Community discussions

MikroTik App
 
xtornado
newbie
Topic Author
Posts: 31
Joined: Sun Mar 07, 2010 8:02 pm

CapsMan ROS 7.13.x , issues with adding local wifi interface

Fri Jan 12, 2024 6:55 pm

Hi

I am running hap ac3 as main router, and have hap ax2 as device for wlan coverage

Capsman is running on hap ac3, and have have successfully provisioned hap ax2 interfaces without any issues.

But i have issue when i want to add local interfaces from hap ac3 into local capsman.

First thing i was try to set on local wifi interface is on /interface/wifi/ wifi1 and wifi2 manger=capsman or local, but after i do that in winbox see that device is managed by capsman as comment but for some reason devices are not connected back to the radios.

Second thing that was try to set on existing (already working profile for local interfaces) datapath and bridge but it is same situation.

Interesting thing is that i see MAC address of local interface in /interface/wifi/radios/ but for some reason traffic is not fowarding over that interface.

On that hap ac3 i have setuped up address for CapsManManger 127.0.0.1 and have firewall rules that allows traffic.
[admin@Mikrotik hAP ac3] /interface/wifi> export compact 
# 2024-01-12 17:50:44 by RouterOS 7.13.1
# model = RBD53iG-5HacD2HnD

/interface wifi channel
add frequency=2412,2437,2462 name=ch-2ghz width=20/40mhz
add frequency=5180,5200,5220,5240 name=ch-5ghz skip-dfs-channels=all width=20/40/80mhz
add disabled=no frequency=2412,2437,2462 name=cap-2GHz width=20/40mhz
add disabled=no name=cap-5GHz skip-dfs-channels=all width=20/40/80mhz
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no ft=yes ft-over-ds=yes name=common-auth wps=disable
add authentication-types=wpa2-psk,wpa3-psk disabled=no ft=yes ft-over-ds=yes name=guest-auth
/interface wifi configuration
add channel=ch-2ghz disabled=no name=common-conf security=common-auth security.connect-priority=0 .ft=yes .ft-over-ds=yes .wps=push-button ssid=WIFI_SSID
add channel=ch-5ghz country=Croatia disabled=no name=common-conf-5Ghz security=common-auth security.connect-priority=0 .ft=yes .ft-over-ds=yes .wps=push-button ssid=WIFI_SSID
add channel=cap-2GHz disabled=no name=cap-cfg-2GHz security=common-auth security.connect-priority=0 .ft=yes .ft-over-ds=yes .wps=push-button ssid=WIFI_SSID tx-power=5
add channel=cap-5GHz country=Croatia disabled=no name=cap-cfg-5GHz security=common-auth security.connect-priority=0 .ft=yes .ft-over-ds=yes .wps=push-button ssid=WIFI_SSID tx-power=5
/interface wifi
set [ find default-name=wifi1 ] channel=ch-2ghz channel.frequency=2412,2437,2462 configuration=common-conf configuration.manager=local .mode=ap disabled=no security.ft=yes .wps=disable
set [ find default-name=wifi2 ] channel.frequency=5180,5200,5220,5240 configuration=common-conf-5Ghz configuration.manager=local .mode=ap .tx-power=14 disabled=no security.ft=yes .wps=\
    disable
/interface wifi datapath
add bridge=bridge-LAN disabled=no name=datapath1

/interface wifi cap
set caps-man-addresses=127.0.0.1 certificate=request enabled=yes
/interface wifi capsman
set ca-certificate=auto certificate=auto enabled=yes interfaces=all package-path="" require-peer-certificate=no upgrade-policy=none
/interface wifi configuration
add channel=cap-2GHz country=Croatia datapath.bridge=*33 disabled=no name=cap-cfg-guest-2GHz security=guest-auth security.ft=yes .ft-over-ds=yes ssid=WIFI_SSID_guest
add channel=cap-5GHz country=Croatia datapath.bridge=*33 disabled=no name=cap-cfg-guest-5GHz security=guest-auth security.ft=yes .ft-over-ds=yes ssid=WIFI_SSID_guest
add channel=ch-2ghz country=Croatia datapath.bridge=*33 disabled=no name=common-conf-guest-2GHz security=guest-auth security.ft=yes .ft-over-ds=yes ssid=WIFI_SSID_guest
add channel=ch-5ghz country=Croatia datapath.bridge=*33 disabled=no name=common-conf-guest-5GHz security=guest-auth security.ft=yes .ft-over-ds=yes ssid=WIFI_SSID_guest
/interface wifi datapath
add bridge=*33 disabled=no name=guest-wifi
/interface wifi provisioning
add action=create-dynamic-enabled disabled=yes master-configuration=common-conf
add action=create-dynamic-enabled disabled=yes master-configuration=common-conf-5Ghz
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-5GHz radio-mac=48:A9:8A:68:34:CB supported-bands=5ghz-ax
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-5GHz radio-mac=48:A9:8A:68:34:CB supported-bands=5ghz-ac
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-5GHz radio-mac=48:A9:8A:68:34:CB supported-bands=5ghz-n
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-2GHz radio-mac=48:A9:8A:68:34:CC supported-bands=2ghz-ax
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-2GHz radio-mac=48:A9:8A:68:34:CC supported-bands=2ghz-g
add action=create-dynamic-enabled disabled=no master-configuration=cap-cfg-2GHz radio-mac=48:A9:8A:68:34:CC supported-bands=2ghz-n

