====== Wireless network based on Mikrotik Mesh ====== Pros of this kind of configuration: One single SSID for clients and seamless roaming. Here is the complete configuration example of a wireless network based on Mikrotik mesh with all Router OS code ready to copy/paste into terminal. Example shown here is purposed for wireless scanners inside a warehouse. Warehouse map: {{ :mikrotik:conf:wirelessmesh_01.png |Warehouse map}} Network map: {{ :mikrotik:conf:wirelessmesh_02.png |Network map}} General Description - We use USGw01(RB433UAH) for Internet access of entire office(Office Area). - USGw01 also used for Mesh Setup as DHCP Server and Firewall. - On warehouse we use Wireless Barcode Scanners - Symbol MC3090 as wireless clients. - They are working only with server in LAN(Office Area). - Scanners should have access only for DNS server(for name resolving) and for WarehouseServer. - All WAP have Static IP. - All Scanners have Dynamic IP obtained from DHCP Server(USGw01). - In this setup Wireless security settings are not described. And you will get network secured only by MAC. If you want to secure your WAP by authentication you should create an appropriate security profile and assign it to your WAP interface - on all WAP. RB433UAH # add mesh interface interface mesh add name=mesh-interface # assign ports to the mesh interface interface mesh port add interface=ether2-warehouse mesh=mesh-interface # add ip to the mesh interface ip address add address=192.168.14.1/24 interface=mesh-interface ip pool add name=warehouse-dhcp-ip-pool ranges=192.168.14.230-192.168.14.253 ip dhcp-server add name=warehouse-dhcp-server interface=mesh-interface lease-time=12:00:00 address-pool=warehouse-dhcp-ip-pool always-broadcast=yes disabled=no ip dhcp-server network add address=192.168.14.0/24 gateway=192.168.14.1 netmask=24 dns-server=192.168.13.1 # T001 ip dhcp-server lease add address=192.168.14.231 mac-address=00:00:00:00:00:01 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T001" # T002 ip dhcp-server lease add address=192.168.14.232 mac-address=00:00:00:00:00:02 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T002" system ntp client set enabled=yes mode=unicast primary-ntp=64.73.32.134 secondary-ntp=38.229.71.1 system ntp server set broadcast=no broadcast-addresses="" enabled=yes manycast=no multicast=no ip firewall address-list add address=192.168.13.1 comment="admin01" disabled=no list=Gw-admins ip firewall address-list add address=192.168.13.2 comment="linux for backups to SVN" disabled=no list=Gw-admins ip firewall address-list add address=192.168.13.1 disabled=no list=US-Srv-DNS ip firewall address-list add address=192.168.13.1 disabled=no list=US-Srv-WareHouseServer ip firewall address-list add address=192.168.14.201 comment=WAP1 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.202 comment=WAP2 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.203 comment=WAP3 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.204 comment=WAP4 disabled=no list=US-WH-WAP # US-WH-Scanners - dynamic via DHCP # Input chain ip firewall filter add action=accept chain=input comment="Drop invalid connections" connection-state=invalid disabled=no ip firewall filter add action=accept chain=input comment="Allow Established connections to Gateway" connection-state=established disabled=no ip firewall filter add action=accept chain=input comment="Allow Related connections to Gateway" connection-state=related disabled=no ip firewall filter add action=accept chain=input comment="Allow SG Network Core: NTP on LAN" disabled=no dst-port=123 in-interface=!ether1-wan-primary protocol=udp # Forward chain # # General rules ip firewall filter add action=accept chain=forward comment="Drop invalid connections" connection-state=invalid disabled=no ip firewall filter add action=accept chain=forward comment="Allow Established connections to Any" connection-state=established disabled=no ip firewall filter add action=accept chain=forward comment="Allow Related connections to Any" connection-state=related disabled=no # From Mesh to LAN ip firewall filter add action=accept chain=forward comment="Allow Network Core: ICMP from Mesh" disabled=no in-interface=mesh-wap out-interface=bridge-lan protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow Scanners to DNS - US-WH-Scanners" disabled=no dst-address-list=US-Srv-DNS dst-port=53 in-interface=mesh-wap out-interface=bridge-lan