I've run into a dead end so tried a different approach.
I set up the MT in default settings to give a default wifi signal to connect to my router.
In this configuration the internet would come into the WAN eth1 connection.
I set the second wifi radio wifi2 to station and connected it to my existing starlink wifi to get internet access SSID="FatParamotorHQ". I added this device to the WAN list.
When I connect my laptop to the MT wifi (wifi1) SSID="Homelab" I get a similar problem - it sees no internet. The devices connected to the MT router by ethernet see no internet.
In the MT terminal I can ping google with no problems.
How can I configure the NT so the ethernet ports and the wifi1 can see the internet coming via wifi2?
Many thanks ... Shaun
I set up the MT in default settings to give a default wifi signal to connect to my router.
In this configuration the internet would come into the WAN eth1 connection.
I set the second wifi radio wifi2 to station and connected it to my existing starlink wifi to get internet access SSID="FatParamotorHQ". I added this device to the WAN list.
When I connect my laptop to the MT wifi (wifi1) SSID="Homelab" I get a similar problem - it sees no internet. The devices connected to the MT router by ethernet see no internet.
In the MT terminal I can ping google with no problems.
How can I configure the NT so the ethernet ports and the wifi1 can see the internet coming via wifi2?
Many thanks ... Shaun
Code:
# 2024-01-20 17:29:12 by RouterOS 7.13.2# software id = TFIP-T5R2## model = C53UiG+5HPaxD2HPaxD# serial number = HF309EC74SC/interface bridgeadd admin-mac=78:9A:18:62:FE:9B auto-mac=no comment=defconf name=bridge/interface wifiset [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=\ 10min-cac .width=20/40mhz configuration.mode=station .ssid=FatParamotorHQ \ disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes \ .ft-over-ds=yes/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/interface wifi securityadd authentication-types=wpa2-psk,wpa3-psk disabled=no name=FPHQ/interface wifiset [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=\ 10min-cac .width=20/40/80mhz configuration.mode=ap .ssid=Homelab \ disabled=no security=FPHQ security.authentication-types=wpa2-psk,wpa3-psk \ .ft=yes .ft-over-ds=yes/ip pooladd name=default-dhcp ranges=192.168.88.10-192.168.88.254add name=pool-homelab ranges=192.168.1.10-192.168.1.254add name=dhcp_pool3 ranges=192.168.1.10-192.168.1.254/ip dhcp-serveradd address-pool=dhcp_pool3 interface=bridge name=dhcp1/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5add bridge=bridge broadcast-flood=no interface=wifi1/ip neighbor discovery-settingsset discover-interface-list=LAN/interface detect-internetset wan-interface-list=all/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=WANadd interface=wifi2 list=WAN/ip addressadd address=192.168.1.131 comment=defconf interface=bridge network=\ 192.168.1.0/ip dhcp-clientadd comment=defconf interface=wifi2/ip dhcp-server networkadd address=192.168.1.0/24 comment=defconf dns-server=192.168.1.1 gateway=\ 192.168.1.1 netmask=24/ip dnsset allow-remote-requests=yes/ip dns staticadd address=192.168.88.1 comment=defconf name=router.lan/ip firewall filteradd action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment=\ "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" \ in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalidadd action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WAN/ipv6 firewall address-listadd address=::/128 comment="defconf: unspecified address" list=bad_ipv6add address=::1/128 comment="defconf: lo" list=bad_ipv6add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6add address=100::/64 comment="defconf: discard only " list=bad_ipv6add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6/ipv6 firewall filteradd action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalidadd action=accept chain=input comment="defconf: accept ICMPv6" protocol=\ icmpv6add action=accept chain=input comment="defconf: accept UDP traceroute" port=\ 33434-33534 protocol=udpadd action=accept chain=input comment=\ "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\ udp src-address=fe80::/10add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \ protocol=udpadd action=accept chain=input comment="defconf: accept ipsec AH" protocol=\ ipsec-ahadd action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\ ipsec-espadd action=accept chain=input comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=input comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LANadd action=accept chain=forward comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalidadd action=drop chain=forward comment=\ "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6add action=drop chain=forward comment=\ "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \ hop-limit=equal:1 protocol=icmpv6add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\ icmpv6add action=accept chain=forward comment="defconf: accept HIP" protocol=139add action=accept chain=forward comment="defconf: accept IKE" dst-port=\ 500,4500 protocol=udpadd action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\ ipsec-ahadd action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\ ipsec-espadd action=accept chain=forward comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=forward comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN/system clockset time-zone-name=Europe/London/system noteset show-at-login=no/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN
Statistics: Posted by ShaunFavell — Sat Jan 20, 2024 7:38 pm