Myrmex
Myrmex
Blog/Use Cases

Segmented WiFi in MikroTik: How to Create Isolated SSIDs Securely

Segmented WiFi in MikroTik: How to Create Isolated SSIDs Securely
MikroTikMIKROTIK
Myrmex

The Challenge

A client needed to create a dedicated WiFi network for a specific group of devices, completely isolated from the main network. The requirements were clear:

  • Own SSID ("Numenor") with high performance
  • Separate subnet for traffic isolation
  • Dedicated DHCP with long leases for fixed devices
  • Firewall rules to control access

The Prompt Sent to Myrmex

Using the integration with the MikroTik router, we sent the following prompt:

I need to create a segmented WiFi network on my MikroTik.

ENVIRONMENT:
- Device: @MKT-ROUTER-01
- RouterOS version: 7.21 with wifiwave2 package installed
- WiFi Interface: wifi1
- Main Bridge: bridge

REQUIREMENTS:
1. Create SSID "Numenor" using WiFiWave2 with 80MHz bandwidth
2. Isolated network on subnet 10.99.102.0/24
3. Gateway at 10.99.102.1
4. DHCP Pool from 10.99.102.2 to 10.99.102.30
5. Lease time of 1 week for fixed devices
6. NAT for internet access
7. Firewall rule allowing subnet traffic

Apply the settings and validate each step.

Note: By mentioning the device with @MKT-ROUTER-01, Myrmex knows exactly which equipment it is configuring, improving the accuracy of the settings.

WiFi Configuration on MikroTik via Myrmex


What Myrmex Did

1. Wireless Interface Configuration (WiFiWave2)

Myrmex started by configuring the WiFi radio with high-performance parameters:

/interface wifiwave2 set [ find name=wifi1 ] \
    configuration.ssid="Numenor" \
    configuration.mode=ap \
    channel.width=20/40/80mhz \
    disabled=no

Validation: Myrmex executed /interface wifiwave2 print and confirmed:

FieldValue
Namewifi1
Modeap
SSIDNumenor
Channel Width20/40/80mhz

2. Bridge Association and IP Addressing

To integrate WiFi into the network infrastructure, Myrmex added the interface to the bridge and configured the gateway:

# Add WiFi to bridge
/interface bridge port add bridge=bridge interface=wifi1

# Configure gateway of the new subnet
/ip address add address=10.99.102.1/24 interface=bridge network=10.99.102.0

Validation: Executed /ip address print where interface=bridge and confirmed the IP 10.99.102.1/24 active.

3. DHCP Server Configuration

Myrmex created the IP pool and the DHCP server with extended lease:

# Create address pool
/ip pool add name=NUMENOR ranges=10.99.102.2-10.99.102.30

# Create DHCP server
/ip dhcp-server add \
    name=Numenor \
    address-pool=NUMENOR \
    interface=bridge \
    lease-time=1w10m

# Configure DHCP network
/ip dhcp-server network add \
    address=10.99.102.0/24 \
    gateway=10.99.102.1 \
    dns-server=8.8.8.8,8.8.4.4

Why 1-week lease? Myrmex chose this time because the Numenor network will be used by fixed or long-stay devices, reducing unnecessary renewals.

Validation: Executed /ip dhcp-server print and confirmed:

NameInterfacePoolLease Time
NumenorbridgeNUMENOR1w10m

4. Security: NAT and Firewall

Finally, Myrmex configured internet access and security rules:

# NAT for internet access
/ip firewall nat add \
    action=masquerade \
    chain=srcnat \
    out-interface-list=WAN \
    comment="General NAT"

# Allow Numenor subnet traffic
/ip firewall filter add \
    chain=input \
    action=accept \
    src-address=10.99.102.0/24 \
    comment="Allow Numenor subnet"

Validation: Executed /ip firewall filter print where comment~"Numenor" and confirmed the active rule.


Final Validation by Myrmex

After applying all settings, Myrmex ran a battery of tests:

TestCommand ExecutedResult
WiFi active/interface wifiwave2 print✅ SSID "Numenor" operational
Bridge configured/interface bridge port print✅ wifi1 in bridge
IP gateway/ip address print✅ 10.99.102.1/24 active
DHCP Pool/ip pool print✅ Range 10.99.102.2-30
DHCP Server/ip dhcp-server print✅ Lease 1w10m
NAT active/ip firewall nat print✅ Masquerade configured
Firewall/ip firewall filter print✅ Subnet allowed

Myrmex also tested connectivity by simulating a client on the Numenor network.


Result

With the configuration applied and validated by Myrmex:

  • Isolation: Network operating on subnet 10.99.102.0/24, separated from the main network
  • Performance: WiFiWave2 with bandwidth up to 80MHz
  • Persistence: 1-week DHCP lease, ideal for fixed devices
  • Security: NAT configured and access controlled via Firewall

Important Tip

Before applying WiFiWave2 settings, verify if the package is installed with /system package print. If not, download it at mikrotik.com and reboot the device.


Prompt Variations

The same result can be adapted for different scenarios:

For multiple SSIDs (Guest + Corporate):

...create two SSIDs: "Corporate" on subnet 10.99.100.0/24 and "Guest" on 10.99.200.0/24, with isolation between them...

For WiFi with VLAN tagging:

...associate SSID "Numenor" to VLAN 102 and ensure traffic is tagged on the bridge...

To limit bandwidth per client:

...add simple Queue limiting each client of Numenor network to 10Mbps download and 5Mbps upload...

Want to create segmented WiFi networks in minutes? Try Myrmex and let AI configure and validate your infrastructure automatically.

MYRMEX | Segmented WiFi in MikroTik: How to Create Isolated SSIDs Securely