====== Mikrotik RouterOS VLANs and Wifi ======
for hapax²
by Claude
Step-by-Step Setup
1. Plan Your VLANs
VLAN 10: Main network (192.168.10.0/24)
VLAN 20: Guest WiFi (192.168.20.0/24)
VLAN 30: IoT devices (192.168.30.0/24) - optional
2. Create VLAN Interfaces
/interface vlan
add interface=bridge name=vlan10-main vlan-id=10
add interface=bridge name=vlan20-guest vlan-id=20
add interface=bridge name=vlan30-iot vlan-id=30
3. Configure Bridge VLAN Filtering
First, enable VLAN filtering on your bridge:
/interface bridge
set [find name=bridge] vlan-filtering=yes
Then set up VLAN membership:
/interface bridge vlan
add bridge=bridge tagged=bridge,ether1 vlan-ids=10
add bridge=bridge tagged=bridge,ether1 vlan-ids=20
add bridge=bridge tagged=bridge,ether1 vlan-ids=30
4. Assign IP Addresses and DHCP
/ip address
add address=192.168.10.1/24 interface=vlan10-main
add address=192.168.20.1/24 interface=vlan20-guest
add address=192.168.30.1/24 interface=vlan30-iot
/ip pool
add name=pool-main ranges=192.168.10.100-192.168.10.200
add name=pool-guest ranges=192.168.20.100-192.168.20.200
add name=pool-iot ranges=192.168.30.100-192.168.30.200
/ip dhcp-server
add address-pool=pool-main interface=vlan10-main name=dhcp-main
add address-pool=pool-guest interface=vlan20-guest name=dhcp-guest
add address-pool=pool-iot interface=vlan30-iot name=dhcp-iot
/ip dhcp-server network
add address=192.168.10.0/24 gateway=192.168.10.1 dns-server=192.168.10.1
add address=192.168.20.0/24 gateway=192.168.20.1 dns-server=192.168.20.1
add address=192.168.30.0/24 gateway=192.168.30.1 dns-server=192.168.30.1
5. Configure WiFi Networks
For the hAP ax2, you'll configure separate SSIDs:
/interface wifi
# Main WiFi
set wifi1 configuration.ssid="YourMainSSID" security.authentication-types=wpa2-psk,wpa3-psk security.passphrase="YourPassword"
# Guest WiFi - add a virtual interface
/interface wifi add master-interface=wifi1 name=guest-wifi configuration.ssid="GuestWiFi" security.authentication-types=wpa2-psk security.passphrase="GuestPassword"
6. Assign WiFi to VLANs
/interface bridge port
set [find interface=wifi1] pvid=10
add bridge=bridge interface=guest-wifi pvid=20
7. Firewall Rules for Guest Isolation
/ip firewall filter
# Allow guest to access internet only
add chain=forward action=accept in-interface=vlan20-guest out-interface=ether1 comment="Guest to WAN"
add chain=forward action=drop in-interface=vlan20-guest comment="Block guest from other VLANs"
# Allow established/related connections
add chain=forward action=accept connection-state=established,related
# Optional: Block inter-VLAN access
add chain=forward action=drop src-address=192.168.20.0/24 dst-address=192.168.10.0/24
add chain=forward action=drop src-address=192.168.20.0/24 dst-address=192.168.30.0/24