update mikrotik/mt-dg.ke.einsle.de

This commit is contained in:
oxidized 2019-08-08 20:55:08 +02:00
parent 064722be6d
commit 213f2dcd23

View File

@ -1,131 +1,107 @@
# /system routerboard print [oxidized@mt-dg] > /system routerboard print # routerboard: yes
# routerboard: yes # board-name: hAP ac
# board-name: hAP ac # model: RouterBOARD 962UiGS-5HacT2HnT
# model: RouterBOARD 962UiGS-5HacT2HnT # serial-number: 67370685D272
# serial-number: 67370685D272 # firmware-type: qca9550L
# firmware-type: qca9550L # factory-firmware: 3.31
# factory-firmware: 3.31 # current-firmware: 6.45.3
# current-firmware: 6.45.3
# upgrade-firmware: 6.45.3 # upgrade-firmware: 6.45.3
# [oxidized@mt-dg] > [oxidized@mt-dg] > # /system package update print [oxidized@mt-dg] > /system package update print #
# channel: stable # channel: stable
# installed-version: 6.45.3 # installed-version: 6.45.3
# [oxidized@mt-dg] > [oxidized@mt-dg] > # /system history print [oxidized@mt-dg] > /system history print #
# Flags: U - undoable, R - redoable, F - floating-undo # Flags: U - undoable, R - redoable, F - floating-undo
#  ACTION BY POLICY # ACTION BY POLICY
# [oxidized@mt-dg] > [oxidized@mt-dg] > /export [oxidized@mt-dg] > /export #
# aug/08/2019 19:55:03 by RouterOS 6.45.3 # software id = 4J0Q-ELYL
# software id = 4J0Q-ELYL #
# # model = RouterBOARD 962UiGS-5HacT2HnT
# model = RouterBOARD 962UiGS-5HacT2HnT # serial number = 67370685D272
# serial number = 67370685D272 /interface bridge
/interface bridge add fast-forward=no name=br_vlan1 protocol-mode=none
add fast-forward=no name=br_vlan1 protocol-mode=none add fast-forward=no name=br_vlan10 protocol-mode=none
add fast-forward=no name=br_vlan10 protocol-mode=none add fast-forward=no name=br_vlan42 protocol-mode=none
add fast-forward=no name=br_vlan42 protocol-mode=none add fast-forward=no name=br_vlan50 protocol-mode=none
add fast-forward=no name=br_vlan50 protocol-mode=none add fast-forward=no name=br_vlan51 protocol-mode=none
add fast-forward=no name=br_vlan51 protocol-mode=none add fast-forward=no name=br_vlan52 protocol-mode=none
add fast-forward=no name=br_vlan52 protocol-mode=none add fast-forward=no name=br_vlan99 protocol-mode=none
add fast-forward=no name=br_vlan99 protocol-mode=none add fast-forward=no name=br_wlan protocol-mode=none
add fast-forward=no name=br_wlan protocol-mode=none /interface ethernet
/interface ethernet set [ find default-name=ether1 ] speed=100Mbps
set [ find default-name=ether1 ] speed=100Mbps set [ find default-name=ether2 ] speed=100Mbps
set [ find default-name=ether2 ] speed=100Mbps set [ find default-name=ether3 ] speed=100Mbps
set [ find default-name=ether3 ] speed=100Mbps set [ find default-name=ether4 ] speed=100Mbps
set [ find default-name=ether4 ] speed=100Mbps set [ find default-name=ether5 ] speed=100Mbps
set [ find default-name=ether5 ] speed=100Mbps set [ find default-name=sfp1 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=sfp1 ] advertise=\ /interface wireless
10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full # managed by CAPsMAN
/interface wireless # channel: 2412/20/gn(10dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding
# managed by CAPsMAN set [ find default-name=wlan1 ] ssid=MikroTik
# channel: 2412/20/gn(10dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding # managed by CAPsMAN
set [ find default-name=wlan1 ] ssid=MikroTik # channel: 5180/20/ac(20dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding
# managed by CAPsMAN set [ find default-name=wlan2 ] ssid=MikroTik
# channel: 5180/20/ac(20dBm), SSID: wifis.org/ke/bertling, CAPsMAN forwarding /interface vlan
set [ find default-name=wlan2 ] ssid=MikroTik add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan42 vlan-id=42
/interface vlan add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan50 vlan-id=50
add interface=br_wlan loop-protect-disable-time=0s \ add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan51 vlan-id=51
loop-protect-send-interval=0s name=br_wlan_vlan42 vlan-id=42 add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan52 vlan-id=52
add interface=br_wlan loop-protect-disable-time=0s \ add interface=br_wlan loop-protect-disable-time=0s loop-protect-send-interval=0s name=br_wlan_vlan99 vlan-id=99
loop-protect-send-interval=0s name=br_wlan_vlan50 vlan-id=50 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan1 vlan-id=1
add interface=br_wlan loop-protect-disable-time=0s \ add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan10 vlan-id=10
loop-protect-send-interval=0s name=br_wlan_vlan51 vlan-id=51 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan42 vlan-id=42
add interface=br_wlan loop-protect-disable-time=0s \ add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan50 vlan-id=50
loop-protect-send-interval=0s name=br_wlan_vlan52 vlan-id=52 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan51 vlan-id=51
add interface=br_wlan loop-protect-disable-time=0s \ add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan52 vlan-id=52
