networking:mikrotik:wireless_vlan
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:mikrotik:wireless_vlan [2019/11/27 06:57] – admin | networking:mikrotik:wireless_vlan [2020/02/27 06:49] (current) – rplecko | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== Mikrotik wireless with dual band / dual SSID ===== | + | ===== Mikrotik wireless with dual band / dual SSID / multiple VLANs ===== |
| - | [[http:// | + | [[http:// |
| - | The purpose of this example is to explain how to create dual SSID AP with separated traffic. How to transport the separated traffic to another device via VLAN-s and finaly how to disable trafic between VLAN-s but enable them both to access Internet. We are using two Mikrotik devices. First is "hEX S" (Router_1) which is connected to internet, and taking care of traffic separation, and second is "cAP ac" (AP_1) acting as dual band AP with separated private and public SSID. | + | The purpose of this example is to explain how to create dual SSID on dual band AP with separated traffic. How to transport the separated traffic to another device via VLAN-s and finaly how to disable trafic between VLAN-s but enable them both to access Internet. We are using two Mikrotik devices. First is "hEX S" (Router_1) which is connected to internet, and taking care of traffic separation, and second is "cAP ac" (AP_1) acting as dual band AP with separated private and public SSID. |
| We will assume that you already have access to internet via ether4 on Router_1 whether using ADSL or a leased line. | We will assume that you already have access to internet via ether4 on Router_1 whether using ADSL or a leased line. | ||
| ==== Configuring Router_1 (hEX S) ==== | ==== Configuring Router_1 (hEX S) ==== | ||
| + | |||
| + | {{: | ||
| 1. Create neccessary bridges (**bridge_VLAN**, | 1. Create neccessary bridges (**bridge_VLAN**, | ||
| Line 32: | Line 34: | ||
| </ | </ | ||
| - | 4. Add trunk port to **bridge_VLAN** | + | 4. Add trunk port (tagged) |
| < | < | ||
| /interface bridge | /interface bridge | ||
| Line 38: | Line 40: | ||
| </ | </ | ||
| - | 5. Add access port to **bridge_priv_101** | + | 5. Add access port (untagged) |
| < | < | ||
| /interface bridge | /interface bridge | ||
| Line 61: | Line 63: | ||
| add address=10.100.201.0/ | add address=10.100.201.0/ | ||
| </ | </ | ||
| - | You can also do it by clicking <hi # | + | |
| + | | ||
| 8. Add firewall rule to prohibit public users to access private network. | 8. Add firewall rule to prohibit public users to access private network. | ||
| Line 71: | Line 74: | ||
| ==== Configuring AP_1 (hAP ac) ==== | ==== Configuring AP_1 (hAP ac) ==== | ||
| + | |||
| + | {{: | ||
| 1. Create neccessary bridges (**bridge_VLAN**, | 1. Create neccessary bridges (**bridge_VLAN**, | ||
| Line 103: | Line 108: | ||
| 5. Add access port to **bridge_pub_201**. The purpose of this is to enable to connect a device (e.g. Smart TV) to the AP and restrict it to Internet only. | 5. Add access port to **bridge_pub_201**. The purpose of this is to enable to connect a device (e.g. Smart TV) to the AP and restrict it to Internet only. | ||
| < | < | ||
| - | interface bridge port add bridge=bridge_pub_201 interface=ether2 | + | /interface bridge port |
| + | add bridge=bridge_pub_201 interface=ether2 | ||
| </ | </ | ||
| Line 130: | Line 136: | ||
| </ | </ | ||
| - | Now you have AP with two SSID (**Private** and **Public**) on both bands (2,4 and 5 GHz), for each of them separate security | + | Now you have AP with two SSID (**Private** and **Public**) on both bands (2,4 and 5 GHz), for each of them separate security |
| - | Do not forget to change them !!! | + | |
| - | The traffic from both of them is transported through trunk port to **Router_1** vhere the DHCP server for each subnet is running. Traffic on private wireless is bridged to the **ethernet1** to which the rest of the wired network is connected. Firewall rule prohibits users connected to **Public** SSID to access private network. | + | <fc #ff0000>Do not forget to change them !!!</ |
| + | |||
| + | The traffic from both of them is transported through trunk port to **Router_1** vhere the DHCP server for each subnet is running. Traffic on private wireless is bridged to the **ethernet1** to which the rest of the wired network is connected. Firewall rule prohibits users connected to **Public** SSID to access private network. | ||
networking/mikrotik/wireless_vlan.1574837877.txt.gz · Last modified: 2019/11/27 06:57 by admin
