Pros of this kind of configuration: One single SSID for clients and seamless roaming.
Here is the complete configuration example of a wireless network based on Mikrotik mesh with all Router OS code ready to copy/paste into terminal.
Example shown here is purposed for wireless scanners inside a warehouse.
General Description
RB433UAH
# add mesh interface interface mesh add name=mesh-interface # assign ports to the mesh interface interface mesh port add interface=ether2-warehouse mesh=mesh-interface # add ip to the mesh interface ip address add address=192.168.14.1/24 interface=mesh-interface
ip pool add name=warehouse-dhcp-ip-pool ranges=192.168.14.230-192.168.14.253 ip dhcp-server add name=warehouse-dhcp-server interface=mesh-interface lease-time=12:00:00 address-pool=warehouse-dhcp-ip-pool always-broadcast=yes disabled=no ip dhcp-server network add address=192.168.14.0/24 gateway=192.168.14.1 netmask=24 dns-server=192.168.13.1
# T001 ip dhcp-server lease add address=192.168.14.231 mac-address=00:00:00:00:00:01 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T001" # T002 ip dhcp-server lease add address=192.168.14.232 mac-address=00:00:00:00:00:02 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T002"
system ntp client set enabled=yes mode=unicast primary-ntp=64.73.32.134 secondary-ntp=38.229.71.1
system ntp server set broadcast=no broadcast-addresses="" enabled=yes manycast=no multicast=no
ip firewall address-list add address=192.168.13.1 comment="admin01" disabled=no list=Gw-admins ip firewall address-list add address=192.168.13.2 comment="linux for backups to SVN" disabled=no list=Gw-admins ip firewall address-list add address=192.168.13.1 disabled=no list=US-Srv-DNS ip firewall address-list add address=192.168.13.1 disabled=no list=US-Srv-WareHouseServer ip firewall address-list add address=192.168.14.201 comment=WAP1 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.202 comment=WAP2 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.203 comment=WAP3 disabled=no list=US-WH-WAP ip firewall address-list add address=192.168.14.204 comment=WAP4 disabled=no list=US-WH-WAP # US-WH-Scanners - dynamic via DHCP
# Input chain ip firewall filter add action=accept chain=input comment="Drop invalid connections" connection-state=invalid disabled=no ip firewall filter add action=accept chain=input comment="Allow Established connections to Gateway" connection-state=established disabled=no ip firewall filter add action=accept chain=input comment="Allow Related connections to Gateway" connection-state=related disabled=no ip firewall filter add action=accept chain=input comment="Allow SG Network Core: NTP on LAN" disabled=no dst-port=123 in-interface=!ether1-wan-primary protocol=udp # Forward chain # # General rules ip firewall filter add action=accept chain=forward comment="Drop invalid connections" connection-state=invalid disabled=no ip firewall filter add action=accept chain=forward comment="Allow Established connections to Any" connection-state=established disabled=no ip firewall filter add action=accept chain=forward comment="Allow Related connections to Any" connection-state=related disabled=no # From Mesh to LAN ip firewall filter add action=accept chain=forward comment="Allow Network Core: ICMP from Mesh" disabled=no in-interface=mesh-wap out-interface=bridge-lan protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow Scanners to DNS - US-WH-Scanners" disabled=no dst-address-list=US-Srv-DNS dst-port=53 in-interface=mesh-wap out-interface=bridge-lan protocol=udp src-address-list=US-WH-Scanners ip firewall filter add action=accept chain=forward comment="Allow Scanners to WareHouseServer - US-WH-Scanners" disabled=no dst-address-list=US-Srv-WareHouseServer dst-port=80 in-interface=mesh-wap out-interface=bridge-lan protocol=tcp