Difference between revisions of "Manual:Default Configurations"

From MikroTik Wiki
Jump to: navigation, search
(Created page with '{{Versions| v5}} == List of Default Configs == ===Integrated Indoors=== <table width="1180" > <tr class="styled_table"> <th width="100"></th> <th width="40">Wan port</th> …')
 
Line 253: Line 253:
  
 
Lets take '''RB751''' as an example.  
 
Lets take '''RB751''' as an example.  
Board has ether1 configured as WAN port, it has switch chip and one pre-configured wireless interface. So in this case all ethernets except ether1 are groped in switch group and bridged with wireless interface.
+
Board has ether1 configured as WAN port, it has switch chip and one pre-configured wireless interface. So in this case all ethernets except ether1 are grouped in switch group and bridged with wireless interface.
Here how generated config would look like:
+
 
 +
Generated config will be:
 
<pre>
 
<pre>
/interface ethernet
+
/interface set ether2 name=ether2-master-local;
set ether2 name=ether2-master-local
+
/interface set ether3 name=ether3-slave-local;
set ether3 name=ether3-slave-local master-port=ether2-master-local
+
/interface set ether4 name=ether4-slave-local;
set ether4 name=ether4-slave-local master-port=ether2-master-local
+
/interface set ether5 name=ether5-slave-local;
set ether5 name=ether5-slave-local master-port=ether2-master-local
+
/interface ethernet set ether3-slave-local master-port=ether2-master-local;
 +
/interface ethernet set ether4-slave-local master-port=ether2-master-local;
 +
/interface ethernet set ether5-slave-local master-port=ether2-master-local;
  
/interface bridge  
+
/interface bridge add name=bridge-local disabled=no auto-mac=no protocol-mode=rstp;
add name="bridge-local" auto-mac=no protocol-mode=rstp admin-mac=[/interface ethernet get [find name~"ether2"] mac-address];
 
  
/interface bridge port
+
:local bMACIsSet 0;
add bridge=bridge-local interface=wlan1
+
:foreach k in=[/interface find] do={
add bridge=bridge-local interface=ether2-master-local
+
        :local tmpPort [/interface get $k name];
 +
        :if ($bMACIsSet = 0) do={
 +
              :if ([/interface get $k type] = "ether") do={
 +
                      /interface bridge set "bridge-local" admin-mac=[/interface ethernet get $tmpPort mac-address];
 +
                      :set bMACIsSet 1;
 +
                }
 +
        }
 +
        :if (!($tmpPort~"bridge" || $tmpPort~"ether1" || $tmpPort~"slave")) do={
 +
              /interface bridge port add bridge=bridge-local interface=$tmpPort;
 +
        }
 +
}
 
</pre>
 
</pre>
  
Line 278: Line 290:
 
If board has two chains (letter D in the naming of the board), then both chains are enabled. HT Extension is enabled on all CPEs.
 
If board has two chains (letter D in the naming of the board), then both chains are enabled. HT Extension is enabled on all CPEs.
  
Code from default config. Variables mode, band, htChains and htExt are determined based on type of the board (See table above).
+
For example generated config on RB751:
 
<pre>
 
<pre>
/interface wireless set wlan1 mode=$mode band=$band ht-txchains=$htChains ht-rxchains=$htChains \
+
:if ( $wirelessEnabled = 1) do={
ht-extension-channel=$htExt disabled=no country=no_country_set wireless-protocol=any
+
# wait for wireless
 +
      :while ([/interface wireless find] = "") do={ :delay 1s; };
 +
 
 +
      /interface wireless set wlan1 mode=ap-bridge band=2ghz-b/g/n ht-txchains=0,1 ht-rxchains=0,1 \
 +
              disabled=no country=no_country_set wireless-protocol=any
 +
      /interface wireless set wlan1 channel-width=20/40mhz-ht-above ;
 +
}
 +
 
 
</pre>
 
</pre>
  
Line 311: Line 330:
 
<pre>
 
<pre>
 
/ip firewall {
 
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="default configuration"
+
      filter add chain=input action=accept protocol=icmp comment="default configuration"
filter add chain=input action=accept connection-state=established in-interface="$wanPort-gateway" comment="default configuration"
+
      filter add chain=input action=accept connection-state=established in-interface=ether1-gateway comment="default configuration"
filter add chain=input action=accept connection-state=related in-interface="$wanPort-gateway" comment="default configuration"
+
      filter add chain=input action=accept connection-state=related in-interface=ether1-gateway comment="default configuration"
filter add chain=input action=drop in-interface="$wanPort-gateway" comment="default configuration"
+
      filter add chain=input action=drop in-interface=ether1-gateway comment="default configuration"
nat add chain=srcnat out-interface="$wanPort-gateway" action=masquerade comment="default configuration"
+
      nat add chain=srcnat out-interface=ether1-gateway action=masquerade comment="default configuration"
 
