I have a Chateau 5G ax at home that I have configured with some VLAN’s and different Wifi. Not because I have to but because I do some testing on it
.
If I’m connected to MGMT or VALLAS I get disconnected several times per hour.
At the office we’re running cAP ax and with a similar configuration we’re getting disconnected there to.
First I thought that it was an issue with my computer but then I noticed that I get the disconnections on phone and other computers too.
I have probably misconfigured the devices but I can’t find out how I have misconfigured them.
I have played around with antenna gain to get a bit more coverage at home and that worked but the disconnections continued. The same with my cAP ax at work
.
If I reset the device and run in with default settings everything works really good but as soon as I configure VLAN’s the disconnections start ![]()
I have attached the config below and I’m really have hope to get this solved
.
# 2024-10-27 10:45:59 by RouterOS 7.16.1
# software id = 4XV3-J3JM
#
# model = S53UG+M-5HaxD2HaxD
# serial number = xxxxxxxxxx
/interface bridge
add name=BRIDGE vlan-filtering=yes
/interface ovpn-client
add certificate=skallerod cipher=aes256-gcm connect-to=\
hidden.com mac-address=FE:09:6A:41:BE:4A name=\
hidden.com port=1195 user=skallerod \
verify-server-certificate=yes
/interface wifi
set [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=\
10min-cac .width=20mhz configuration.antenna-gain=0 .mode=ap .ssid=MGMT2 \
datapath.bridge=BRIDGE disabled=no mtu=1500 name=MGMT2 \
security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
set [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=\
10min-cac .width=20mhz configuration.antenna-gain=0 .mode=ap .ssid=MGMT5 \
datapath.bridge=BRIDGE disabled=no mtu=1500 name=MGMT5 \
security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
add configuration.mode=ap .ssid=VALLAS2 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:6C master-interface=MGMT2 mtu=1500 name=\
VALLAS2
add configuration.mode=ap .ssid=VALLAS5 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:6B master-interface=MGMT5 mtu=1500 name=\
VALLAS5
/interface lte
set [ find default-name=lte1 ] allow-roaming=no band="" nr-band="" \
sms-protocol=auto sms-read=no
/interface vlan
add interface=BRIDGE name=GUEST_VLAN vlan-id=20
add interface=BRIDGE name=IoT_VLAN vlan-id=30
add interface=BRIDGE name=MGMT_VLAN vlan-id=99
add interface=BRIDGE name=VALLAS_VLAN vlan-id=10
/interface wifi
add configuration.mode=ap .ssid=GUEST2 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:6E master-interface=MGMT2 name=GUEST2
add configuration.mode=ap .ssid=GUEST5 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:6D master-interface=MGMT5 name=GUEST5
add configuration.mode=ap .ssid=IoT2 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:70 master-interface=MGMT2 name=IoT2
add configuration.mode=ap .ssid=IoT5 datapath.bridge=BRIDGE disabled=no \
mac-address=7A:9A:18:DD:E1:6F master-interface=MGMT5 name=IoT5
/interface list
add name=MGMT_LAN
add name=VALLAS_LAN
add name=GUEST_LAN
add name=IoT_LAN
add name=WAN
add name=VLANS
/ip pool
add name=dhcp_pool0 ranges=10.20.99.2-10.20.99.254
add name=dhcp_pool1 ranges=10.20.10.2-10.20.10.254
add name=dhcp_pool2 ranges=10.20.20.2-10.20.20.254
add name=dhcp_pool3 ranges=10.20.30.2-10.20.30.254
/ip dhcp-server
add address-pool=dhcp_pool0 interface=MGMT_VLAN name=dhcp1
add address-pool=dhcp_pool1 interface=VALLAS_VLAN name=dhcp2
add address-pool=dhcp_pool2 interface=GUEST_VLAN name=dhcp3
add address-pool=dhcp_pool3 interface=IoT_VLAN name=dhcp4
/interface bridge port