#Local interaface provisioning setup below,2.4G only for test:

add action=create-enabled disabled=no master-configuration=common-conf radio-mac=2C:C8:1B:A5:9F:D9 supported-bands=2ghz-g
add action=create-enabled disabled=no master-configuration=common-conf radio-mac=2C:C8:1B:A5:9F:D9 supported-bands=2ghz-n




/ip firewall filter
add action=accept chain=forward src-address=192.168.98.0/24
add action=accept chain=input src-address=192.168.98.0/24
add action=accept chain=forward dst-address=192.168.201.0/24
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="Accept local CAPsMAN config" dst-address-type=local src-address-type=local
add action=accept chain=input comment="Capsman local" protocol=udp src-port=5246,5247
add action=accept chain=input dst-port=5246,5247 protocol=udp
add action=drop chain=forward comment=Korina disabled=yes src-address=192.168.88.66
add action=drop chain=output comment=Korina disabled=yes src-address=192.168.88.66
add action=drop chain=input comment=Korina disabled=yes src-address=192.168.88.66
add action=accept chain=input comment=Wireguard disabled=yes dst-port=13231 in-interface-list=WAN protocol=udp
add action=accept chain=input comment=Wireguard dst-port=443 in-interface-list=WAN protocol=udp
add action=accept chain=input src-address=192.168.89.0/24
add action=accept chain=forward src-address=192.168.89.0/24
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=out,ipsec
add action=drop chain=forward comment="Block VPN-pool to local LAN " dst-address-list=Local_LAN src-address-list=vpn-pool
add action=drop chain=input comment="Block VPN-pool to local LAN " dst-address-list=Local_LAN src-address-list=vpn-pool
add action=accept chain=input comment="L2TP/IPsec VPN" dst-port=500 in-interface-list=WAN protocol=udp
add action=accept chain=input comment="L2TP/IPsec VPN" dst-port=1701 in-interface-list=WAN protocol=udp
add action=accept chain=input comment="L2TP/IPsec VPN" dst-port=4500 in-interface-list=WAN protocol=udp
add action=accept chain=input in-interface=ether1-WAN protocol=ipsec-esp
add action=accept chain=input in-interface=ether1-WAN protocol=ipsec-ah
add action=accept chain=input comment="VPN network allow" src-address=192.168.150.0/24
add action=accept chain=forward comment="VPN network allow" src-address=192.168.150.0/24
add action=drop chain=input comment="Block ICMP on WAN input" connection-nat-state=!srcnat connection-state=!established,related in-interface=ether1-WAN protocol=icmp
add action=accept chain=input comment="Allow EoIP/GRE input" protocol=gre
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="Allow Eoip/GRE" protocol=gre
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack, disable radi queue" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN

You do not have the required permissions to view the files attached to this post.
 
whatever
Member
Member
Posts: 353
Joined: Thu Jun 21, 2018 9:29 pm

Re: CapsMan ROS 7.13.x , issues with adding local wifi interface  [SOLVED]

Fri Jan 12, 2024 7:34 pm

Unset manager on local interfaces, or set it to "local". Then go to the Radios tab, select your local radio and click the "Provision" button.
 
xtornado
newbie
Topic Author
Posts: 31
Joined: Sun Mar 07, 2010 8:02 pm

Re: CapsMan ROS 7.13.x , issues with adding local wifi interface

Fri Jan 12, 2024 8:20 pm

Hi

Thx for reply, and solution :-D

As i can see it is working now, cannot make changes on interface itself so it is under capsman.
Just info for other with same issue, it will not showing comment that is under capsman management like is showed on remote devices.

Thanks again
 
cryotize
just joined
Posts: 1
Joined: Sat Jan 13, 2024 7:48 pm

Re: CapsMan ROS 7.13.x , issues with adding local wifi interface

Sat Jan 13, 2024 7:51 pm

Unset manager on local interfaces, or set it to "local". Then go to the Radios tab, select your local radio and click the "Provision" button.
Thanks dude! Just stumbled over the exact same question / problem. Works perfectly, thanks you :)
This should be documented on the wiki as an example...
 
piglet0
just joined
Posts: 3
Joined: Sun Apr 07, 2024 10:19 pm

Re: CapsMan ROS 7.13.x , issues with adding local wifi interface

Mon Apr 08, 2024 10:41 am

Unset manager on local interfaces, or set it to "local". Then go to the Radios tab, select your local radio and click the "Provision" button.
I have a simillar situation but with VLAN for different wifi SSIDs.
This solution has strange behaviour in my case.
When I click provision on local interface - new interfaces are created without vlan and interfaces that I set for vlan trafic are left as unknown in the bridge.
Has anyone sove it?
Last edited by piglet0 on Mon Apr 08, 2024 1:28 pm, edited 1 time in total.
 
User avatar
Plugpulled
just joined
Posts: 6
Joined: Sat Feb 29, 2020 2:34 pm

Re: CapsMan ROS 7.13.x , issues with adding local wifi interface

Wed Apr 17, 2024 10:44 pm

Unset manager on local interfaces, or set it to "local". Then go to the Radios tab, select your local radio and click the "Provision" button.
Not all heroes wear caps. This worked after hours of digging 😭

Who is online

Users browsing this forum: No registered users and 4 guests