}
 
}
 +
 +
 
/tool mac-server remove [find];
 
/tool mac-server remove [find];
 
/tool mac-server mac-winbox disable [find];
 
/tool mac-server mac-winbox disable [find];
:foreach k in=[/interface find] do={
 
:local tmpName [/interface get $k name];
 
:if (!($tmpName~$wanPort)) do={
 
/tool mac-server add interface=$tmpName disabled=no;
 
/tool mac-server mac-winbox add interface=$tmpName disabled=no;
 
}
 
}
 
  
/ip neighbor discovery set [find name="$wanPort-gateway"] discover=no
+
/tool mac-server add interface=wlan1 disabled=no;
 +
/tool mac-server mac-winbox add interface=wlan1 disabled=no;
 +
/tool mac-server add interface=ether2 disabled=no;
 +
/tool mac-server mac-winbox add interface=ether2 disabled=no;
 +
/tool mac-server add interface=ether3 disabled=no;
 +
/tool mac-server mac-winbox add interface=ether3 disabled=no;
 +
/tool mac-server add interface=ether4 disabled=no;
 +
/tool mac-server mac-winbox add interface=ether4 disabled=no;
 +
/tool mac-server add interface=ether5 disabled=no;
 +
/tool mac-server mac-winbox add interface=ether5 disabled=no;
 +
 
 +
/ip neighbor discovery set [find name="ether1-gateway"] discover=no
  
 
</pre>
 
</pre>

Revision as of 12:24, 24 May 2011

Version.png

Applies to RouterOS: v5

List of Default Configs

Integrated Indoors

Wan port Lan port Wireless mode ht chain ht extension dhcp-server dhcp-client Firewall NAT Default IP Mac Server
RB750 RB750G ether1 Switched ether2-ether5 - - - on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
RB751-2n ether1 Switched ether2-ether5, bridged wlan1 with switch AP b/g/n 2412MHz 0 above-control on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
RB1100 - - - - - - - - - 192.168.88.1/24 on ether1 -
RB1200 - - - - - - - - - 192.168.88.1/24 on ether1 -
RB2011 - - - - - - - - - 192.168.88.1/24 on ether1 -

Integrated Outdoors

Wan port Lan port Wireless mode ht chain ht extension dhcp-server dhcp-client Firewall NAT Default IP Mac Server
Groove 5 wlan1 ether1 station a/n 5300MHz 0 above control on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
Groove A-5xx - bridged wlan1,ether1 AP a/n 5300MHz 0 - - - - - 192.168.88.1/24 on lan port -
SXT 5D wlan1 ether1 station a/n 5300MHz 0,1 above control on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
OmniTik ether1 Switched ether2-ether5, bridged wlan1 with switch AP a/n 5300MHz 0,1 - on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port

Engineered

Wan port Lan port Wireless mode ht chain ht extension dhcp-server dhcp-client Firewall NAT Default IP Mac Server
RB450 RB450G ether1 Switched ether2-ether5 - - - on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
RB711-5 wlan1 ether1 station a/n 5300MHz 0 above control on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port
RB711-A5 - bridged wlan1,ether1 AP a/n 5300MHz 0 - - - - - 192.168.88.1/24 on lan port -
RB711-2 wlan1 ether1 station b/g/n 2412MHz 0 above control on lan port on wan port blocked access to wan port Masquerade wan port 192.168.88.1/24 on lan port Disabled on wan port

Wan Port

When applying configuration WAN port is renamed to "<wan port>-gateway", for example, if wan port is ether1, it will be renamed to "ether1-gateway".

Local Port

Local port can be:

  • single interface
  • ethernets configured in switch group
  • bridged all interfaces that are not WAN and switch slaves.

If ports are switched then master port is renamed to "<ethernet name>-master-local" and slaves to "<ethernet name>-slave-local".

Lets take RB751 as an example. Board has ether1 configured as WAN port, it has switch chip and one pre-configured wireless interface. So in this case all ethernets except ether1 are grouped in switch group and bridged with wireless interface.

