networking:mikrotik:wireless_vlan
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:mikrotik:wireless_vlan [2019/11/26 10:21] – rplecko | networking:mikrotik:wireless_vlan [2020/02/27 06:49] (current) – rplecko | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== Mikrotik wireless with dual band / dual SSID ===== | + | ===== Mikrotik wireless with dual band / dual SSID / multiple VLANs ===== |
| - | {{ : | + | [[http:// |
| - | The purpose of this example is to explain how to create dual SSID AP with separated traffic. How to transport the separated traffic to another device via VLAN-s and finaly how to disable trafic between VLAN-s but enable them both to access Internet. | + | The purpose of this example is to explain how to create dual SSID on dual band AP with separated traffic. How to transport the separated traffic to another device via VLAN-s and finaly how to disable trafic between VLAN-s but enable them both to access Internet. We are using two Mikrotik devices. First is "hEX S" (Router_1) which is connected to internet, and taking care of traffic separation, and second is "cAP ac" (AP_1) acting as dual band AP with separated private and public SSID. |
| - | We are using two Mikrotik devices. First is "hEX S" (Router_1) which is connected to internet, and taking care of traffic separation, and second is "cAP ac" (AP_1) acting as dual band AP with separated private and public SSID. | + | |
| We will assume that you already have access to internet via ether4 on Router_1 whether using ADSL or a leased line. | We will assume that you already have access to internet via ether4 on Router_1 whether using ADSL or a leased line. | ||
| - | ==== Configuring Router_1 (hEX S)==== | + | ==== Configuring Router_1 (hEX S) ==== |
| + | {{: | ||
| 1. Create neccessary bridges (**bridge_VLAN**, | 1. Create neccessary bridges (**bridge_VLAN**, | ||
| + | < | ||
| + | /interface bridge | ||
| + | add name=bridge_VLAN | ||
| + | add name=bridge_priv_101 | ||
| + | add name=bridge_pub_201 | ||
| + | </ | ||
| - | | + | 2. Create VLAN interfaces on **bridge_VLAN** |
| - | add name=bridge_VLAN | + | < |
| - | add name=bridge_priv_101 | + | / |
| - | add name=bridge_pub_201 | + | add interface=bridge_VLAN name=vlan_101 vlan-id=101 |
| + | add interface=bridge_VLAN | ||
| + | </ | ||
| - | 2. Add neccessary IP addressess. | + | 3. Add VLAN interfaces to corresponding bridges |
| - | ip address add address=10.100.101.254/24 interface=bridge_priv_101 | + | < |
| - | ip address | + | / |
| + | port add bridge=bridge_priv_101 | ||
| + | port add bridge=bridge_pub_201 | ||
| + | </ | ||
| - | 3. Create VLAN interfaces on **bridge_VLAN** | + | 4. Add trunk port (tagged) to **bridge_VLAN** |
| + | < | ||
| + | /interface bridge | ||
| + | port add bridge=bridge_VLAN interface=ether2 | ||
| + | </ | ||
| - | | + | 5. Add access port (untagged) to **bridge_priv_101** |
| - | add interface=bridge_VLAN name=vlan_101 vlan-id=101 | + | < |
| - | add interface=bridge_VLAN name=vlan_201 vlan-id=201 | + | / |
| + | port add bridge=bridge_priv_101 | ||
| + | </ | ||
| - | 4. Add VLAN interfaces to corresponding bridges | + | 6. Add neccessary IP addressess. |
| - | | + | < |
| - | | + | /ip address |
| - | | + | add address=10.100.101.254/ |
| - | + | add address=10.100.201.254/ | |
| - | 5. Add trunk port to **bridge_VLAN** | + | </ |
| - | | + | 7. Add DHCP servers to **bridge_priv_101** and **bridge_pub_201** |
| - | | + | < |
| + | /ip pool | ||
| + | add name=dhcp_pool101 ranges=10.100.101.1-10.100.101.253 | ||
| + | add name=dhcp_pool201 ranges=10.100.201.1-10.100.201.253 | ||
| + | /ip dhcp-server network | ||
| + | add address=10.100.101.0/ | ||
| + | add address=10.100.201.0/ | ||
| + | </ | ||
| - | 6. Add access port to **bridge_priv_101** | + | You can also do it by clicking <hi # |
| - | /interface bridge | + | 8. Add firewall rule to prohibit public users to access private network. |
| - | port add bridge=bridge_priv_101 interface=ether1 | + | |
| - | 7. Add DHCP servers to **bridge_priv_101** and **bridge_pub_201** | + | < |
| - | + | /ip firewall filter | |
| - | 8. Add firewall rule to prohibit access to private network for public users. | + | add action=reject chain=forward dst-address=10.100.101.0/24 reject-with=icmp-admin-prohibited src-address=10.100.201.0/ |
| + | </ | ||
| + | ==== Configuring AP_1 (hAP ac) ==== | ||
| - | ==== Configuring AP_1 (hAP ac)==== | + | {{: |
