Hap ax s slow speed asi CAP

Hi, just bought new hap axs and connect it as cap in my network. Capsman is ax2 and have hap ac2 and wap ac as caps. All working wired/wireless 500/100 as max of my connection. Only this new hap axs cant get wireless more than 100/100 wired without issue. Any suggestion?

Mesurements was done with same phone same distance no crosstalks no overlapping or any distortion. If i put on the same cable ac2 iwill get full speed.

Thanks for any ideas.

Did you verify that hAP ax S wired uplink port is actually running at 1Gbps? There is (small) probability that there's some slight incompatibility between cable's RJ45 connector and hAP ax S port which doesn't allow 1Gbps operation.

Given 100/100 performance via hAP AX S, I think the probability is not that small... but that's me.

Other thing to test is performance via wired PC connected to hAP AX S (verify interface speed for used ether port) and then wireless client connected to hAP AX S. Local iperf3 server on PC and then client on wireless side.
It will help you to assess if issue is only on hap AX S or in combo AX2 / hap AX S (incl cables / switches in between).

At what rate is the client connected to the hAP AX S? Any difference from the other CAPS's?

Wided connection on hap axs is full speed 500/100 as my isp maximum. Its only wireless issue.

Assuming you are replying to me...data rate of the wireless connection of the client. It can be found (in Winbox) on the Registration tab of Wifi. It will provide information about the radio the client is connected to, as well as Tx Rate and Rx Rate. These two is what I'm looking for.

This usually comes down to radio or CAPsMAN settings rather than the hardware itself.
Check that the ax CAP is actually using 802.11ax and not falling back to older modes.
Also confirm channel width, security settings, and that the country/regulatory domain matches the others.
If CAPsMAN is v2, make sure the datapath and wireless profiles are aligned for ax radios.
A mismatch there can easily cap wireless speed around 100 Mbps.

That cap wifi 4 and 3 is hap axs

Rates look okay, at least you should be able to get well over 100Mbps.
And if this client is connected to a different 5GHz radio (like to the hAP AX2), it gets (near) full speed?
How do you exactly test?
As the signal strength is pretty high, can you try when being farther away from the CAP? If the signal strength is too high, it can work counter productive.

They got same cfg set. Choosing channel automaticly its not hard setted. I tried some hard set on hap axs so it would be axactly same as on ax2, where it works fine. But no change still best I can messure is 150/100 max, often its lot less.

Got one idea about packages. On caps man it is a wifi-qcom package. And on axs there is wifi-mediatek package. Can it couse some issue?

Measurements i done like from 1m to 5m. There was no change. Its same position as previous ac2 cap and it works no issues before

That's a question you should raise to support.
I doubt there will be a lot of users already having hAP AX S under capsman control.

The hAP AX S requires the wifi-mediatek driver, nothing wrong there.

As this device is really new...it might be of influence on the performance. What RouterOS and firmware are you running?
Can you please share all configs?

/export file=anynameyoulike

Remove serial and any other private info, post as Preformatted text by using the </> button.

Yeah i tried put there qcom one but it seems like interface cant handle it. It disable wifi interfaces…

I was saying you should raise a ticket to support.
They are (for now) the only ones able to tell you what's happening.

I never said to change wifi driver. It has to be mediatek on the device for hAP AX S.

The question is however: what's needed on capsman controller side ? I would think base ROS7 package should be able to handle it. If they did their development correctly ...

For testing ... do you have a device without wifi like Hex / Hex Refresh / crs / rb5009/ ... ?
What if you use that as capsman controller ?
What if you then add mediatek driver to it ?
2 different scenarios to test.

Hey,

I tried that package changes before even try this forum.

Unfortunely i have not any hex device.

Maybe i shold try that support. Can u direct me where should I start that ticket?

Config of capsman router:

# 2026-01-06 16:17:35 by RouterOS 7.20.6
# software id = QDU0-ZTP5
#
# model = C52iG-5HaxD2HaxD
# serial number = 
/interface bridge
add admin-mac= auto-mac=no comment=defconf name=bridge
add name=bridge1
/interface ethernet switch
set 0 cpu-flow-control=yes
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wifi channel
add band=5ghz-ax disabled=no frequency=5500 name="channel1" width=20/40/80mhz
/interface wifi configuration
add country= datapath.bridge=bridge disabled=no mode=ap name=cfg1 \\
    security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes \\
    ssid=lp101
/interface wifi
# operated by CAP MAC%bridge, traffic processing on CAP
add configuration=cfg1 disabled=no name=cap-wifi1 radio-mac=MAC
# operated by CAP MAC%bridge, traffic processing on CAP
add configuration=cfg1 disabled=no name=cap-wifi2 radio-mac=MAC
# operated by CAP MAC%bridge, traffic processing on CAP
add configuration=cfg1 configuration.mode=ap disabled=no name=cap-wifi3 \\
    radio-mac=MAC
# operated by CAP MAC%bridge, traffic processing on CAP
add configuration=cfg1 configuration.mode=ap disabled=no name=cap-wifi4 \\
    radio-mac=MAC
set \[ find default-name=wifi1 \] channel.skip-dfs-channels=10min-cac \\
    configuration=cfg1 configuration.country=country .mode=ap .ssid=lp101 \\
    disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes \\
    .ft-over-ds=yes
set \[ find default-name=wifi2 \] configuration=cfg1 configuration.mode=ap \\
    disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes \\
    .ft-over-ds=yes
/ip pool
add name=dhcp ranges=192.168.85.101-192.168.85.250
/ip dhcp-server
add address-pool=dhcp interface=bridge name=defconf
/certificate settings
set builtin-trust-anchors=not-trusted
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface detect-internet
set detect-interface-list=all
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface ovpn-server server
add mac-address=FE:A6:C1:81:ED:F3 name=ovpn-server1
/interface wifi cap
set enabled=yes
/interface wifi capsman
set enabled=yes interfaces=all package-path="" require-peer-certificate=no \\
    upgrade-policy=none
/interface wifi provisioning
add action=create-enabled disabled=no master-configuration=cfg1
/ip address
add address=192.168.85.1/24 comment=defconf interface=bridge network=\\
    192.168.85.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=192.168.85.0/24 comment=defconf dns-server=192.168.85.1 gateway=\\
    192.168.85.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.85.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=\\
    "defconf: accept established,related,untracked" connection-state=\\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \\
   in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \\
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \\
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \\
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\\
    "defconf: accept established,related, untracked" connection-state=\\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \\
    connection-state=invalid
add action=drop chain=forward comment=\\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \\
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \\
    ipsec-policy=out,none out-interface-list=WAN
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\\
    "defconf: accept established,related,untracked" connection-state=\\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \\
    dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \\
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\\
    ipsec-esp
add action=accept chain=input comment=\\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\\
    "defconf: drop everything else not coming from LAN" in-interface-list=\\
    !LAN
add action=accept chain=forward comment=\\
    "defconf: accept established,related,untracked" connection-state=\\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \\
    connection-state=invalid
add action=drop chain=forward comment=\\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \\
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\\
    ipsec-esp
add action=accept chain=forward comment=\\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\\
    "defconf: drop everything else not coming from LAN" in-interface-list=\\
    !LAN
/system clock
set time-zone-name=Europe
/system identity
set name=MAIN
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

Cleaned export, added code quotes.

Support portal: