Ik geraak er echt niet uit... En hoop dat jullie me kunnen helpen.
Kopietje van mijn vraag op het Mikrotik forum en aan Mikrotik support (zonder antwoord voorlopig) hieronder:
---
Ik heb net een CCR2116 gekocht waarmee ik mijn pfSense-router wil vervangen.
Clients op VLAN10 en VLAN9 zouden de enige VLAN's moeten zijn die toegang hebben tot internet.
Wat ik heb opgemerkt:
Config:
/ip route print detail
/ip firewall nat print
/ip firewall nat print stats
/ip firewall filter print
/ip firewall filter print stats
/interface list member print
/ip address print
/ip dhcp-client print detail
edit: post van engels naar nederlands vertaald
Kopietje van mijn vraag op het Mikrotik forum en aan Mikrotik support (zonder antwoord voorlopig) hieronder:
---
Ik heb net een CCR2116 gekocht waarmee ik mijn pfSense-router wil vervangen.
- primaire WAN (dhcp) is nog niet verbonden (sfp1-xgspon)
- backup WAN (dhcp) is verbonden met ether3 (Technicolor DOCSIS-modem voor Orange ISP)
- LAN is verbonden via een trunk op 2 geaggregeerde poorten ether1 en ether2 met mijn unifi-switchnetwerk
Clients op VLAN10 en VLAN9 zouden de enige VLAN's moeten zijn die toegang hebben tot internet.
Wat ik heb opgemerkt:
- DHCP-client werkt voor WAN. Default route wordt aangemaakt.
- Inter-VLAN-routering werkt.
- MACVLan-regels voor mdns werken ook
- De router kan internet pingen en DNS resolven
- Clients op vlan10 kunnen DNS resolven met de router als dns-server
- Clients op vlan10 kunnen geen toegang krijgen tot internet (http/https) en kunnen ook niet 1.1.1.1 pingen. Maar ze zouden dat dus wel moeten kunnen …
- Ik kan de beheerpagina van de modem op 192.168.100.1 openen
- Wanneer ik probeer verbinding te maken vanaf het internet naar mijn HTTP/HTTPS-server, nemen de dstnat-rule stats toe. Maar ik krijg geen antwoord, dus er wordt geen webpagina weergegeven.
- alle drop-regels op de firewall uit te schakelen
- rechtstreeks naar de ether3-interface te verwijzen in plaats van de WAN-interfacelijst te gebruiken
- upgraden naar 7.17beta2. Nu weer op 7.16
- Het Mikrotik forum bevraagd https://forum.mikrotik.com/viewtopic.php?p=1102509
- Support bevraagd
- Ik heb zelfs aan chatgpt gevraagd wat er mis was met de config...
Config:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
| /interface bridge add name=bridge priority=0 vlan-filtering=yes add name=bridge-mdns protocol-mode=none /interface ethernet set [ find default-name=ether1 ] name=ether1-lag-trunk set [ find default-name=ether2 ] name=ether2-lag-trunk set [ find default-name=ether3 ] name=ether3-wan-backup set [ find default-name=ether13 ] name=ether13-localmanagement set [ find default-name=sfp-sfpplus1 ] name=sfp1-xgspon set [ find default-name=sfp-sfpplus4 ] name=sfp4-server-trunk /interface vlan add interface=bridge name=vlan1-management vlan-id=1 add interface=bridge name=vlan5-iot vlan-id=5 add interface=bridge name=vlan6-cameras vlan-id=6 add interface=bridge name=vlan9-iotonline vlan-id=9 add interface=bridge name=vlan10-lan vlan-id=10 add interface=bridge name=vlan15-wifiguests vlan-id=15 /interface macvlan add interface=vlan5-iot mac-address=6A:95:4C:51:4D:B0 mode=private name=macvlan5-iot add interface=vlan6-cameras mac-address=8E:33:47:CE:8C:E3 mode=private name=macvlan6-cameras add interface=vlan9-iotonline mac-address=6E:FB:2B:AE:07:E5 mode=private name=macvlan9-iotonline add interface=vlan10-lan mac-address=4E:CD:E3:3E:B1:FF mode=private name=macvlan10-lan /interface bonding add mode=802.3ad name=lag-trunk slaves=ether1-lag-trunk,ether2-lag-trunk /interface list add name=LAN add name=ManagementAllowed add name=WAN /ip dhcp-server option add code=43 name="Unifi adopt" value=0x0104c0a805d2 /ip pool add name=pool-lan-dhcp ranges=192.168.10.2-192.168.10.99 add name=pool-iot-dhcp ranges=192.168.8.2-192.168.8.99 add name=pool-cameras-dhcp ranges=192.168.6.2-192.168.6.99 add name=pool-wifiguests-dhcp ranges=192.168.15.2-192.168.15.99 add name=pool-iotonline-dhcp ranges=192.168.9.2-192.168.9.99 add name=pool-management-dhcp ranges=192.168.5.2-192.168.5.99 add name=pool-ipsec-dhcp ranges=192.168.20.2-192.168.20.99 /ip dhcp-server