Is kind of the most unreliable 2.4Ghz AP ever. 5 meters and 2 walls, -77dbm according to registration table. ICMP packet drops en masse. Holy batman. Even an old crappy Asus router on the same channel serves with 1ms ping and 100% realiable ICMP from the same distance.
Glad you took the opportunity to relief some stress.
Now…please give us the opportunity to give you a hand (and remove all miss configuration from the device).
Can you share the current config: /export hide-sensitive file=anynameyoulike
He is right, those devices are sub-standard. I had a hAP mini (freebie on a MUM meeting) for a while as an access point, and never was able to make it work correctly.
E.g. using this site https://packetlosstest.com/ I was able to confirm that regularly there were bursts of packet loss.
Cut/paste of the same config in a hAP AC2 and it worked OK, go figure…
Those old and tiny WiFi devices have problems with recent equipment, and I decided not to spend the effort on reporting it and getting denials. Buying something new was more effective.
Not my experience ![]()
hAP Lite … 6 meters, 2 brick walls away (in the garage)
Looking at the registration is a great way to diagnose indeed. The signal strength in the registration table for a client is the strength of the client signal !!!
LOW antenna gain , like in most low end hAP, cAP and wAP, does not amplify the client signal like an AP with high antenna gain

Both client devices at same location (living room)
First line , smartphone Xiaomi Mi 3 , -71 dBm
Second line , laptop Acer , -62 dBm
Acceptable CCQ , good interface rate (smartphone is sleepy!).
Laptop Speed test (ISP VDSL2 bandwidth wired is around 55/10Mbps, I pay for 100Mbps but it’s a long VDSL line)

hAP Lite works great even at -86dBm
Compared to ISP modem (same location as hAP Lite in the garage)

hAP ac2 in the living room gets full 55/10 Mbps on 5 GHz

Try that packetloss site. E.g. when using low-latency audio the performance is not acceptable. At least in my case and that of the OP.
2GHz is very very vulnerable to interference, and there is plenty of it. You can run a wireless Scan or Snopper and see what frequencies are used nearby. My guess - it’s all full
All of the above are correct.
Bpwl will help you ensure that your settings are optimized for a good chance at success! You should achieve adequate connectivity but not really good connectivity.
Normis is bang on, in that ensure any devices are far away from electrical interference such as ballisters for tube lighting etc…
and further interference from already EXISTING wifi networks. So do a site survey to see what other channels are being used for 2.4 ghz networks.
Typically you want to be 3 away from the closest chanel( IE if 6 is used, then move to 1 or 12)…
Pe1chi - is correct MT wifi 5 is based on proprietary programming which has been proven to have a. lower speeds and b. less stability than other vendor wifi 5 products. For example I have
tplink eap245s (also vlan capable and cheap) which are superior.
Try that packetloss site. E.g. when using low-latency audio the performance is not acceptable. At least in my case and that of the OP.
Nice test site. I used Germany.
No problems detected.
Wifi through 2 walls can be problematic. E.G. CCQ can look good, but deteriorate when doing stress tests or other high speed load. It will struggle with other transmitters on the same channel.
And all the other possible wifi disturbancies that we learn to know in detail with MT with it’s mandatory manual tuning. It can be done, no, one has to do it, and the “default” is a very good starting point.
People learning “great tuning hacks” like on this forum, mostly get very far away from that good starting point. Every setup is so different. Only act after checking.

2GHz is very very vulnerable to interference, and there is plenty of it. You can run a wireless Scan or Snopper and see what frequencies are used nearby. My guess - it’s all full
I like these tools.
“Scan” and “Snooper” are very powerfull. I even add “freq usage” and recently started using “Sniff.” as well.
Scan is what most will do, but has too limited information for the RF spectrum.
Let’s verify why the hAP Lite did not go to full speed. CCQ of 81% is a first reduction of the throughput.
Scan shows a rather free channel 6 (2437) on yet another MT (wAP ac , 2 wall’s separated from living and garage, but this is OK to “listen”)
Neighbors are also active in channel 1 and 11

So this is OK ! or not ? Well the higher noise floor on channel 6 is an indication of some RF activity.
“Snooper” shows more …

Not so clean anymore (1-6-11). But the most important disturbance is the channel 5 (2432). That’s a lot of activity there, and no recognised network or stations.
I don’t know where this comes from. Is this non-802.11 ?? If NV2 it would be recognised by MT. This will rise the noise floor for 2437 ?? It will be destructive adjacent channel interference.
The channel 5 usage is confirmed with “Freq usage..”