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=GUEST2 pvid=20
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=GUEST5 pvid=20
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=IoT2 pvid=30
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=IoT5 pvid=30
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=MGMT2 pvid=99
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=MGMT5 pvid=99
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=VALLAS2 pvid=10
add bridge=BRIDGE frame-types=admit-only-untagged-and-priority-tagged \
interface=VALLAS5 pvid=10
/ip neighbor discovery-settings
set discover-interface-list=MGMT_LAN
/interface bridge vlan
add bridge=BRIDGE tagged=BRIDGE untagged=VALLAS2,VALLAS5 vlan-ids=10
add bridge=BRIDGE tagged=BRIDGE untagged=GUEST2,GUEST5 vlan-ids=20
add bridge=BRIDGE tagged=BRIDGE untagged=IoT2,IoT5 vlan-ids=30
add bridge=BRIDGE tagged=BRIDGE untagged=MGMT2,MGMT5 vlan-ids=99
/interface detect-internet
set detect-interface-list=all
/interface list member
add interface=MGMT_VLAN list=MGMT_LAN
add interface=VALLAS_VLAN list=VALLAS_LAN
add interface=GUEST_VLAN list=GUEST_LAN
add interface=IoT_VLAN list=IoT_LAN
add interface=lte1 list=WAN
add interface=GUEST_VLAN list=VLANS
add interface=IoT_VLAN list=VLANS
add interface=VALLAS_VLAN list=VLANS
/ip address
add address=10.20.99.1/24 interface=MGMT_VLAN network=10.20.99.0
add address=10.20.10.1/24 interface=VALLAS_VLAN network=10.20.10.0
add address=10.20.20.1/24 interface=GUEST_VLAN network=10.20.20.0
add address=10.20.30.1/24 interface=IoT_VLAN network=10.20.30.0
/ip dhcp-server network
add address=10.20.10.0/24 dns-server=9.9.9.9,149.112.112.112 gateway=\
10.20.10.1
add address=10.20.20.0/24 dns-server=9.9.9.9,149.112.112.112 gateway=\
10.20.20.1
add address=10.20.30.0/24 dns-server=9.9.9.9,149.112.112.112 gateway=\
10.20.30.1
add address=10.20.99.0/24 dns-server=9.9.9.9,149.112.112.112 gateway=\
10.20.99.1
/ip firewall filter
add action=accept chain=input comment=\
"ALLOW ESTABLISHED, RELATED AND UNTRACKED" connection-state=\
established,related,untracked
add action=accept chain=input comment=\
"ALLOW MGMT_VLAN ACCESS TO ROUTER SERVICES" in-interface-list=MGMT_LAN
add action=accept chain=input comment="ALLOW OTHER VLAN ACCESS TO ROUTER DNS" \
dst-port=53 in-interface-list=VLANS protocol=tcp
add action=accept chain=input comment=\
"ALLOW OTHER VLAN ACCESS TO ROUTER DNS" dst-port=53 in-interface-list=\
VLANS protocol=udp
add action=drop chain=input comment="DROP ALL OTHER INPUT"
add action=accept chain=forward comment=\
"ALLOW CONNECTION TO MONITORINGVPN FROM VALLAS LAN." in-interface-list=\
VALLAS_LAN out-interface=hidden.com
add action=accept chain=forward comment=\
"ALLOW ESTABLISHED, RELATED AND UNTRACKED" connection-state=\
established,related,untracked
add action=accept chain=forward comment="ALLOW MGMT_VLAN ACCESS TO INTERNET" \
in-interface-list=MGMT_LAN out-interface-list=WAN
add action=accept chain=forward comment="ALLOW OTHER VLAN ACCESS TO INTERNET" \
in-interface-list=VLANS out-interface-list=WAN
add action=accept chain=forward comment="ALLOW IoT_VLAN ACCESS TO INTERNET" \
in-interface-list=IoT_LAN out-interface-list=WAN
add action=accept chain=forward comment=\
"ALLOW IoT_VLAN ACCESS TO OTHER DEVICES IN IoT_VLAN" in-interface-list=\
IoT_LAN out-interface-list=IoT_LAN
add action=drop chain=forward comment="DROP ALL OTHER FORWARD"
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/system clock
set time-zone-name=hidden
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=MGMT_LAN
/tool mac-server mac-winbox
set allowed-interface-list=MGMT_LAN
