VLAN1 does not matter in non-Cisco gear. On Linux aka RouterOS, you just need to ensure bridge ingress filtering to drop untagged “native” VLAN. You can use VLAN 1 just like any other VLAN. I use VLAN1 for MGMT traffic, but you can use it for whatever you want.Dont use vlan1 for data, use any other number
But man, too many people lack clear networking fundamentals to even know this.
You misunderstood me. VLAN 1 has special value or meaning only in Cisco in the world of network engineering as a whole:To use VLAN 1 in MT world, one has to speak ROSish quite fluently ... it's not a problem of VID itself, the problem is that it's used in ROS as implicit default all over place and one has to know how to look to see it. And then change it according to needs. Which might be too much of a hassle, thus recommendation to avoid VID=1 if possible. Effectively it's the same as Cisco (with it's native VLAN concept) and many other vendors, who all treat VLAN with ID=1 in some special way (ROS is quite modest at it, it allows one to reconfigure things which is more than some others allow).
/interface bridge
add frame-types=admit-only-vlan-tagged name=bridge vlan-filtering=yes
First step is to understand nature of your multicast. If it's routable, then your need IGMP Proxy or PIM (as well as a careful look into IGMP Snooping, Multicast helpers etc). If it's non-routable than you need a repeater of some sort.trying to get multicast to route between subnets.
You misunderstood me.
Code: Select all/interface bridge add frame-types=admit-only-vlan-tagged name=bridge vlan-filtering=yes
We all started from somewhere. I started with computer science and CCNA syllabi. If a user is unwilling to learn computer science and network engineering fundamentals to do network engineering, they should quit while they are ahead.Again, I'm not saying it can't be done, in contrary, it can be done. But, again, for inexperienced user it's only too easy to miss all the points where it has to be done so it's way easier to use other VIDs if there isn't a very good reason to use VID 1 in tagged traffic.
I'm speaking as someone who was once a noob.
Is this sill the case? I did a lot PIM-routing stuff around 2018/2019 with ROSv6 and it worked really good.PIM is non-functional on RouterOS v7.
It's not working on latest ROS v7.11 stable at least. And MikroTik did not provide PIM config documentation for ROSv7 either.Is this sill the case? I did a lot PIM-routing stuff around 2018/2019 with ROSv6 and it worked really good.
Cant believe they still werent able to fix an alredy good working (in v6) feature...
MikroTik did not provide PIM config documentation for ROSv7 either.
like 20 years old
/routing pimsm instance
add afi=ipv4 disabled=no name=pimsm-IPv4 vrf=main
add afi=ipv6 disabled=no name=pimsm-IPv6 vrf=main
/routing pimsm interface-template
add disabled=no instance=pimsm-IPv4 interfaces="VLAN200" source-addresses=x.x.x.x
add disabled=no instance=pimsm-IPv6 interfaces="VLAN200" source-addresses=x.x.x.x
add disabled=no instance=pimsm-IPv4 interfaces="VLAN300" source-addresses=x.x.x.x
add disabled=no instance=pimsm-IPv6 interfaces="VLAN300" source-addresses=x.x.x.x
/interface bridge
add igmp-snooping=yes igmp-version=3 mld-version=2 name=bridge
I set 3 interfaces in bridge (my main LAN), set also services on it. On another interface I set a different subnet for GUEST.I did a netinstall of v7.11.2. PIM seems to be working with early testing. Config example for people:Keep in mind, I'm using the official recommended bridge VLAN filtering to ensure IGMP/MLD Snooping works correctly:Code: Select all/routing pimsm instance add afi=ipv4 disabled=no name=pimsm-IPv4 vrf=main add afi=ipv6 disabled=no name=pimsm-IPv6 vrf=main /routing pimsm interface-template add disabled=no instance=pimsm-IPv4 interfaces="VLAN200" source-addresses=x.x.x.x add disabled=no instance=pimsm-IPv6 interfaces="VLAN200" source-addresses=x.x.x.x add disabled=no instance=pimsm-IPv4 interfaces="VLAN300" source-addresses=x.x.x.x add disabled=no instance=pimsm-IPv6 interfaces="VLAN300" source-addresses=x.x.x.x /interface bridge add igmp-snooping=yes igmp-version=3 mld-version=2 name=bridge #To prevent SLAAC from breaking. Also DO NOT SPECIFY VID here.# /interface bridge mdb add bridge=bridge group=ff02::2 ports=bridge,ether2,ether3,ether4,ether5
https://help.mikrotik.com/docs/display/ ... +switching
If you don't have VLANs, you don't need PIM nor IGMP Proxy. The basic IGMP/MLD snooping configuration should be sufficient.I set 3 interfaces in bridge (my main LAN), set also services on it. On another interface I set a different subnet for GUEST.