src-address-list=US-WH-Scanners ip firewall filter add action=log chain=forward comment="Log any other from scanners" disabled=yes in-interface=mesh-wap ip firewall filter add action=drop chain=forward comment="Drop any other from scanners" disabled=no in-interface=mesh-wap # From LAN to Mesh ip firewall filter add action=accept chain=forward comment="Allow SG Network Core: ICMP to WAP" disabled=no dst-address-list=US-WH-WAP in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow SG Network Core: ICMP to Scanners" disabled=no dst-address-list=US-WH-Scanners in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=icmp ip firewall filter add action=accept chain=forward comment="Allow SG Remote Access: Winbox for admins on WAP" disabled=no dst-port=8291 in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=tcp src-address-list=Gw-admins ip firewall filter add action=accept chain=forward comment="Allow SG Remote Access: SSH for backup WAP" disabled=no dst-port=22 in-interface=!ether1-wan-primary out-interface=mesh-wap protocol=tcp src-address-list=Gw-admins ip firewall filter add action=accept chain=forward comment="Allow SG Monitoring: SNMP on WAP segment" disabled=no dst-port=161 in-interface=bridge-lan out-interface=mesh-wap protocol=udp ip firewall filter add action=log chain=forward comment="Log any other to scanners" disabled=yes out-interface=mesh-wap ip firewall filter add action=drop chain=forward comment="Drop any other to scanners" disabled=no out-interface=mesh-wap
RB751U-2HnD
# WAP1/WAP2/WAP3/WAP4
system
routerboard
dhcp
wireless
security
advanced-tools
# WAP1/WAP2/WAP3/WAP4 interface mesh add name=mesh-interface interface mesh port add interface=ether1 mesh=mesh-interface interface mesh port add interface=wlan1 mesh=mesh-interface
# WAP1 ip address add address=192.168.14.201/24 interface=mesh-interface # WAP2 ip address add address=192.168.14.202/24 interface=mesh-interface # WAP3 ip address add address=192.168.14.203/24 interface=mesh-interface # WAP4 ip address add address=192.168.14.204/24 interface=mesh-interface
# WAP1/WAP2/WAP3/WAP4 interface wireless set wlan1 disabled=no mode=ap-bridge band=2ghz-b/g/n frequency=2452 ssid=Mikrotik-Mesh default-authentication=no default-forwarding=no
# WAP1/WAP2/WAP3/WAP4 # # ban Scanners with low signal strength interface wireless access-list add interface=wlan1 mac-address=00:00:00:00:00:00 signal-range=-80 authentication=no forwarding=no
# WAP1/WAP2/WAP3/WAP4 # # T001 interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:01 comment="Scanner T001" # T002 interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:02 comment="Scanner T002"
# WAP1/WAP2/WAP3/WAP4 ip route add dst-address=0.0.0.0/0 gateway=192.168.14.1
# WAP1/WAP2/WAP3/WAP4 ip service set ssh port=22
# WAP1/WAP2/WAP3/WAP4 system clock set time-zone-name=America/Detroit system ntp client set enabled=yes mode=unicast primary-ntp=192.168.14.1
# WAP1/WAP2/WAP3/WAP4 ip service disable ftp ip service disable telnet ip service disable www ip service disable www-ssl
# WAP1/WAP2/WAP3/WAP4 /user group add name=monitoring policy=winbox,read comment="Group for monitoring purpose" /user add name=dude password="********" group=monitoring address=192.168.13.1/32 comment="User for Dude monitoring"
Add new scanner to Warehouse wireless network
# This must be done on all AP in Mesh # T0XY interface wireless access-list add disabled=no authentication=yes forwarding=no interface=wlan1 mac-address=00:00:00:00:00:03 comment="Scanner T0XY"
# T0XY ip dhcp-server lease add address=192.168.14.2zz mac-address=00:00:00:00:00:03 server=warehouse-dhcp-server lease-time=0 address-list=US-WH-Scanners disabled=no comment="Scanner T0XY"
Test (Android) when WAP1 goes down, device connect to WAP2
Comments
Hopefully this will be useful for someone. Original article on forum here.