add address-pool=pool-lan-dhcp interface=vlan10-lan lease-time=2h name=dhcp-vlan10-lan add address-pool=pool-iot-dhcp interface=vlan5-iot lease-time=2h name=dhcp-vlan5-iot add address-pool=pool-cameras-dhcp disabled=yes interface=vlan6-cameras lease-time=2h name=dhcp-vlan6-cameras add address-pool=pool-wifiguests-dhcp interface=vlan15-wifiguests lease-time=2h name=dhcp-vlan15-wifiguests add address-pool=pool-iotonline-dhcp interface=vlan9-iotonline lease-time=2h name=dhcp-vlan9-iotonline add address-pool=pool-management-dhcp interface=vlan1-management lease-time=2h name=dhcp-vlan1-management /port set 0 name=serial0 /interface bridge filter add action=accept chain=forward comment="1. Allow mDNS queries from vlan10-lan" dst-address=224.0.0.251/32 dst-mac-address=01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 in-interface=\ macvlan10-lan ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns src-port=5353 add action=accept chain=forward comment="2. Allow mDNS replies to vlan10-lan" dst-address=224.0.0.251/32 dst-mac-address=01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 in-bridge=\ bridge-mdns ip-protocol=udp mac-protocol=ip out-interface=macvlan10-lan src-port=5353 add action=drop chain=forward comment="3. Drop mDNS queries from other VLANs" disabled=yes dst-address=224.0.0.251/32 dst-mac-address=01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 \ in-bridge=bridge-mdns ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns src-port=5353 add action=accept chain=forward comment="Allow mDNS only" disabled=yes dst-address=224.0.0.251/32 dst-mac-address=01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 in-bridge=bridge-mdns \ ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns src-port=5353 add action=accept chain=forward comment="1. Allow SSDP queries from vlan10-lan" dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1900 in-interface=\ macvlan10-lan ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=accept chain=forward comment="2. Allow SSDP replies to vlan10-lan" dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1900 in-bridge=\ bridge-mdns ip-protocol=udp mac-protocol=ip out-interface=macvlan10-lan add action=drop chain=forward comment="3. Drop SSDP queries from other VLANs" disabled=yes dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1900 \ in-bridge=bridge-mdns ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=accept chain=forward comment="Forward SSDP" disabled=yes dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1900 in-bridge=bridge-mdns \ ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=accept chain=forward comment="1. Allow Sonos queries from vlan10-lan" dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1902 \ in-interface=macvlan10-lan ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=accept chain=forward comment="2. Allow Sonos replies to vlan10-lan" dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1902 in-bridge=\ bridge-mdns ip-protocol=udp mac-protocol=ip out-interface=macvlan10-lan add action=drop chain=forward comment="3. Drop Sonos queries from other VLANs" disabled=yes dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1902 \ in-bridge=bridge-mdns ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=accept chain=forward comment="Forward Sonos" disabled=yes dst-address=239.255.255.250/32 dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1902 in-bridge=bridge-mdns \ ip-protocol=udp mac-protocol=ip out-bridge=bridge-mdns add action=drop chain=forward comment="Drop all other L2 traffic" in-bridge=bridge-mdns out-bridge=bridge-mdns /interface bridge nat add action=src-nat chain=srcnat comment="mDNS - SNAT to Primary VLAN bridge" dst-mac-address=01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF to-src-mac-address=F4:1E:57:3D:AA:E5 add action=src-nat chain=srcnat comment="SSDP - SNAT to Primary VLAN bridge" dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF to-src-mac-address=F4:1E:57:3D:AA:E5 /interface bridge port add bridge=bridge interface=sfp4-server-trunk add bridge=bridge interface=lag-trunk add bridge=bridge interface=ether12 