13 am

Just realize I could use the browser and copy from Terminal that way...so, here it is...

[nolli@MikroTik] > /export
# jan/05/2022 16:08:27 by RouterOS 7.1
# software id = 33B2-XGBT
#
# model = RB450Gx4
# serial number = ADBA0ACE537B
/interface bridge
add admin-mac=74:4D:28:21:60:52 auto-mac=no comment=defconf name=bridge
/disk
set sd1 disabled=no
set sd1-part1 disabled=no name=disk1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=pool1 ranges=10.0.8.2-10.0.8.254
add name=pool2 ranges=172.17.9.2-172.17.9.10
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
add address-pool=pool1 interface=ether2 name=NolliLAN server-address=10.0.8.1
add address-pool=pool2 interface=ether5 name=GuestLAN server-address=172.17.9.1
/port
set 0 name=serial0
/interface bridge port
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether5 list=LAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=10.0.8.1 interface=ether2 network=10.0.8.0
add address=172.17.9.1 interface=ether5 network=172.17.9.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=10.0.8.0/24 dns-server=10.0.8.1 gateway=10.0.8.1 netmask=24
add address=172.17.9.0/24 dns-server=172.17.9.1 gateway=172.17.9.1 netmask=24
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=192.168.1.1,10.0.8.1,172.17.9.1
/ip dns static
add address=10.0.8.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system clock
set time-zone-name=America/Chicago
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
[nolli@MikroTik] >
Last edited by Nollitik on Thu Jan 06, 2022 6:52 am, edited 2 times in total.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 3:25 am

Try using the code brackets around the config, it will shorten it up for viewing purposes (the black square with white square brackets on the same line as B I U etc.........
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 3:33 am

Looking at the config, so far so good!
- See three subnets one for the bridge and two for specific ports.

Not really wrong but not userful are these settings.
/ip dns
set allow-remote-requests=yes servers=192.168.1.1,10.0.8.1,172.17.9.1
( the router already knows these are the servers for the networks but they are not sources, try instead
1.1.1.2 and 9.9.9.9 as good dns servers (first one is cloudfare , the second is Quad9 dns service also very good).

/ip dns static
add address=10.0.8.1 comment=defconf name=router.lan
(this is from the default setup and can be removed).

The firewall rules are the default ones.
The only question I have is do you want to limit who can access the router itself (typically to configure it) as right now all LAN users have access??
Also right now you have no separation in firewall rules between subnets, is that the requirement??

Dont see IP route, so assuming you have this selected at the IP DHCP client setting?

Ahh I see your an IPV6 chap, well that counts me out, sorry, dont have a clue about ipv6 or its firewall rules......... l8r.........
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 7:20 am

Looking at the config, so far so good!
- See three subnets one for the bridge and two for specific ports.

Not really wrong but not userful are these settings.
/ip dns
set allow-remote-requests=yes servers=192.168.1.1,10.0.8.1,172.17.9.1
( the router already knows these are the servers for the networks but they are not sources, try instead
1.1.1.2 and 9.9.9.9 as good dns servers (first one is cloudfare , the second is Quad9 dns service also very good).

/ip dns static
add address=10.0.8.1 comment=defconf name=router.lan
(this is from the default setup and can be removed).

The firewall rules are the default ones.
The only question I have is do you want to limit who can access the router itself (typically to configure it) as right now all LAN users have access??
Also right now you have no separation in firewall rules between subnets, is that the requirement??

Dont see IP route, so assuming you have this selected at the IP DHCP client setting?

Ahh I see your an IPV6 chap, well that counts me out, sorry, dont have a clue about ipv6 or its firewall rules......... l8r.........

