Информация
Услуги
  • Внедрение
  • Настройка
  • Поддержка
  • Ремонт
Контакты
Новинка
Распродажа
Новости
Доставка
Оплата
Загрузки
  • Прошивки
    • WinBox
    • RouterOS
    • Мобильные приложения MikroTik
    • Архив
  • Changelogs
  • RouterOS
  • Мобильные приложения MikroTik
  • Архив
Форум
Настройка
    info@mikrotik.moscow
    +7 495 320-55-52
    Заказать звонок
    Mikrotik.moscow
    Каталог
    • Акции
      Акции
    • Маршрутизаторы
      Маршрутизаторы
    • Коммутаторы
      Коммутаторы
    • Радиомосты и уличные точки доступа
      Радиомосты и уличные точки доступа
    • Wi-Fi для дома и офиса
      Wi-Fi для дома и офиса
    • LTE/5G
      LTE/5G
    • Powerline адаптеры
      Powerline адаптеры
    • IoT устройства
      IoT устройства
    • Оборудование 60 ГГц
      Оборудование 60 ГГц
    • Материнские платы RouterBOARD
      Материнские платы RouterBOARD
    • Корпуса
      Корпуса
    • Интерфейсы
      Интерфейсы
    • SFP/QSFP трансиверы
      SFP/QSFP трансиверы
    • Аксессуары
      Аксессуары
    • Антенны
      Антенны
    • Архив
      Архив
    Войти
    0 Сравнение
    0 Избранное
    0 Корзина
    Скачать WinBox Скачать Прошивки Форум > RouterOS Форум > SwOS Форум > Железо
    Mikrotik.moscow
    Каталог
    Войти
    0 Сравнение
    0 Избранное
    0 Корзина
    Mikrotik.moscow
    Телефоны
    +7 495 320-55-52
    Заказать звонок
    0
    0
    0
    Mikrotik.moscow
    • +7 495 320-55-52
      • Назад
      • Телефоны
      • +7 495 320-55-52
      • Заказать звонок
    • info@mikrotik.moscow
    • г. Москва, ул. Бакунинская, 84
    • Пн-Пт: 09-00 до 18-00
      Сб-Вс: выходной


    • Кабинет
    • 0 Сравнение
    • 0 Избранное
    • 0 Корзина
    Главная
    Форум
    RouterOS
    Помощь с настройкой домашней сети

    Помощь с настройкой домашней сети

    Форумы: RouterOS, Аппаратное обеспечение, SwOS, Обратная связь, Объявления, Сторонние инструменты
    Поиск  Пользователи  Правила  Войти
    Страницы: 1
    RSS
    Помощь с настройкой домашней сети, RouterOS
     
    msp01
    Guest
    #1
    0
    16.10.2022 22:51:00
    Всем привет! Я новичок в мире Mikrotik и решил сразу нырнуть с головой, чтобы организовать домашнюю сеть с VLAN, чтобы разделить сеть для IoT-устройств, гостей и прочего. Пользовался разными источниками, самые полезные, наверное, вот эти: http://forum.mikrotik.com/t/using-routeros-to-vlan-your-network/126489/1 — пример использования коммутатора с отдельным роутером; и очень полезное, хотя и простое видео про CAPsMAN: https://www.youtube.com/watch?v=taQ70m0DVYA.

    По топологии: HEX S роутер с RouterOS 6.48.6 — порт 1 — WAN, порт 2 (sfp1) забриджен и подключен к коммутатору CSS326 под управлением SwitchOS 2.13. На коммутаторе: порт 1 — trunk к роутеру, порт 2 — десктоп, порт 3 — сервер, порт 23 — CAP ac1, порт 24 — CAP ac2.

    Используются 4 VLAN: 10 — trusted, 20 — untrusted, 30 — guests и 99 — mgmt.

    В идеале хочу, чтобы клиенты в VLAN 20 и 30 могли выходить в интернет, но не общались ни с кем еще. VLAN 10 должен иметь доступ ко всем — 10, 20 и 30. Провёл тесты, и, похоже, мне удалось добиться цели (с .10 пингуются .20 и .30, с .20 и .30 пинги на другие VLAN не проходят), но я был бы рад, если кто-то посмотрел мою конфигурацию и дал советы. Прикрепляю текущий конфиг RouterOS и скриншоты конфигурации SwitchOS.  
     