add bridge=bridge interface=ether10 pvid=10 add bridge=bridge interface=ether9 pvid=9 add bridge=bridge interface=ether8 pvid=5 add bridge=bridge interface=ether6 pvid=6 add bridge=bridge interface=ether5 pvid=5 add bridge=bridge-mdns interface=macvlan5-iot add bridge=bridge-mdns interface=macvlan6-cameras add bridge=bridge-mdns interface=macvlan9-iotonline add bridge=bridge-mdns interface=macvlan10-lan /ip neighbor discovery-settings set discover-interface-list=ManagementAllowed /ipv6 settings set disable-ipv6=yes /interface bridge vlan add bridge=bridge tagged=lag-trunk,bridge,sfp4-server-trunk untagged=ether10 vlan-ids=10 add bridge=bridge tagged=bridge,lag-trunk,sfp4-server-trunk untagged=ether5 vlan-ids=5 add bridge=bridge tagged=bridge,lag-trunk,sfp4-server-trunk untagged=ether6 vlan-ids=6 add bridge=bridge tagged=bridge,lag-trunk,sfp4-server-trunk untagged=ether12 vlan-ids=1 add bridge=bridge tagged=bridge,lag-trunk,sfp4-server-trunk untagged=ether9 vlan-ids=9 add bridge=bridge tagged=bridge,lag-trunk,sfp4-server-trunk vlan-ids=15 /interface ethernet switch set 0 l3-hw-offloading=yes name=switch /interface list member add interface=bridge list=LAN add interface=vlan10-lan list=ManagementAllowed add interface=vlan1-management list=ManagementAllowed add interface=ether13-localmanagement list=ManagementAllowed add interface=ether3-wan-backup list=WAN add interface=sfp1-xgspon list=WAN /interface ovpn-server servers add mac-address=FE:CB:7E:18:7D:DE name=ovpn-server1 /ip address add address=192.168.5.1/24 interface=vlan1-management network=192.168.5.0 add address=192.168.8.1/24 interface=vlan5-iot network=192.168.8.0 add address=192.168.9.1/24 interface=vlan9-iotonline network=192.168.9.0 add address=192.168.10.1/24 interface=vlan10-lan network=192.168.10.0 add address=192.168.15.1/24 interface=vlan15-wifiguests network=192.168.15.0 add address=192.168.6.1/24 interface=vlan6-cameras network=192.168.6.0 /ip cloud set update-time=no /ip dhcp-client add default-route-distance=2 interface=ether3-wan-backup use-peer-dns=no use-peer-ntp=no # Interface not active add interface=sfp1-xgspon use-peer-dns=no use-peer-ntp=no /ip dhcp-server network add address=192.168.5.0/24 dhcp-option="Unifi adopt" dns-server=192.168.5.1 gateway=192.168.5.1 add address=192.168.6.0/24 dns-server=192.168.6.1 gateway=192.168.6.1 add address=192.168.8.0/24 dns-server=192.168.8.1 gateway=192.168.8.1 add address=192.168.9.0/24 dns-server=192.168.9.1 gateway=192.168.9.1 add address=192.168.10.0/24 dns-server=192.168.10.210 gateway=192.168.10.1 add address=192.168.15.0/24 dns-server=192.168.15.1 gateway=192.168.15.1 /ip dns set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1 /ip firewall address-list add address=192.168.9.160 list=sonos add address=192.168.9.161 list=sonos add address=192.168.9.162 list=sonos add address=192.168.9.163 list=sonos add address=192.168.9.164 list=sonos add address=192.168.9.165 list=sonos add address=192.168.8.145 list=tuya add address=192.168.8.146 list=tuya /ip firewall filter add action=fasttrack-connection chain=forward comment="fast-track for established,related" connection-state=established,related hw-offload=yes add action=accept chain=forward comment="accept established,related,untracked" connection-state=established,related,untracked add action=accept chain=input comment="accept established,related,untracked" connection-state=established,related,untracked add action=drop chain=input comment="drop invalid" connection-state=invalid add action=drop chain=input comment="drop blacklisted IPs" connection-state=new in-interface-list=WAN src-address-list=pwlgrzs-blacklist add action=accept chain=input comment="accept ICMP" protocol=icmp add action=accept chain=forward comment="Allow forwarded HTTPS port 443" connection-nat-state=dstnat dst-port=443 in-interface-list=WAN protocol=tcp add action=accept chain=forward comment="Allow forwarded HTTP port 80" connection-nat-state=dstnat dst-port=80 in-interface-list=WAN protocol=tcp add action=drop chain=input comment="drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN add action=accept chain=input