The DNS server 192.168.1.1 is pfSense which will have openDNS as sources and the Mikrotik will connect to the pfSense with that address for WAN.
The Mikrotik is king of my LAN which includes GuestLAN. I did not want any separation in firewall rules and all LAN passes through the default firewall rules.
So, I take it since I have:
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN; and
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether5 list=LAN
that all LAN will be govern by default firewall rules...correct? I don't recall setting up that DNS static but I am cool with it.
There is only one user > me, and I have disabled admin. I am not brave enough for IPv6 yet so that's default and I'll leave like that.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 3:30 pm

Yes, looks good,
Why not just put the opendns servers right in the MT, dont need pfsense for that??
/ip dns
set allow-remote-requests=yes servers=208.67.222.222,208.67.220.220
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 7:12 pm

Yes, looks good,
Why not just put the opendns servers right in the MT, dont need pfsense for that??
/ip dns
set allow-remote-requests=yes servers=208.67.222.222,208.67.220.220
The reason is I am using pfBlockerNG package on pfSense so all DNS request resolve there.
I am still having login issue from the 10.0.8.0 network without the Ethernet cable plugged in ether 3.
So, where should I create the management list...under firewall? I thought when I added the 10.0.8.1 interface to Winbox under manage
I would not have the issue.
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged

Thu Jan 06, 2022 7:47 pm

Interface menu selection is where you find to add a new LIST, its tricky to find I thing its a square box vice a pulldown..............
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Fri Jan 07, 2022 8:22 pm

Interface menu selection is where you find to add a new LIST, its tricky to find I thing its a square box vice a pulldown..............
There is no way...you'll just be creating another LAN that would have the same exact network. I even tried creating a firewall input rule
and that didn't work. Then I added the network to the user...that disabled the password and got locked out since admin was disabled.
So, no matter what I did, logging in from ether two network resulted in timeout...even putting input rule above all....appears default config a b.......
It's like the router is not recognizing the user unless an Ethernet cable is plugged in ether three bridge...must be a bug!
So, I export config for you to examine:

[admin@MikroTik] > /export
# jan/07/2022 11:48:45 by RouterOS 7.1
# software id = 33B2-XGBT
#
# model = RB450Gx4
# serial number = ADBA0ACE537B
/interface bridge
add admin-mac=74:4D:28:21:60:52 auto-mac=no comment=defconf name=bridge
/disk
set sd1 disabled=no
set sd1-part1 disabled=no name=disk1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=nolliLAN ranges=10.0.8.2-10.0.8.4,10.0.8.20-10.0.8.251
add name=guestLAN ranges=172.17.9.2-172.17.9.10
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
add address-pool=nolliLAN interface=ether2 lease-time=3d name=nolliLAN
add address-pool=guestLAN interface=ether5 lease-time=50m name=guestLAN
/port
set 0 name=serial0
/interface bridge port
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether5 list=LAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
add address=10.0.8.1 interface=ether2 network=10.0.8.0
add address=172.17.9.1 interface=ether5 network=172.17.9.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=10.0.8.0/24 dns-server=10.0.8.1,192.168.1.1 gateway=10.0.8.1 netmask=24
add address=172.17.9.0/24 dns-server=172.17.9.1,192.168.1.1 gateway=172.17.9.1 netmask=24
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall address-list
add address=10.0.8.1 list=nolliLAN-management
/ip firewall filter
add action=accept chain=input src-address-list=nolliLAN-management
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system clock
set time-zone-name=America/Chicago
/system ntp client
set enabled=yes
/system ntp client servers
add address=pool.ntp.org
add address=time.apple.com
add address=time.google.com
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
[admin@MikroTik] >
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19371
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Proper Way to Create Separate Network Not Bridged  [SOLVED]

Fri Jan 07, 2022 9:39 pm

NO its not a bug, its a user who has made mistakes in configuring the device.

(1) Just different
I shudder when people stray from norms, mostly because I get lost right quick.....
ex.
add name=nolliLAN ranges=10.0.8.2-10.0.8.4, 10.0.8.20-10.0.8.251
WHY??? in any case not wrong just weird from my perspective.