     
     
    msp-cfg-hid.rsc (5.91 KB)
     
     
     
    msp01
    Guest
    #2
    0
    01.02.2023 02:05:00
    it has been a while, but I have to resuscitate this zombie. I have a couple of questions, but let me start laying down the topology I have in mind, the configs for each of the elements, and then my questions/concerns. topology: hex s config: msp-v3-hidden.rsc (8.2 KB) switch config: trunk port on eth1 to hex S access ports on eth2 and 3 to desktop and server trunk port on eth23 to CAP ac system: vlan: vlans: CAP ac config: msp-v4-capds-hidden.rsc (4.68 KB) Here are my two concerns: I have connectivity to home-guest wifi but cannot connect to home and home-iot. I cannot winbox into CAP ac → I have been trying to connect via desktop on VLAN 10, maybe i need to connect to VLAN 99 in order for this to work? Oddly I can connect to hex S winbox on 10.0.99.1 - did I misconfigure something?
     
     
     
    anav
    Guest
    #3
    0
    01.02.2023 02:11:00
    Thats hard on my eyes. Please provide the standard export file. /export file=anynameyouwish  ( minus router serial number and any public WANIP info )
     
     
     
    msp01
    Guest
    #4
    0
    01.02.2023 02:14:00
    apologies, I was experimenting with code block. it clearly didnt work and i wasnt expecting such a quick turn around… just edited the original post.
     
     
     
    anav
    Guest
    #5
    0
    01.02.2023 02:24:00
    Same comment those are not the export files.. … those are pcunites way of breaking down explaining how to use vlans and ur killin me LOL. /export file=anynameyouwish  (minus device serial # and any public WANIP information ) for both hex and capac…  ( getting late here so tomorrow )
     
     
     
    msp01
    Guest
    #6
    0
    01.02.2023 18:50:00
    there you go… to_anav_with_love-hex-config.rsc (4.91 KB) to_anav_with_love-capac-config.rsc (2.68 KB)
     
     
     
    anav
    Guest
    #7
    0
    01.02.2023 19:20:00
    CAPAC (1) Remove  PVID this is a trunk port !! /interface bridge port add bridge=cap_bridge frame-types=admit-only-vlan-tagged interface=ether1 pvid=99 (2) /ip neighbor discovery-settings set discover-interface-list= MGMT_LIST (3) Add /tool mac-server mac-winbox set allowed-interface-list=MGMT_LIST
     
     
     
    anav
    Guest
    #8
    0
    01.02.2023 19:25:00
    HEX (1)What have you really accomplished with these rules… ??  Nothing getting in  the way of functionality, just not best practice…figure it out add action=accept chain=input comment=“Allow VLANs to access router services” in-interface-list=MGMT_LIST add action=accept chain=input in-interface-list=TRUSTED_LIST add action=accept chain=input in-interface-list=UNTRUSTED_LIST (2) /tool mac-server set allowed-interface-list= NONE { not a secure method so should not be used }
     
     
     
    k6ccc
    Guest
    #9
    0
    01.02.2023 20:26:00
    Your arrangement is similar to mine with a router being used just as a router (or at least primarily) and the switch doing the switch functions - but I’m using a RB4011 router. Couple comments on the SwitchOS part.  It appears that port 1 is the router trunk, ports 2 & 3 are your local PC and server, and ports 23, 24, & SFP1 are trunk ports likely to APs Name the ports.  Although it looks like you are only using 6 ports on a 26 port switch (I have 4 of those at home), the more ports being used, the easier it is to forget what is where and make a mistake. On your trunk port, change VLAN receive mode to only tagged, and my preference is to use a dummy Default VLAN ID - I generally use 980 + port number - so port one would be VLAN 981.  Recommend not using 1 because too many devices want to use 1 and you can end up with things talking where you do not expect them to. You have what I think are the trunks to the APs set up with your management VLAN as untagged.  That may not be what you want.  Yes, that may depend on how your APs function.  If the APs function with all SSIDs as VLANs and untagged traffic for management of the AP, then this likely is correct. You are allowing management access on every port of the switch.  Not likely a good security plan. That’s enough for now…
     