| 1. Create neccessary bridges (**bridge_VLAN**, | 1. Create neccessary bridges (**bridge_VLAN**, | ||
| - | + | < | |
| - | /interface bridge | + | /interface bridge |
| - | add name=bridge_VLAN | + | add name=bridge_VLAN |
| - | add name=bridge_priv_101 | + | add name=bridge_priv_101 |
| - | add name=bridge_pub_201 | + | add name=bridge_pub_201 |
| + | </ | ||
| 2. Create VLAN interfaces on **bridge_VLAN** | 2. Create VLAN interfaces on **bridge_VLAN** | ||
| - | + | < | |
| - | /interface vlan | + | /interface vlan |
| - | add interface=bridge_VLAN name=vlan_101 vlan-id=101 | + | add interface=bridge_VLAN name=vlan_101 vlan-id=101 |
| - | add interface=bridge_VLAN name=vlan_201 vlan-id=201 | + | add interface=bridge_VLAN name=vlan_201 vlan-id=201 |
| + | </ | ||
| 3. Add VLAN interfaces to corresponding bridges | 3. Add VLAN interfaces to corresponding bridges | ||
| - | | + | < |
| - | add bridge=bridge_priv_101 interface=vlan_101 | + | /interface bridge port |
| - | add bridge=bridge_pub_201 interface=vlan_201 | + | add bridge=bridge_priv_101 interface=vlan_101 |
| - | + | add bridge=bridge_pub_201 interface=vlan_201 | |
| + | </ | ||
| 4. Add trunk port to **bridge_VLAN** | 4. Add trunk port to **bridge_VLAN** | ||
| + | < | ||
| + | /interface bridge port | ||
| + | add bridge=bridge_VLAN interface=ether1 | ||
| + | </ | ||
| - | | + | 5. Add access port to **bridge_pub_201**. The purpose of this is to enable to connect a device (e.g. Smart TV) to the AP and restrict it to Internet only. |
| + | < | ||
| + | /interface bridge port | ||
| + | add bridge=bridge_pub_201 | ||
| + | </ | ||
| - | 5. Add access port to **bridge_pub_201**. The purpose of this is to enable to connect a device (e.g. Smart TV) to the AP and restrict it to Internet only. | ||
| - | |||
| - | interface bridge port add bridge=bridge_pub_201 interface=ether2 | ||
| - | | ||
| 6. Create and virtual wireless interfaces and security profiles | 6. Create and virtual wireless interfaces and security profiles | ||
| Line 85: | Line 118: | ||
| set [ find default=yes ] supplicant-identity=MikroTik | set [ find default=yes ] supplicant-identity=MikroTik | ||
| add authentication-types=wpa-psk, | add authentication-types=wpa-psk, | ||
| - | add authentication-types=wpa-psk, | + | add authentication-types=wpa-psk, |
| /interface wireless | /interface wireless | ||
| set [ find default-name=wlan1 ] band=2ghz-g/ | set [ find default-name=wlan1 ] band=2ghz-g/ | ||
| Line 91: | Line 124: | ||
| set [ find default-name=wlan2 ] band=5ghz-a/ | set [ find default-name=wlan2 ] band=5ghz-a/ | ||
| add disabled=no keepalive-frames=disabled master-interface=wlan2_Private multicast-buffering=disabled name=wlan2_Public security-profile=profile_public ssid=Public vlan-id=201 wds-cost-range=0 wds-default-cost=0 wps-mode=disabled | add disabled=no keepalive-frames=disabled master-interface=wlan2_Private multicast-buffering=disabled name=wlan2_Public security-profile=profile_public ssid=Public vlan-id=201 wds-cost-range=0 wds-default-cost=0 wps-mode=disabled | ||
| - | |||
| </ | </ | ||
| 7. Add wireless interfaces to corresponding bridges | 7. Add wireless interfaces to corresponding bridges | ||
| - | | + | < |
| - | add bridge=bridge_priv_101 interface=wlan1_Private | + | /interface bridge port |
| - | add bridge=bridge_priv_101 interface=wlan2_Private | + | add bridge=bridge_priv_101 interface=wlan1_Private |
| - | add bridge=bridge_pub_201 interface=wlan1_Public | + | add bridge=bridge_priv_101 interface=wlan2_Private |
| - | add bridge=bridge_pub_201 interface=wlan2_Public | + | add bridge=bridge_pub_201 interface=wlan1_Public |
| + | add bridge=bridge_pub_201 interface=wlan2_Public | ||
| + | </ | ||
| + | |||
| + | Now you have AP with two SSID (**Private** and **Public**) on both bands (2,4 and 5 GHz), for each of them separate security profile is created (**profile_private** and **profile_public**) where the authentication passwords are stored (// | ||
| + | |||
| + | <fc # | ||
| + | The traffic from both of them is transported through trunk port to **Router_1** vhere the DHCP server for each subnet is running. Traffic on private wireless is bridged to the **ethernet1** to which the rest of the wired network is connected. Firewall rule prohibits users connected to **Public** SSID to access private network. | ||
| - | ...to be continued.... | ||
networking/mikrotik/wireless_vlan.1574763661.txt.gz · Last modified: 2019/11/26 10:21 by rplecko