comment="allow Winbox" in-interface-list=ManagementAllowed port=8291 protocol=tcp add action=accept chain=input comment="allow SSH" in-interface-list=ManagementAllowed port=22 protocol=tcp add action=accept chain=input comment="allow mikrotik api" in-interface-list=ManagementAllowed port=8728 protocol=tcp add action=accept chain=input comment="allow mikrotik api" in-interface-list=ManagementAllowed port=8729 protocol=tcp add action=accept chain=input comment="allow ftp" in-interface-list=ManagementAllowed port=21 protocol=tcp add action=accept chain=input comment="allow telnet" in-interface-list=ManagementAllowed port=23 protocol=tcp add action=accept chain=input comment="allow web admin" in-interface-list=ManagementAllowed port=80 protocol=tcp add action=accept chain=forward comment="Allow TCP for Sonos 3400" dst-address=192.168.10.0/24 dst-port=3400-3401 protocol=tcp src-address-list=sonos add action=accept chain=forward comment="Allow TCP for Sonos 445" dst-address=192.168.10.0/24 dst-port=445 protocol=tcp src-address-list=sonos add action=accept chain=forward comment="Allow TCP for Sonos 3500" dst-address=192.168.10.0/24 dst-port=3500 protocol=tcp src-address-list=sonos add action=accept chain=forward comment="Allow UDP for Sonos 319" dst-address=192.168.10.0/24 dst-port=319-320 protocol=udp src-address-list=sonos add action=accept chain=forward comment="Allow UDP for Sonos 6969" dst-address=192.168.10.0/24 dst-port=6969 protocol=udp src-address-list=sonos add action=accept chain=forward comment="Allow UDP for Sonos 49152-65535" dst-address=192.168.10.0/24 dst-port=49152-65535 protocol=udp src-address-list=sonos add action=accept chain=forward comment="Allow 192.168.5.180 to 192.168.10.210 on TCP port 3493 for UPS" dst-address=192.168.10.210 dst-port=3493 protocol=tcp src-address=192.168.5.180 add action=accept chain=forward comment="Allow 192.168.5.180 to 192.168.10.199 on all protocols and ports" dst-address=192.168.10.199 src-address=192.168.5.180 add action=accept chain=forward comment="Allow all traffic from vlan10-lan to other VLANs" src-address=192.168.10.0/24 add action=accept chain=forward comment="Allow internet access for vlan10-lan" out-interface-list=WAN src-address=192.168.10.0/24 add action=accept chain=forward comment="Allow internet access for vlan9-iotonline" out-interface-list=WAN src-address=192.168.9.0/24 add action=accept chain=forward comment="Allow access to NTP on the internet from vlan5-iot" dst-port=123 protocol=udp src-address=192.168.8.0/24 add action=drop chain=forward comment="Block traffic from other VLANs to vlan10-lan" dst-address=192.168.10.0/24 add action=drop chain=forward comment="Block traffic from vlan1-management to other VLANs" src-address=192.168.5.0/24 add action=drop chain=forward comment="Block internet access for all other VLANs" out-interface-list=WAN add action=drop chain=forward comment="Deny Internet access from Tuya list" out-interface-list=WAN src-address-list=tuya add action=drop chain=forward comment="Block TCP DNS from vlan5-iot" dst-port=53 protocol=tcp src-address=192.168.8.0/24 add action=drop chain=forward comment="Block UDP DNS from vlan5-iot" dst-port=53 protocol=udp src-address=192.168.8.0/24 add action=drop chain=forward comment="Deny DNS from Tuya list" dst-port=53 protocol=tcp src-address-list=tuya add action=drop chain=forward comment="Deny DNS from Tuya list" dst-port=53 protocol=udp src-address-list=tuya add action=accept chain=forward comment="Allow TCP DNS from vlan10-lan" dst-port=53 protocol=tcp src-address=192.168.10.0/24 add action=accept chain=forward comment="Allow UDP DNS from vlan10-lan" dst-port=53 protocol=udp src-address=192.168.10.0/24 add action=accept chain=forward comment="Allow TCP DNS from vlan9-iotonline" dst-port=53 protocol=tcp src-address=192.168.9.0/24 add action=accept chain=forward comment="Allow UDP DNS from vlan9-iotonline" dst-port=53 protocol=udp src-address=192.168.9.0/24 add action=accept chain=forward comment="Allow TCP DNS from vlan15-wifiguests" dst-port=53 protocol=tcp src-address=192.168.15.0/24 add action=accept chain=forward