protocol=udp src-address-list=US-WH-Scanners ip firewall filter add action=accept chain=forward comment="Allow Scanners to WareHouseServer - US-WH-Scanners" disabled=no dst-address-list=US-Srv-WareHouseServer dst-port=80 in-interface=mesh-wap out-interface=bridge-lan protocol=tcp src-address-list=US-WH-Scanners ip firewall filter add action=log chain=forward comment="Log any other from scanners" disabled=yes in-interface=mesh-wap ip firewall filter add action=drop chain=forward comment="Drop any other from scanners" disabled=no in-interface=mesh-wap # From LAN to Mesh ip firewall filter add action=accept chain=forward comment="Allow SG Network Core: ICMP to WAP" disabled=no dst-address-list=US-WH-WAP in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow SG Network Core: ICMP to Scanners" disabled=no dst-address-list=US-WH-Scanners in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow SG Remote Access: Winbox for admins on WAP" disabled=no dst-port=8291 in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=tcp src-address-list=Gw-admins ip firewall filter add action=accept chain=forward comment="Allow SG Remote Access: SSH for backup WAP" disabled=no dst-port=22 in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=tcp src-address-list=Gw-admins ip firewall filter add action=accept chain=forward comment="Allow SG Monitoring: SNMP on WAP segment" disabled=no dst-port=161 in-interface=bridge-lan out-interface=mesh-wap protocol=udp ip firewall filter add action=log chain=forward comment="Log any other to scanners" disabled=yes out-interface=mesh-wap ip firewall filter add action=drop chain=forward comment="Drop any other to scanners" disabled=no out-interface=mesh-wap RB751U-2HnD # WAP1/WAP2/WAP3/WAP4 system routerboard dhcp wireless security advanced-tools # WAP1/WAP2/WAP3/WAP4 interface mesh add name=mesh-interface interface mesh port add interface=ether1 mesh=mesh-interface interface mesh port add interface=wlan1 mesh=mesh-interface # WAP1 ip address add address=192.168.14.201/24 interface=mesh-interface # WAP2 ip address add address=192.168.14.202/24 interface=mesh-interface # WAP3 ip address add address=192.168.14.203/24 interface=mesh-interface # WAP4 ip address add address=192.168.14.204/24 interface=mesh-interface # WAP1/WAP2/WAP3/WAP4 interface wireless set wlan1 disabled=no mode=ap-bridge band=2ghz-b/g/n frequency=2452 ssid=Mikrotik-Mesh default-authentication=no default-forwarding=no # WAP1/WAP2/WAP3/WAP4 # # ban Scanners with low signal strength interface wireless access-list add interface=wlan1 mac-address=00:00:00:00:00:00 signal-range=-80 authentication=no forwarding=no # WAP1/WAP2/WAP3/WAP4 # # T001 interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:01 comment="Scanner T001" # T002 interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:02 comment="Scanner T002" # WAP1/WAP2/WAP3/WAP4 ip route add dst-address=0.0.0.0/0 gateway=192.168.14.1 # WAP1/WAP2/WAP3/WAP4 ip service set ssh port=22 # WAP1/WAP2/WAP3/WAP4 system clock set time-zone-name=America/Detroit system ntp client set enabled=yes mode=unicast primary-ntp=192.168.14.1 # WAP1/WAP2/WAP3/WAP4 ip service disable ftp ip service disable telnet ip service disable www ip service disable www-ssl # WAP1/WAP2/WAP3/WAP4 /user group add name=monitoring policy=winbox,read comment="Group for monitoring purpose" /user add name=dude password="********" group=monitoring address=192.168.13.1/32 comment="User for Dude monitoring" Add new scanner to Warehouse wireless network # This must be done on all AP in Mesh # T0XY interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:03 comment="Scanner T0XY" # T0XY ip dhcp-server lease add address=192.168.14.2zz mac-address=00:00:00:00:00:03 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T0XY" Testing WareHouse perimeter: {{ :mikrotik:conf:wirelessmesh_04.png |WareHouse perimeter}} Test (Android) when WAP1 goes down, device connect to WAP2 {{ :mikrotik:conf:wirelessmesh_05.png |Test (Android) when WAP1 goes down, device connect to WAP2}} The Dude: {{ :mikrotik:conf:wirelessmesh_06.png |The Dude}} Comments - Clients see only one network with SSID Mikrotik-Mesh and they don't know anything about 4 AP. - Tested on ROS 5.18. - Scanners are Motorola Symbol MC3100. - Very low traffic from scanners. - Scanners have access only to DNS and Web servers in LAN. Hopefully this will be useful for someone. Original article on forum here.