“Sniff.” shows no beacon or other packets for 2432 at all. And wow the ISP and neighbors devices send a lot of 1Mbps beacons. (this consumes 3% airtime per SSID, but on non overlapping channels, so no problem for the hAP Lite)

Haha, eating Popcorn.
This device is 6.48.6 and Default configuration. I Just use it because Chateau is out for RMA.
I saw plenty WiFi disconnect in log. But did not investigate further, because my Teams meeting was a mess. I had to cut the line and throw in another backup device.
Wifi channel usage you say?? Like none!!! I live here on a landslide area. Next neighbors 200m left, the other one 500m. There is only one AP on the first floor on channel 1. I use channel 11 for my AP.
But I will do a snooper to just check.
But funny that this magic Asus router running Tomato is running stable on the “crowded” channel.
Export follows.
I usually use this device in wireless station bridge mode for my TV devices. Twice the distance away from the usual Chateau AP. Never had an issue. At least did not notice.
# jan/24/2022 07:08:00 by RouterOS 6.48.6
#
# model = RB941-2nD
/interface bridge
add admin-mac=08:55:31:E4:E4:C5 auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX country=austria disabled=no distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=jupiter wireless-protocol=\
802.11
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=pwr-line1
add bridge=bridge comment=defconf interface=wlan1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
add address=192.168.88.244 name=zelenka.home.arpa
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/system clock
set time-zone-name=Europe/Vienna
/system package update
set channel=long-term
/system routerboard settings
set auto-upgrade=yes
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

This is possibly the most crowded area ever.

Haha … wasting my time ? The error log or the message is missing. Is it disconnect reason 3 or reason 8 , or something else? Somebody sending 40MHz intolerant bit ?
You are not just using channel 11 , it’s on auto (never trust that with MT), and you have overlapping channels anyway. Adjacent channel destructive interference.
Your one AP on channel 1, beeïng 40 MHz wide (20-Ce) , cannot coexist with your 40 MHz very wide (b-enabled) auto channel (band=2ghz-b/g/n channel-width=20/40mhz-XX), even if it is using channel 11, it will overlap.
In Europe we could have 2 times 40 MHz in 2.4 GHz only when no b-protocol is enabled and channel 1 (Ce) and channel 13 (eC) is used. But 20 MHz is a better option for 2.4GHz in most cases. (higher spectral density for this low gain antenna)
It’s not your friendly far away neighbors that are interfering. (500m interference is otherwise quite common, I have sites where 750m away neighbors have a stronger signal than my own AP’s)
Solving this will probably not be enough to have a smooth working hAP Lite. (What is in the LOG?) But the Haha dropped my interest in this case.
I am just ranting.
And it is in auto mode, because I now run it to see if it gets better. It was dropping packets like a boss, when on frequ 2462.
And all these theories about intolerant bits and interference.
Then: why is an Tomato router with the same country settings, channel 11 and 40mhz working so reliably? I even do not have issues with Chateau that sits usually on the same place as this hap lite does. It is clearly the limited hardware that obviously needs tweaking, otherwise it is working this poor way.
we need ctrl+f options for the wireless snooper
[admin@MikroTik] > interface wireless monitor 0
status: running-ap
channel: 2452/20-Ce/gn(18dBm)
wireless-protocol: 802.11
noise-floor: -116dBm
overall-tx-ccq: 72%
registered-clients: 6
authenticated-clients: 6
wmm-enabled: yes
current-tx-powers: 1Mbps:15(15/18),
2Mbps:15(15/18),
So watching now. Channel 9 and 20mhz. Should be super awesome in theory

quite some loss. but not alle the time. I can do 9 tests that have 0% loss, then another test with these results. Can’t say what causing this.
registration table on hap lite:
[admin@MikroTik] /interface wireless registration-table> print stats where mac-address=A8:7E:EA:55:9F:10
0 interface=wlan1 mac-address=A8:7E:EA:55:9F:10 ap=no wds=no bridge=no rx-rate="57.7Mbps-20MHz/2S/SGI"
tx-rate="54Mbps-40MHz/1S" packets=30382,17788 bytes=33627218,3559003 frames=24035,17792 frame-bytes=33816306,3452725
hw-frames=43019,18298 hw-frame-bytes=56935646,4208593 tx-frames-timed-out=0 uptime=10m13s last-activity=0ms
signal-strength=-75dBm@6Mbps signal-to-noise=41dB signal-strength-ch0=-79dBm signal-strength-ch1=-79dBm
strength-at-rates=-70dBm@1Mbps 41s350ms,-75dBm@6Mbps 550ms,-77dBm@24Mbps 6m20s950ms,-75dBm@36Mbps 2m22s900ms,-
75dBm@48Mbps 4m43s890ms,-75dBm@HT20-0 14s230ms,-75dBm@HT20-1 10s250ms,-76dBm@HT20-2 2s420ms,-75dBm@HT20-3
0ms,-74dBm@HT20-4 14s880ms,-78dBm@HT40-0 2m22s830ms,-79dBm@HT40-1 2m23s40ms,-77dBm@HT40-2 2m24s30ms,-
77dBm@HT40-3 2m40s570ms,-77dBm@HT40-4 2m41s80ms
tx-ccq=71% p-throughput=43455 last-ip=192.168.88.240 802.1x-port-enabled=yes authentication-type=wpa2-psk
encryption=aes-ccm group-encryption=aes-ccm management-protection=no wmm-enabled=yes
tx-rate-set="CCK:1-11 OFDM:6-54 BW:1x-2x SGI:1x-2x HT:0-15"
Connection stats on my client:
