update mikrotik/mt-dg.ke.einsle.de

This commit is contained in:
oxidized
2019-08-08 19:55:05 +02:00
parent 873181fcdc
commit 064722be6d

View File

@@ -1,107 +1,131 @@
# routerboard: yes # /system routerboard print
# board-name: hAP ac [oxidized@mt-dg] > /system routerboard print
# model: RouterBOARD 962UiGS-5HacT2HnT #
# serial-number: 67370685D272 routerboard: yes
# firmware-type: qca9550L # board-name: hAP ac
# factory-firmware: 3.31 # model: RouterBOARD 962UiGS-5HacT2HnT
# current-firmware: 6.45.3 # serial-number: 67370685D272
# firmware-type: qca9550L
# factory-firmware: 3.31 # factory-firmware: 3.31
# # current-firmware: 6.45.3
# channel: stable # upgrade-firmware: 6.45.3
# #
#
# Flags: U - undoable, R - redoable, F - floating-undo
# ACTION BY POLICY
# [oxidized@mt-dg] >
# software id = 4J0Q-ELYL [oxidized@mt-dg] > # /system package update print
# [oxidized@mt-dg] > /system package update print
# model = RouterBOARD 962UiGS-5HacT2HnT #
# serial number = 67370685D272 channel: stable
/interface bridge # installed-version: 6.45.3
add fast-forward=no name=br_vlan1 protocol-mode=none #
add fast-forward=no name=br_vlan10 protocol-mode=none
add fast-forward=no name=br_vlan42 protocol-mode=none
add fast-forward=no name=br_vlan50 protocol-mode=none
add fast-forward=no name=br_vlan51 protocol-mode=none [oxidized@mt-dg] >
add fast-forward=no name=br_vlan52 protocol-mode=none [oxidized@mt-dg] > # /system history print
add fast-forward=no name=br_vlan99 protocol-mode=none [oxidized@mt-dg] > /system history print
add fast-forward=no name=br_wlan protocol-mode=none #
/interface ethernet Flags: U - undoable, R - redoable, F - floating-undo
set [ find default-name=ether1 ] speed=100Mbps #  ACTION BY POLICY
set [ find default-name=ether2 ] speed=100Mbps #
set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps
set [ find default-name=sfp1 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full [oxidized@mt-dg] >
/interface wireless [oxidized@mt-dg] > /export
# managed by CAPsMAN [oxidized@mt-dg] > /export
# channel: 2412/20/gn(10dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding
set [ find default-name=wlan1 ] ssid=MikroTik # aug/08/2019 19:55:03 by RouterOS 6.45.3
# managed by CAPsMAN # software id = 4J0Q-ELYL
# channel: 5180/20/ac(20dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding #
set [ find default-name=wlan2 ] ssid=MikroTik # model = RouterBOARD 962UiGS-5HacT2HnT
/interface vlan # serial number = 67370685D272
add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan42 vlan-id=42 /interface bridge
add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan50 vlan-id=50 add fast-forward=no name=br_vlan1 protocol-mode=none
add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan51 vlan-id=51 add fast-forward=no name=br_vlan10 protocol-mode=none
add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan52 vlan-id=52 add fast-forward=no name=br_vlan42 protocol-mode=none
add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan99 vlan-id=99 add fast-forward=no name=br_vlan50 protocol-mode=none
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan1 vlan-id=1 add fast-forward=no name=br_vlan51 protocol-mode=none
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan10 vlan-id=10 add fast-forward=no name=br_vlan52 protocol-mode=none
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan42 vlan-id=42 add fast-forward=no name=br_vlan99 protocol-mode=none
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan50 vlan-id=50 add fast-forward=no name=br_wlan protocol-mode=none
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan51 vlan-id=51 /interface ethernet
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan52 vlan-id=52 set [ find default-name=ether1 ] speed=100Mbps
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan60 vlan-id=60 set [ find default-name=ether2 ] speed=100Mbps
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan99 vlan-id=99 set [ find default-name=ether3 ] speed=100Mbps
/interface wireless security-profiles set [ find default-name=ether4 ] speed=100Mbps
set [ find default=yes ] supplicant-identity=MikroTik set [ find default-name=ether5 ] speed=100Mbps
/ip hotspot profile set [ find default-name=sfp1 ] advertise=\
set [ find default=yes ] html-directory=flash/hotspot 10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/routing bgp instance /interface wireless
set default disabled=yes # managed by CAPsMAN
/routing ospf instance # channel: 2412/20/gn(10dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding
set [ find default=yes ] disabled=yes set [ find default-name=wlan1 ] ssid=MikroTik
/snmp community # managed by CAPsMAN