loop-protect-send-interval=0s name=br_wlan_vlan99 vlan-id=99 add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan60 vlan-id=60
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=0s name=vlan99 vlan-id=99
0s name=vlan1 vlan-id=1 /interface wireless security-profiles
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ set [ find default=yes ] supplicant-identity=MikroTik
0s name=vlan10 vlan-id=10 /ip hotspot profile
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ set [ find default=yes ] html-directory=flash/hotspot
0s name=vlan42 vlan-id=42 /routing bgp instance
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ set default disabled=yes
0s name=vlan50 vlan-id=50 /routing ospf instance
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ set [ find default=yes ] disabled=yes
0s name=vlan51 vlan-id=51 /snmp community
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ set [ find default=yes ] addresses=172.24.0.0/16 authentication-password=nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=jie6Wao5weeSahs
0s name=vlan52 vlan-id=52 add addresses=172.24.1.0/24,172.24.10.0/24 authentication-password=nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=monitor security=private
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ /interface bridge port
0s name=vlan60 vlan-id=60 add bridge=br_vlan1 interface=vlan1
add interface=ether1 loop-protect-disable-time=0s loop-protect-send-interval=\ add bridge=br_vlan10 interface=vlan10
0s name=vlan99 vlan-id=99 add bridge=br_vlan42 interface=vlan42
/interface wireless security-profiles add bridge=br_vlan50 interface=vlan50
set [ find default=yes ] supplicant-identity=MikroTik add bridge=br_vlan51 interface=vlan51
/ip hotspot profile add bridge=br_vlan52 interface=vlan52
set [ find default=yes ] html-directory=flash/hotspot add bridge=br_vlan10 hw=no interface=ether2
/routing bgp instance add bridge=br_vlan51 hw=no interface=ether3
set default disabled=yes add bridge=br_vlan51 hw=no interface=ether4
/routing ospf instance add bridge=br_vlan52 hw=no interface=ether5
set [ find default=yes ] disabled=yes add bridge=br_vlan42 interface=br_wlan_vlan42
/snmp community add bridge=br_vlan50 interface=br_wlan_vlan50
set [ find default=yes ] addresses=172.24.0.0/16 authentication-password=\ add bridge=br_vlan51 interface=br_wlan_vlan51
nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=\ add bridge=br_vlan52 interface=br_wlan_vlan52
nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=jie6Wao5weeSahs add bridge=br_vlan99 interface=br_wlan_vlan99
add addresses=172.24.1.0/24,172.24.10.0/24 authentication-password=\ add bridge=br_vlan99 interface=vlan99
nUTIRozDeJMiQ2Goj8BR authentication-protocol=SHA1 encryption-password=\ /interface wireless cap
nUTIRozDeJMiQ2Goj8BR encryption-protocol=AES name=monitor security=\ #
private set bridge=br_wlan caps-man-addresses=172.24.1.97 enabled=yes interfaces=wlan1,wlan2
/interface bridge port /ip address
add bridge=br_vlan1 interface=vlan1 add address=172.24.1.95/24 interface=vlan1 network=172.24.1.0
add bridge=br_vlan10 interface=vlan10 add address=172.24.10.95/24 interface=vlan10 network=172.24.10.0
add bridge=br_vlan42 interface=vlan42 add address=172.24.42.95/24 interface=vlan42 network=172.24.42.0
add bridge=br_vlan50 interface=vlan50 /ip dns
add bridge=br_vlan51 interface=vlan51 set servers=172.24.10.11,172.24.10.12
add bridge=br_vlan52 interface=vlan52 /ip route
add bridge=br_vlan10 hw=no interface=ether2 add distance=1 gateway=172.24.1.1
add bridge=br_vlan51 hw=no interface=ether3 /ip ssh
add bridge=br_vlan51 hw=no interface=ether4 set allow-none-crypto=yes forwarding-enabled=remote
add bridge=br_vlan52 hw=no interface=ether5 /snmp
add bridge=br_vlan42 interface=br_wlan_vlan42 set contact="Robert Einsle <robert@einsle.de>" enabled=yes location="Kempten, Dachgeschoss" trap-version=3
add bridge=br_vlan50 interface=br_wlan_vlan50 /system clock
add bridge=br_vlan51 interface=br_wlan_vlan51 set time-zone-name=Europe/Berlin
add bridge=br_vlan52 interface=br_wlan_vlan52 /system identity
add bridge=br_vlan99 interface=br_wlan_vlan99 set name=mt-dg
add bridge=br_vlan99 interface=vlan99 /system ntp client
/interface wireless cap set enabled=yes primary-ntp=172.24.10.13 secondary-ntp=172.24.10.12
# /tool romon
set bridge=br_wlan caps-man-addresses=172.24.1.97 enabled=yes interfaces=\ set enabled=yes id=6C:3B:6B:19:5C:58 secrets=78f244b59c
wlan1,wlan2
/ip address
add address=172.24.1.95/24 interface=vlan1 network=172.24.1.0
add address=172.24.10.95/24 interface=vlan10 network=172.24.10.0
add address=172.24.42.95/24 interface=vlan42 network=172.24.42.0
/ip dns
set servers=172.24.10.11,172.24.10.12
/ip route
add distance=1 gateway=172.24.1.1
/ip ssh
set allow-none-crypto=yes forwarding-enabled=remote
/snmp
set contact="Robert Einsle <robert@einsle.de>" enabled=yes location=\
"Kempten, Dachgeschoss" trap-version=3
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=mt-dg
/system ntp client
set enabled=yes primary-ntp=172.24.10.13 secondary-ntp=172.24.10.12
/tool romon
set enabled=yes id=6C:3B:6B:19:5C:58 secrets=78f244b59c
[oxidized@mt-dg] > [oxidized@mt-dg] >