     
     
    msp01
    Guest
    #10
    0
    02.02.2023 03:44:00
    excellent! thanks Anav and k6ccc for the valuable inputs. @anav - i find that without those 3 rules i dont get internet connectivity… is this not expected? the next issue I’m having: i can connect to all 3 SSIDs and have full internet connectivity, but one interesting behavior I’m seeing is: having shared folders on the notebook (SSID home/VLAN10) and on the desktop (VLAN 10 via switch port 2) I can access notebook’s share via desktop but I can’t access desktop’s share via notebook. Do I need to disable local_forwarding? how do I do with this config? @k6ccc - so far I have not put this hardware into action, i have it sitting in my office and have been trying to figure this puzzle for a while now… but naming the ports seems like a very sensitive approach to keeping things organized. you guessed correctly the port usage, and the untagged vlan 99 on port 23 was preventing me from accessing CAP remotely. all set now! my next question to both would be: I want to set another CAP on port 24 on the switch such that the plan is having 1 CAP upstairs, 1 downstairs and have client hover from one to the other. What are the suggested steps to achieve this? On CAP i suppose i need to set specific rules regarding when to let a client go depending on signal strength? On the switch, do i need to mirror traffic between ports?
     
     
     
    Buckeye
    Guest
    #11
    0
    02.02.2023 07:55:00
    If you are talking about the checkbox in the column under Mirror , that is to allow you to see traffic on that port from a single designated port, where you would have a device capturing traffic for analysis.  So unless that is what you want to do, you would not use the Mirror feature.
     
     
     
    anav
    Guest
    #12
    0
    02.02.2023 13:25:00
    mps01, your first question is so vague which three rules?  which user cannot get internet… etc..   if you have issue you need to spend more energy describing them fully. As for two devices on the same vlan correct they should be able to see each other. However you are talking two PCs,  that often have their own firewalls on the PCs.  there is nothing stopping traffic from the MT side of the  house for two devices on the same vlan.
     
     
     
    msp01
    Guest
    #13
    0
    02.02.2023 14:28:00
    sorry, i thought it would be clear since you only mentioned rules once, but here it is… (1)What have you really accomplished with these rules… ?? Nothing getting in the way of functionality, just not best practice…figure it out > add action=accept chain=input comment=“Allow VLANs to access router services” in-interface-list=MGMT_LIST add action=accept chain=input in-interface-list=TRUSTED_LIST add action=accept chain=input in-interface-list=UNTRUSTED_LIST I find that without these rules, I dont have internet connectivity. regarding devices on same vlan being able to ‘see’ each other I will do some tests later today and revert back. Regarding having 2 CAPacs setup and having clients roaming between devices, any suggestions/pointers? thx
     
     
     