set [ find default=yes ] addresses=172.24.0.0/16 authentication-password=nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=jie6Wao5weeSahs # channel: 5180/20/ac(20dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding
add addresses=172.24.1.0/24,172.24.10.0/24 authentication-password=nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=monitor security=private set [ find default-name=wlan2 ] ssid=MikroTik
/interface bridge port /interface vlan
add bridge=br_vlan1 interface=vlan1 add interface=br_wlan loop-protect-disable-time=0s \
add bridge=br_vlan10 interface=vlan10 loop-protect-send-interval=0s name=br_wlan_vlan42 vlan-id=42
add bridge=br_vlan42 interface=vlan42 add interface=br_wlan loop-protect-disable-time=0s \
add bridge=br_vlan50 interface=vlan50 loop-protect-send-interval=0s name=br_wlan_vlan50 vlan-id=50
add bridge=br_vlan51 interface=vlan51 add interface=br_wlan loop-protect-disable-time=0s \
add bridge=br_vlan52 interface=vlan52 loop-protect-send-interval=0s name=br_wlan_vlan51 vlan-id=51
add bridge=br_vlan10 hw=no interface=ether2 add interface=br_wlan loop-protect-disable-time=0s \
add bridge=br_vlan51 hw=no interface=ether3 loop-protect-send-interval=0s name=br_wlan_vlan52 vlan-id=52
add bridge=br_vlan51 hw=no interface=ether4 add interface=br_wlan loop-protect-disable-time=0s \
add bridge=br_vlan52 hw=no interface=ether5 loop-protect-send-interval=0s name=br_wlan_vlan99 vlan-id=99
add bridge=br_vlan42 interface=br_wlan_vlan42 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
add bridge=br_vlan50 interface=br_wlan_vlan50 0s name=vlan1 vlan-id=1
add bridge=br_vlan51 interface=br_wlan_vlan51 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
add bridge=br_vlan52 interface=br_wlan_vlan52 0s name=vlan10 vlan-id=10
add bridge=br_vlan99 interface=br_wlan_vlan99 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
add bridge=br_vlan99 interface=vlan99 0s name=vlan42 vlan-id=42
/interface wireless cap add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
# 0s name=vlan50 vlan-id=50
set bridge=br_wlan caps-man-addresses=172.24.1.97 enabled=yes interfaces=wlan1,wlan2 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
/ip address 0s name=vlan51 vlan-id=51
add address=172.24.1.95/24 interface=vlan1 network=172.24.1.0 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
add address=172.24.10.95/24 interface=vlan10 network=172.24.10.0 0s name=vlan52 vlan-id=52
add address=172.24.42.95/24 interface=vlan42 network=172.24.42.0 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
/ip dns 0s name=vlan60 vlan-id=60
set servers=172.24.10.11,172.24.10.12 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\
/ip route 0s name=vlan99 vlan-id=99
add distance=1 gateway=172.24.1.1 /interface wireless security-profiles
/ip ssh set [ find default=yes ] supplicant-identity=MikroTik
set allow-none-crypto=yes forwarding-enabled=remote /ip hotspot profile
/snmp set [ find default=yes ] html-directory=flash/hotspot
set contact="Robert Einsle <robert@einsle.de>" enabled=yes location="Kempten, Dachgeschoss" trap-version=3 /routing bgp instance
/system clock set default disabled=yes
set time-zone-name=Europe/Berlin /routing ospf instance
/system identity set [ find default=yes ] disabled=yes
set name=mt-dg /snmp community
/system ntp client set [ find default=yes ] addresses=172.24.0.0/16 authentication-password=\
set enabled=yes primary-ntp=172.24.10.13 secondary-ntp=172.24.10.12 nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=\
/tool romon nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=jie6Wao5weeSahs
set enabled=yes id=6C:3B:6B:19:5C:58 secrets=78f244b59c add addresses=172.24.1.0/24,172.24.10.0/24 authentication-password=\
nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=\
nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=monitor security=\
private
/interface bridge port
add bridge=br_vlan1 interface=vlan1
add bridge=br_vlan10 interface=vlan10
add bridge=br_vlan42 interface=vlan42
add bridge=br_vlan50 interface=vlan50
add bridge=br_vlan51 interface=vlan51
add bridge=br_vlan52 interface=vlan52
add bridge=br_vlan10 hw=no interface=ether2
add bridge=br_vlan51 hw=no interface=ether3
add bridge=br_vlan51 hw=no interface=ether4
add bridge=br_vlan52 hw=no interface=ether5
add bridge=br_vlan42 interface=br_wlan_vlan42
add bridge=br_vlan50 interface=br_wlan_vlan50
add bridge=br_vlan51 interface=br_wlan_vlan51
add bridge=br_vlan52 interface=br_wlan_vlan52
add bridge=br_vlan99 interface=br_wlan_vlan99
add bridge=br_vlan99 interface=vlan99
/interface wireless cap
#
set bridge=br_wlan caps-man-addresses=172.24.1.97 enabled=yes interfaces=\