Would your setup work for DLNA discovery too? A device on the GUEST subnet needs to contact a service running on the LAN side.
Unfortunately I can't set up VLANs at the moment. Thanks
I have most likely failed to understand it correctly, but by reading this wiki:If you don't have VLANs, you don't need PIM nor IGMP Proxy. The basic IGMP/MLD snooping configuration should be sufficient.I set 3 interfaces in bridge (my main LAN), set also services on it. On another interface I set a different subnet for GUEST.
Would your setup work for DLNA discovery too? A device on the GUEST subnet needs to contact a service running on the LAN side.
Unfortunately I can't set up VLANs at the moment. Thanks
PIM/IGMP Proxy is for inter-VLAN routing.
You are not supposed to be using multiple bridges, read this:The IGMP/MLD snooping can be set only for ports on the same bridge, which it doesn't seem to be my case.
It is a temporary setup. I'll will set VLANs on the same bridge when I buy another VLAN-capable device to plug to ether 3 (GUEST now) which is going to be set as a trunk port so that I can have multiple VLANs on the new device.You are not supposed to be using multiple bridges, read this:The IGMP/MLD snooping can be set only for ports on the same bridge, which it doesn't seem to be my case.
viewtopic.php?p=1026098#p1026101
You only need to configure access port based VLAN for your current setup, works fine on single bridge, doesn't need to be trunked.It is a temporary setup. I'll will set VLANs on the same bridge when I buy another VLAN-capable device to plug to ether 3 (GUEST now) which is going to be set as a trunk port so that I can have multiple VLANs on the new device.
Maybe I'm missing something here. Yes same bridge but I meant that Ether3 must be connected to a VLAN-capable switch/AP (it will most likely be another Mikrotik device, I guess), so it needs to be set as tagged port (this is why I called it "trunk" port). I can set the rest of the other ethernet ports on my current MK router as access/untagged ports, except Ether1 , the WAN port. Does it make sense? ThanksYou only need to configure access port based VLAN for your current setup, works fine on single bridge, doesn't need to be trunked.It is a temporary setup. I'll will set VLANs on the same bridge when I buy another VLAN-capable device to plug to ether 3 (GUEST now) which is going to be set as a trunk port so that I can have multiple VLANs on the new device.
I believe PIM-SM follows the RFCs, so the link-local 224.0.0.51/24 of mDNS cannot be distributed via PIM (e.g. it's the 224.0.0 "dst-address" that's not allowed so src-address does not even come into play).(2) replace the mDNS with a functioning PIM-SM configuration like DarkNate posted -- will this work with a native vlan and VLAN20/VLAN30 setup? What do I put in the source-address IP entries in that example? The receiver device IPs?
...in the ~100K x viewed thread on the mDNS topic (and started in 2021): viewtopic.php?t=174354&hilit=mdns#p992798MikroTik is working on mDNS repeater, but that will come together with a global DNS overhaul and it will be an improvement in all areas, not just this one. This is also why it takes some time to make.