comment="Allow UDP DNS from vlan15-wifiguests" dst-port=53 protocol=udp src-address=192.168.15.0/24 add action=drop chain=forward comment="Block traffic from vlan5-iot to other VLANs" src-address=192.168.8.0/24 add action=drop chain=forward comment="Block traffic from vlan6-cameras to other VLANs" src-address=192.168.6.0/24 add action=drop chain=forward comment="Block traffic from vlan9-iotonline to other VLANs" src-address=192.168.9.0/24 add action=drop chain=forward comment="Block traffic from vlan15-wifiguests to other VLANs" src-address=192.168.15.0/24 add action=drop chain=forward comment="drop access to clients behind NAT from WAN" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN /ip firewall nat add action=masquerade chain=srcnat comment="Internet access" out-interface-list=WAN add action=dst-nat chain=dstnat comment="Forward port 80" dst-port=80 in-interface-list=WAN protocol=tcp to-addresses=192.168.10.210 add action=dst-nat chain=dstnat comment="Forward port 443" dst-port=443 in-interface-list=WAN protocol=tcp to-addresses=192.168.10.210 /ip hotspot profile set [ find default=yes ] html-directory=hotspot /ip ipsec mode-config add address-pool=pool-ipsec-dhcp address-prefix-length=32 name=vpn-ipsec-ikev2 /ip ipsec profile set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5 /ip service set telnet address=192.168.10.0/24,192.168.5.0/24 set ftp address=192.168.10.0/24,192.168.5.0/24 set www address=192.168.10.0/24,192.168.5.0/24 set ssh address=192.168.10.0/24,192.168.5.0/24 set www-ssl address=192.168.10.0/24,192.168.5.0/24 set api address=192.168.10.0/24,192.168.5.0/24 set winbox address=192.168.10.0/24,192.168.5.0/24 set api-ssl address=192.168.10.0/24,192.168.5.0/24 /ip smb shares set [ find default=yes ] directory=pub /ip ssh set strong-crypto=yes /system clock set time-zone-name=Europe/Brussels /system health settings set fan-min-speed-percent=10% /system note set show-at-login=no /system ntp client set enabled=yes /system ntp client servers add address=europe.pool.ntp.org /system package update set channel=testing /system routerboard reset-button set enabled=yes /system routerboard settings set enter-setup-on=delete-key /system scheduler add interval=1w name=dl-mt-blacklist on-event=pwlgrzs-blacklist-dl policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=2000-01-01 start-time=00:05:00 add interval=1w name=ins-mt-blacklist on-event=pwlgrzs-blacklist-replace policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=2000-01-01 start-time=00:10:00 /system script add dont-require-permissions=no name=pwlgrzs-blacklist-dl owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\ "/tool fetch url=\"https://raw.githubusercontent.com/pwlgrzs/Mikrotik-Blacklist/master/blacklist.rsc\" mode=https" add dont-require-permissions=no name=pwlgrzs-blacklist-replace owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\ "/ip firewall address-list remove [find where list=\"pwlgrzs-blacklist\"]; /import file-name=blacklist.rsc; /file remove blacklist.rsc" /tool bandwidth-server set enabled=no /tool mac-server set allowed-interface-list=ManagementAllowed /tool mac-server mac-winbox set allowed-interface-list=ManagementAllowed |
/ip route print detail
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
| Flags: D - dynamic; X - disabled, I - inactive, A - active; c - connect, s - static, r - rip, b - bgp, o - ospf, i - is-is, d - dhcp, v - vpn, m - modem, y - bgp-mpls-vpn; H - hw-offloaded; + - ecmp DAdH dst-address=0.0.0.0/0 routing-table=main gateway=XXX.XXX.192.1 immediate-gw=XXX.XXX.192.1%ether3-wan-backup distance=2 scope=30 target-scope=10 vrf-interface=ether3-wan-backup DAcH dst-address=XXX.XXX.192.0/19 routing-table=main gateway=ether3-wan-backup immediate-gw=ether3-wan-backup distance=0 scope=10 target-scope=5 local-address=XXX.XXX.205.39%ether3-wan-backup DAcH dst-address=192.168.5.0/24 routing-table=main gateway=vlan1-management immediate-gw=vlan1-management distance=0 scope=10 target-scope=5 local-address=192.168.5.1%vlan1-management DAcH dst-address=192.168.6.0/24 routing-table=main gateway=vlan6-cameras immediate-gw=vlan6-cameras