    anav
    Guest
    #14
    0
    02.02.2023 15:03:00
    Capac are not devices that facilitate roaming to any great extent.  The features you are looking for or found on much newer access points and do not believe actually fully implemented on the newest ax3 devices but perhaps someone can better speak to that part of your question.  Should add that roaming is more a function of the device being used ( aka your smartphone ) then it is the access point! The reason I asked the internet question is because, the input chain rule has nothing to with internet access!! Its important you understand that the input chain is SOLELY traffic TO the router for SERVICES from the router. Typically one has  LAN to ROUTER traffic and  WAN to router traffic  ( output chain is advanced usage ) examples  users need DNS from router, and  an incoming VPN connection needs to access router vpn services. The forward chain which is traffic thru the router  ( WAN to LAN, LAN to LAN, LAN to WAN ) is where we allow LAN to WAN traffic. add chain=forward action=accept in-interface-list=LAN  out-interface-list=WAN If you are not getting internet when you modify the rules noted.  It means your users are not able to access DNS services which is a necessary step to get out to the internet. Therefore it makes sense that you dont LOL. However I never said to remove them I asked you to look at them, make sense of them and come to the realization that you have missed ! What you should have noticed is that add action=accept chain=input comment=“Allow VLANs to access router services” in-interface-list=MGMT_LIST add action=accept chain=input in-interface-list=TRUSTED_LIST add action=accept chain=input in-interface-list=UNTRUSTED_LIST what you have effectively done here is allow WHO full access to the router… Every stinking soul. /interface list member add interface=ether1 list=WAN_LIST add interface=MGMT list=MGMT_LIST add interface=MGMT list=TRUSTED_LIST add interface=MGMT list=UNTRUSTED_LIST add interface=TRUSTED list=TRUSTED_LIST add interface=UNTRUSTED list=UNTRUSTED_LIST add interface=GUEST list=UNTRUSTED_LIST add interface=ether5-access list=MGMT_LIST YOUR LISTS NEEDS WORK! Interface lists are optimal for two or more subnets that will have common firewall rules… An interface list with a single subnet is the exception and is for the single subnet that is trusted, usually the management vlan but if one does not have a dedicated management vlan then a trusted vlan.   You have both trusted and management which is very confusing… In other words,  the trusted subnet is one where the admin normally resides to do all his/her work.  Its not clear what you are doing LOL. I will assume you have created a management interface with an etherport available on the router for you to plug into at any time or on a managed switch on your desk. I will assume you are normally  plugged into the trusted lan. Recommend.  Keep management VLAN and it should be the only member of the MANAGEMENT  Interface list. If you, as admin, are not normally on the MGMT VLAN but are on the TRUSTED vlan then simply make a firewall rule giving you access… add action=accept chain=forward  in-interface=TRUSTED out-interface=MGMT src-address=adminIPaddress add interface=ether1 list=WAN_LIST add interface=MGMT list=MGMT_LIST add interface=MGMT list=LAN_LIST add interface=TRUSTED list=LAN_LIST add interface=UNTRUSTED list=LAN_LIST add interface=GUEST list=LAN_LIST add interface=UNTRUSTED list=UNTRUSTED_LIST add interface=GUEST list=UNTRUSTED_LIST as far as your firewall rules go… add action=accept chain=input in-interface-list=MGMT_LIST  { access to router for config if connected to isolated management vlan } add action=accept chain=input in-interface=TRUSTED src-address=AdminIP { access to config from Trusted vlan but only from admin IP } add action=accept chain=input in-interface-list=LAN_LIST dst-port=53,123  protocol=tcp  { access to needed services by all } add action=accept chain=input in-interface-list=LAN_LIST dst=port=53 protocol=udp  { access to needed services by all } In terms of your forward chain your rules are convoluted… add action=accept chain=forward comment=“Internet Access” connection-state= new in-interface-list=TRUSTED_LIST out-interface-list=WAN_LIST add action=accept chain=forward connection-state=new in-interface-list= UNTRUSTED_LIST out-interface-list=WAN_LIST add action=accept chain=forward comment=“Allow MGMT → All VLANs” connection-state=new in-interface-list=MGMT_LIST out-interface-list= WAN_LIST add action=accept chain=forward comment=“Allow TRUSTED in → UNTRUSTED out” connection-state=new in-interface-list=TRUSTED_LIST out-interface-list= UNTRUSTED_LIST Much clearer… add action=accept chain=forward comment=“Internet Access” in-interface-list=LAN_LIST out-interface-list=WAN_LIST As for trusted to untrusted… its a bit vague for me to comment. Do you have users on the normal LAN ( trusted subnet  ) that needs access to the untrusted or guest network and if so for what purposes. I am trying to ascertain if its only the admin that needs access or if there is a common device on the guest or untrusted network people need access too. Further within the untrusted subnets,  do guest users need access to untrusted, or vice versa, do untrusted need access to guest users…
     
     
     
    Buckeye
    Guest
    #15
    0
    02.02.2023 15:17:00
    Some useful posting guidelines: Getting Answers and How to Report Bugs Effectively (pay attention to the last 2 paragraphs). Even though those were not written specifically for networking questions, the principles apply.
     
     
     
    Страницы: 1
    Читают тему
    +7 495 320-55-52
    info@mikrotik.moscow
    Электрозаводская, Бауманская
    Москва, ул. Бакунинская, 84с21
    Конфиденциальность Оферта
    © 2025 «Mikrotik.Moscow»
    Главная Каталог 0 Корзина 0 Избранные Кабинет 0 Сравнение Акции Контакты Услуги Бренды Отзывы Компания Лицензии Документы Реквизиты Поиск Блог Обзоры