2. ERROR.
/IP address
.....................
add address=10.0.8.1 interface=ether2 network=10.0.8.0
add address=172.17.9.1 interface=ether5 network=172.17.9.0
Should be
add address=10.0.8.1/24 interface=ether2 network=10.0.8.0
add address=172.17.9.1/24 interface=ether5 network=172.17.9.0

3. Just different
Why put two what is gained ???
ip dhcp-server network
add address=10.0.8.0/24 dns-server=10.0.8.1,192.168.1.1 gateway=10.0.8.1 netmask=24
add address=172.17.9.0/24 dns-server=172.17.9.1,192.168.1.1 gateway=172.17.9.1 netmask=24
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1

4. Potential ERROR
Why .1, that is usually a reserved IP, and not the IP given and used by a Computer/device/user??
/ip firewall address-list
add address=10.0.8.1 list=nolliLAN-management

The list should be something like
add address=ip of admin desktop list=nolliLAN-management
add address=ip of admin laptop list=nolliLAN-management
add address=ip of admin smartphone list=nolliLAN-management
add address=ip of admin ipad list=nolliLAN-management
etc.......

5. Personal PReference
I would put his input chain rule after the INVALID rule in order.....
add action=accept chain=input src-address-list=nolliLAN-management

6. Just checking.
Assuming you have IP route established via the IP DHCP client settings as I see none on your config.
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Sat Jan 08, 2022 4:03 am

NO its not a bug, its a user who has made mistakes in configuring the device.
I LOL reading this and seeing some of my mistakes...
add name=nolliLAN ranges=10.0.8.2-10.0.8.4, 10.0.8.20-10.0.8.251
WHY??? in any case not wrong just weird from my perspective.
I have cameras, servers, and a switch that lives within 10.0.8.5-10.0.8.19 range statically. I have been setting it like that for eight years now starting with
my old RB450G.
Should be
add address=10.0.8.1/24 interface=ether2 network=10.0.8.0
add address=172.17.9.1/24 interface=ether5 network=172.17.9.0
Ah...I see the mistake...thanks for sharing!
add address=10.0.8.0/24 dns-server=10.0.8.1,192.168.1.1 gateway=10.0.8.1 netmask=24
add address=172.17.9.0/24 dns-server=172.17.9.1,192.168.1.1 gateway=172.17.9.1 netmask=24
Just to let the router know to look upstream if the request it's not cached.
4. Potential ERROR
Why .1, that is usually a reserved IP, and not the IP given and used by a Computer/device/user??
/ip firewall address-list
add address=10.0.8.1 list=nolliLAN-management

The list should be something like
add address=ip of admin desktop list=nolliLAN-management
add address=ip of admin laptop list=nolliLAN-management
add address=ip of admin smartphone list=nolliLAN-management
add address=ip of admin ipad list=nolliLAN-management
etc.......
I that put the subnet first last night as well as under user, then I got locked out because doing so chances the user password.
So, earlier today, I wasn't thinking as well as gotten frustrated that I had to deal with this today and ended up putting the ether 2's
address. I will put back the subnet so I am not limited.
5. Personal PReference
I would put his input chain rule after the INVALID rule in order.....
add action=accept chain=input src-address-list=nolliLAN-management
I had noticed in the firewall pic above in the thread that I was dropping traffic and concluded it must be my communication attempt
via the 10.0.8.0 network and why I placed it above invalid. I shall give it a try.
6. Just checking.
Assuming you have IP route established via the IP DHCP client settings as I see none on your config.
I have been configuring the router without connecting the WAN that's why and since it will be connected to pfSense and not a real WAN.
 
User avatar
Nollitik
Member Candidate
Member Candidate
Topic Author
Posts: 257
Joined: Tue Dec 07, 2010 8:16 am

Re: Proper Way to Create Separate Network Not Bridged

Sat Jan 08, 2022 6:26 am

It's all working now after figuring out my login/password problem for the second user.
I had been creating the password, reconfirmed it, then clicked apply, then, clicked okay.
Well doing so killed the newly created password when I clicked okay. One had only one
choice, one either click apply or clicks okay...not both, what a lesson!

I also followed Anav's suggestion of moving the input rule below the invalid rule...thank you, all is good.

Who is online

Users browsing this forum: Bing [Bot], pav5, shahzaddj1 and 186 guests