distance=0 scope=10 target-scope=5 local-address=192.168.6.1%vlan6-cameras DAcH dst-address=192.168.8.0/24 routing-table=main gateway=vlan5-iot immediate-gw=vlan5-iot distance=0 scope=10 target-scope=5 local-address=192.168.8.1%vlan5-iot DAcH dst-address=192.168.9.0/24 routing-table=main gateway=vlan9-iotonline immediate-gw=vlan9-iotonline distance=0 scope=10 target-scope=5 local-address=192.168.9.1%vlan9-iotonline DAcH dst-address=192.168.10.0/24 routing-table=main gateway=vlan10-lan immediate-gw=vlan10-lan distance=0 scope=10 target-scope=5 local-address=192.168.10.1%vlan10-lan DAcH dst-address=192.168.15.0/24 routing-table=main gateway=vlan15-wifiguests immediate-gw=vlan15-wifiguests distance=0 scope=10 target-scope=5 local-address=192.168.15.1%vlan15-wifiguests |
/ip firewall nat print
code:
1
2
3
4
5
6
7
8
9
| Flags: X - disabled, I - invalid; D - dynamic 0 ;;; Internet access chain=srcnat action=masquerade out-interface-list=WAN log=no log-prefix="" 1 ;;; Forward port 80 chain=dstnat action=dst-nat to-addresses=192.168.10.210 protocol=tcp in-interface-list=WAN dst-port=80 log=no log-prefix="" 2 ;;; Forward port 443 chain=dstnat action=dst-nat to-addresses=192.168.10.210 protocol=tcp in-interface-list=WAN dst-port=443 log=no log-prefix="" |
/ip firewall nat print stats
code:
1
2
3
4
5
6
7
8
| Columns: CHAIN, ACTION, BYTES, PACKETS # CHAIN ACTION BYTES PACKETS ;;; Internet access 0 srcnat masquerade 73 882 1 088 ;;; Forward port 80 1 dstnat dst-nat 75 1 ;;; Forward port 443 2 dstnat dst-nat 0 0 |
/ip firewall filter print
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
| Flags: X - disabled, I - invalid; D - dynamic 0 D ;;; special dummy rule to show fasttrack counters chain=forward action=passthrough 1 ;;; fast-track for established,related chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related log=no log-prefix="" 2 ;;; accept established,related,untracked chain=forward action=accept connection-state=established,related,untracked log=no log-prefix="" 3 ;;; accept established,related,untracked chain=input action=accept connection-state=established,related,untracked log=no log-prefix="" 4 ;;; drop invalid chain=input action=drop connection-state=invalid log=no log-prefix="" 5 ;;; drop blacklisted IPs chain=input action=drop connection-state=new src-address-list=pwlgrzs-blacklist in-interface-list=WAN log=no log-prefix="" 6 ;;; accept ICMP chain=input action=accept protocol=icmp log=no log-prefix="" 7 ;;; Allow forwarded HTTPS port 443 chain=forward action=accept connection-nat-state=dstnat protocol=tcp in-interface-list=WAN dst-port=443 log=no log-prefix="" 8 ;;; Allow forwarded HTTP port 80 chain=forward action=accept connection-nat-state=dstnat protocol=tcp in-interface-list=WAN dst-port=80 log=no log-prefix="" 9 ;;; drop all from WAN not DSTNATed chain=input action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN log=no log-prefix="" 10 ;;; allow Winbox chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=8291 log=no log-prefix="" 11 ;;; allow SSH chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=22 log=no log-prefix="" 12 ;;; allow mikrotik api chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=8728 log=no log-prefix="" 13 ;;; allow mikrotik api chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=8729 log=no log-prefix="" 14 ;;; allow ftp chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=21 log=no log-prefix="" 15 ;;; allow telnet chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=23 log=no log-prefix="" 16 ;;; allow web admin chain=input action=accept protocol=tcp in-interface-list=ManagementAllowed port=80 log=no log-prefix="" 17 ;;; Allow TCP for Sonos 3400 chain=forward action=accept protocol=tcp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=3400-3401 log=no log-prefix="" 18 ;;; Allow TCP for Sonos 445 chain=forward action=accept protocol=tcp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=445 19 ;;; Allow TCP for Sonos 3500 chain=forward action=accept protocol=tcp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=3500 20 ;;; Allow UDP for Sonos 319 chain=forward