Generated config will be:

/interface set ether2 name=ether2-master-local;
/interface set ether3 name=ether3-slave-local;
/interface set ether4 name=ether4-slave-local;
/interface set ether5 name=ether5-slave-local;
/interface ethernet set ether3-slave-local master-port=ether2-master-local;
/interface ethernet set ether4-slave-local master-port=ether2-master-local;
/interface ethernet set ether5-slave-local master-port=ether2-master-local;

/interface bridge add name=bridge-local disabled=no auto-mac=no protocol-mode=rstp;

:local bMACIsSet 0;
:foreach k in=[/interface find] do={
        :local tmpPort [/interface get $k name];
        :if ($bMACIsSet = 0) do={
               :if ([/interface get $k type] = "ether") do={
                      /interface bridge set "bridge-local" admin-mac=[/interface ethernet get $tmpPort mac-address];
                      :set bMACIsSet 1;
                 }
        }
        :if (!($tmpPort~"bridge" || $tmpPort~"ether1" || $tmpPort~"slave")) do={
               /interface bridge port add bridge=bridge-local interface=$tmpPort;
        }
}

Wireless Config

Wireless configuration depends on market segment for which board is designed. It can be configured as AP or station in 2GHz and 5GHz frequencies. Default 2GHz frequency is 2412 and default 5GHz frequency is 5300. SSID is "Mikrotik".

If board has two chains (letter D in the naming of the board), then both chains are enabled. HT Extension is enabled on all CPEs.

For example generated config on RB751:

:if ( $wirelessEnabled = 1) do={
# wait for wireless
       :while ([/interface wireless find] = "") do={ :delay 1s; };

       /interface wireless set wlan1 mode=ap-bridge band=2ghz-b/g/n ht-txchains=0,1 ht-rxchains=0,1 \
               disabled=no country=no_country_set wireless-protocol=any
       /interface wireless set wlan1 channel-width=20/40mhz-ht-above ;
}

Default IP and DHCP Config

Default IP address on all boards is 192.168.88.1/24. Boards without specific configuration has IP address set on ether1, other boards has IP address on LAN interface.

All boards that has WAN port configured, DHCP client is set on WAN port.

Typically on all CPEs DHCP server is set on LAN port, giving out addresses in range from 192.168.88.2-192.168.88.254

As an example RB751 applied DHCP config.

/ip dhcp-client add interface=ether1-gateway disabled=no

/ip pool add name="default-dhcp" ranges=192.168.88.10-192.168.88.254;
/ip dhcp-server 
  add name=default address-pool="default-dhcp" interface=bridge-local disabled=no;

/ip dhcp-server network 
  add address=192.168.88.0/24 gateway=192.168.88.1 dns-server=192.168.88.1 comment="default configuration";

Firewall, NAT and MAC server

All boards with configured WAN port has configured protection on that port. Any traffic leaving WAN port is masqueraded.

Config example:

/ip firewall {
      filter add chain=input action=accept protocol=icmp comment="default configuration"
      filter add chain=input action=accept connection-state=established in-interface=ether1-gateway comment="default configuration"
      filter add chain=input action=accept connection-state=related in-interface=ether1-gateway comment="default configuration"
      filter add chain=input action=drop in-interface=ether1-gateway comment="default configuration"
      nat add chain=srcnat out-interface=ether1-gateway action=masquerade comment="default configuration"
}


/tool mac-server remove [find];
/tool mac-server mac-winbox disable [find];

/tool mac-server add interface=wlan1 disabled=no;
/tool mac-server mac-winbox add interface=wlan1 disabled=no;
/tool mac-server add interface=ether2 disabled=no;
/tool mac-server mac-winbox add interface=ether2 disabled=no;
/tool mac-server add interface=ether3 disabled=no;
/tool mac-server mac-winbox add interface=ether3 disabled=no;
/tool mac-server add interface=ether4 disabled=no;
/tool mac-server mac-winbox add interface=ether4 disabled=no;
/tool mac-server add interface=ether5 disabled=no;
/tool mac-server mac-winbox add interface=ether5 disabled=no;

/ip neighbor discovery set [find name="ether1-gateway"] discover=no

DNS

Every board allows remote DNS requests and static DNS name is pre-configured.

	/ip dns {
		set allow-remote-requests=yes
		static add name=router address=192.168.88.1
	}


[ Top | Back to Content ]