I’m running a mix of older MikroTik ac-series access points together with newer ax access points. Both are configured with the same WLAN settings and the same SSID “mikrotik-the-best” on 2.4 GHz and 5 GHz.
I’m also using CAPsMAN, with some APs managed through CAPsMAN Wireless and others through CAPsMAN WiFi.
When both types of APs are active, clients frequently disconnect and the network becomes very unstable. I also tried using different SSIDs, but the situation doesn’t improve much — it feels like the APs are “fighting” for the same channels or otherwise interfering with each other.
Has anyone successfully run such a mixed setup (ac + ax), or is it generally recommended to replace all older access points?
A mix of wifi-qcom and wifi-qcom-ac devices is no problem...they are managed by the same CAPsMAN instance. When you have to use the wireless driver variant (i.e. mipsbe devices), you will run dual instances.
What exact devices are involved (as CAP)?
Are alle security settings equal? Besides passphrase also authentication and cipher?
Fighting for channels sounds like auto channel...will it improve when setting all channels fixed?
I tried fixed and dynamic channels. Security must be exatly the same and roaming disabled … really very difficult, since not all is implemented in old wireless capsman.
The old ap are:
map lite (RBmAPL-2nD)
cap an (RBcAP2nD)
and wAP LR (RBwAPR-2nD&R11e-LR8G) not relevant
expecially map lite are very useful for quick access and no ax version is now on produced.
maybe now are not in sync anymore, but i think i go for new AX … is just much easier and cheaper that debug this stuff. Is really quite a mess what here mikrotik offer … i understand is technically driven, but putting wifi, wireless, two capsman etc make AP (that are great product) quite difficult for non pro.
[admin@switch002-rb5009] > /caps-man/security/print detail where name="iot-security" 1 name="iot-security" authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm,tkip passphrase="XXXXXX" [admin@switch002-rb5009] > /interface wifi security print detail where name="sec-iot" Flags: X - disabled 0 name="sec-iot" authentication-types=wpa2-psk,wpa3-psk encryption=tkip,ccmp,gcmp,ccmp-256,gcmp-256 passphrase="XXXXXX"