action=accept protocol=udp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=319-320 log=no log-prefix="" 21 ;;; Allow UDP for Sonos 6969 chain=forward action=accept protocol=udp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=6969 22 ;;; Allow UDP for Sonos 49152-65535 chain=forward action=accept protocol=udp dst-address=192.168.10.0/24 src-address-list=sonos dst-port=49152-65535 23 ;;; Allow 192.168.5.180 to 192.168.10.210 on TCP port 3493 for UPS chain=forward action=accept protocol=tcp src-address=192.168.5.180 dst-address=192.168.10.210 dst-port=3493 24 ;;; Allow 192.168.5.180 to 192.168.10.199 on all protocols and ports chain=forward action=accept src-address=192.168.5.180 dst-address=192.168.10.199 25 ;;; Allow all traffic from vlan10-lan to other VLANs chain=forward action=accept src-address=192.168.10.0/24 log=no log-prefix="" 26 ;;; Allow internet access for vlan10-lan chain=forward action=accept src-address=192.168.10.0/24 out-interface-list=WAN log=no log-prefix="" 27 ;;; Allow internet access for vlan9-iotonline chain=forward action=accept src-address=192.168.9.0/24 out-interface-list=WAN log=no log-prefix="" 28 ;;; Allow access to NTP on the internet from vlan5-iot chain=forward action=accept protocol=udp src-address=192.168.8.0/24 dst-port=123 log=no log-prefix="" 29 ;;; Block traffic from other VLANs to vlan10-lan chain=forward action=drop dst-address=192.168.10.0/24 log=no log-prefix="" 30 ;;; Block traffic from vlan1-management to other VLANs chain=forward action=drop src-address=192.168.5.0/24 log=no log-prefix="" 31 ;;; Block internet access for all other VLANs chain=forward action=drop out-interface-list=WAN log=no log-prefix="" 32 ;;; Deny Internet access from Tuya list chain=forward action=drop src-address-list=tuya out-interface-list=WAN log=no log-prefix="" 33 ;;; Block TCP DNS from vlan5-iot chain=forward action=drop protocol=tcp src-address=192.168.8.0/24 dst-port=53 log=no log-prefix="" 34 ;;; Block UDP DNS from vlan5-iot chain=forward action=drop protocol=udp src-address=192.168.8.0/24 dst-port=53 log=no log-prefix="" 35 ;;; Deny DNS from Tuya list chain=forward action=drop protocol=tcp src-address-list=tuya dst-port=53 log=no log-prefix="" 36 ;;; Deny DNS from Tuya list chain=forward action=drop protocol=udp src-address-list=tuya dst-port=53 log=no log-prefix="" 37 ;;; Allow TCP DNS from vlan10-lan chain=forward action=accept protocol=tcp src-address=192.168.10.0/24 dst-port=53 log=no log-prefix="" 38 ;;; Allow UDP DNS from vlan10-lan chain=forward action=accept protocol=udp src-address=192.168.10.0/24 dst-port=53 log=no log-prefix="" 39 ;;; Allow TCP DNS from vlan9-iotonline chain=forward action=accept protocol=tcp src-address=192.168.9.0/24 dst-port=53 log=no log-prefix="" 40 ;;; Allow UDP DNS from vlan9-iotonline chain=forward action=accept protocol=udp src-address=192.168.9.0/24 dst-port=53 log=no log-prefix="" 41 ;;; Allow TCP DNS from vlan15-wifiguests chain=forward action=accept protocol=tcp src-address=192.168.15.0/24 dst-port=53 log=no log-prefix="" 42 ;;; Allow UDP DNS from vlan15-wifiguests chain=forward action=accept protocol=udp src-address=192.168.15.0/24 dst-port=53 log=no log-prefix="" 43 ;;; Block traffic from vlan5-iot to other VLANs chain=forward action=drop src-address=192.168.8.0/24 log=no log-prefix="" 44 ;;; Block traffic from vlan6-cameras to other VLANs chain=forward action=drop src-address=192.168.6.0/24 log=no log-prefix="" 45 ;;; Block traffic from vlan9-iotonline to other VLANs chain=forward action=drop src-address=192.168.9.0/24 log=no log-prefix="" 46 ;;; Block traffic from vlan15-wifiguests to other VLANs chain=forward action=drop src-address=192.168.15.0/24 log=no log-prefix="" 47 ;;; drop access to clients behind NAT from WAN chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN log=no log-prefix="" |
/ip firewall filter print stats
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
| Flags: D - DYNAMIC Columns: CHAIN, ACTION, BYTES, PACKETS # CHAIN ACTION BYTES PACKETS ;;; special dummy rule to show fasttrack counters 0 D forward passthrough 68 421 161 ;;; fast-track for established,related 1 forward fasttrack-connection 155 809 885 ;;; accept established,related,untracked 2 forward accept 155 809 885 ;;; accept established,related,untracked 3 input accept 783 897 8 088 ;;; drop invalid 4 input drop 10 411 94 ;;; drop blacklisted IPs 5 input drop 0 0 ;;; accept ICMP 6 input accept 42 576 33 ;;; Allow forwarded HTTPS port 443 7 forward accept 0 0 ;;; Allow forwarded HTTP port 80 8 forward accept 75 1 ;;; drop all from WAN not DSTNATed 9 input drop 5 257 56 ;;; allow Winbox 10 input accept 64 1 ;;; allow SSH 11 input accept 0 0 ;;; allow mikrotik api 12 input accept 0 0 ;;; allow mikrotik api 13 input accept 0 0 ;;; allow ftp 14 input accept 0 0 ;;; allow telnet 15 input accept 0 0 ;;; allow web admin 16 input accept 0 0 ;;; Allow TCP for Sonos 3400 17 forward accept 0 0 ;;; Allow TCP for Sonos 445 18 forward accept 0 0 ;;; Allow TCP for Sonos 3500 19 forward accept 0 0 ;;; Allow UDP for Sonos 319 20 forward accept 0 0 ;;; Allow UDP for Sonos 6969 21 forward accept 0 0 ;;; Allow UDP for Sonos 49152-65535 22 forward accept 0 0 ;;; Allow 192.168.5.180 to 192.168.10.210 on TCP port 3493 for UPS 23 forward accept 0 0 ;;; Allow 192.168.5.180 to 192.168.10.199 on all protocols and ports 24 forward accept 0 0 ;;; Allow all traffic from vlan10-lan to other VLANs 25 forward accept 19 526 279 ;;; Allow internet access for vlan10-lan 26 forward accept 0 0 ;;; Allow internet access for vlan9-iotonline 27 forward accept 380 7 ;;; Allow access to NTP on the internet from vlan5-iot 28 forward accept 380 5 ;;; Block traffic from other VLANs to vlan10-lan 29 forward drop 0 0 ;;; Block traffic from vlan1-management to other VLANs 30 forward drop 76 1 ;;; Block internet access for all other VLANs 31 forward drop 40 1 ;;; Deny Internet access from Tuya list 32 forward drop 0 0 ;;; Block TCP DNS from vlan5-iot 33 forward drop 0 0 ;;; Block UDP DNS from vlan5-iot 34 forward drop 0 0 ;;; Deny DNS from Tuya list 35 forward drop 0 0 ;;; Deny DNS from Tuya list 36 forward drop 0 0 ;;; Allow TCP DNS from vlan10-lan 37 forward accept 0 0 ;;; Allow UDP DNS from vlan10-lan 38 forward accept 0 0 ;;; Allow TCP DNS from vlan9-iotonline 39 forward accept 0 0 ;;; Allow UDP DNS from vlan9-iotonline 40 forward accept 0 0 ;;; Allow TCP DNS from vlan15-wifiguests 41 forward accept 0 0 ;;; Allow UDP DNS from vlan15-wifiguests 42 forward accept 0 0 ;;; Block traffic from vlan5-iot to other VLANs 43 forward drop 0 0 ;;; Block traffic from vlan6-cameras to other VLANs 44 forward drop 0 0 ;;; Block traffic from vlan9-iotonline to other VLANs 45 forward drop 0 0 ;;; Block traffic from vlan15-wifiguests to other VLANs 46 forward drop 0 0 ;;; drop access to clients behind NAT from WAN 47 forward drop 0 0 |
/interface list member print
code:
1
2
3
4
5
6
7
8
| Columns: LIST, INTERFACE # LIST INTERFACE 0 LAN bridge 1 ManagementAllowed vlan10-lan 2 ManagementAllowed vlan1-management 3 ManagementAllowed ether13-localmanagement 4 WAN ether3-wan-backup 5 WAN sfp1-xgspon |
/ip address print
code:
1
2
3
4
5
6
7
8
9
10
| Flags: D - DYNAMIC Columns: ADDRESS, NETWORK, INTERFACE # ADDRESS NETWORK INTERFACE 0 192.168.5.1/24 192.168.5.0 vlan1-management 1 192.168.8.1/24 192.168.8.0 vlan5-iot 2 192.168.9.1/24 192.168.9.0 vlan9-iotonline 3 192.168.10.1/24 192.168.10.0 vlan10-lan 4 192.168.15.1/24 192.168.15.0 vlan15-wifiguests 5 192.168.6.1/24 192.168.6.0 vlan6-cameras 6 D XXX.XXX.205.39/19 XXX.XXX.192.0 ether3-wan-backup |
/ip dhcp-client print detail
code:
1
2
3
4
5
6
| Flags: X - disabled, I - invalid, D - dynamic 0 interface=ether3-wan-backup add-default-route=yes default-route-distance=2 use-peer-dns=no use-peer-ntp=no dhcp-options=hostname,clientid status=bound address=XXX.XXX.205.39/19 gateway=XXX.XXX.192.1 dhcp-server=XXX.XXX.36.17 primary-dns=XXX.XXX.129.90 secondary-dns=XXX.XXX.129.94 primary-ntp=XXX.XXX.138.215 secondary-ntp=XXX.XXX.173.74 expires-after=54m39s 1 I ;;; Interface not active interface=sfp1-xgspon add-default-route=yes default-route-distance=1 use-peer-dns=no use-peer-ntp=no dhcp-options=hostname,clientid |
edit: post van engels naar nederlands vertaald