Hi all,
I’m new to Mikrotik so I apologise in advance because the learning curve here is huge and I’m a total noob.
I recently installed an Hex S to replace my ISP router in order to have more options on my network.
I also bought a Mikrotik Cap AC for wireless and I’m using Capsman to provision configuration to the AP.
The issue I’m facing is that no matter what I do, I can’t get more than ~300/300Mbps on my wireless. This is specially frustrating because with my ISP router (Wifi) I can get ~600/600Mbps.
Is this an AP limitation or there is some configuration that can improve speed ? Perhaps a faulty AP ? The test results on Mikrotik site are very promising…
Also, the range is not very good. I’m using a freq that is not very used and still the range is quite bad. Any ideas ?
Here is my conf:
apr/29/2021 21:55:19 by RouterOS 6.47.7
software id = NUHX-CT9P
model = RB760iGS
serial number = D4500D037629
/caps-man channel
add band=2ghz-b/g/n name=Default24
add band=5ghz-a/n/ac control-channel-width=20mhz name=Default5g
/caps-man datapath
add local-forwarding=yes name=datapath1
/interface bridge
add name=bridge1
/interface ethernet
set [ find default-name=ether1 ] comment=WAN
set [ find default-name=ether2 ] comment=LAN
set [ find default-name=ether3 ] comment=LAN
set [ find default-name=ether4 ] comment=LAN
set [ find default-name=ether5 ] comment=LAN
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 max-mtu=1480 name=pppoe-out1 user=adslppp@telefonicanetpa
/caps-man configuration
add channel=Default24 country=spain datapath=datapath1 datapath.bridge=bridge1 datapath.mtu=1500 name=SkynetMT_24Ghz security.authentication-types=wpa-psk,wpa2-psk security.encryption=aes-ccm,tkip
ssid=SkynetMT24Ghz
add channel=Default5g channel.frequency=5300 country=spain datapath=datapath1 datapath.bridge=bridge1 datapath.mtu=1500 distance=indoors installation=indoor name=SkynetMT_5Ghz
security.authentication-types=wpa2-psk security.encryption=aes-ccm ssid=SkynetMT5Ghz
/caps-man interface
add channel=Default24 configuration=SkynetMT_24Ghz disabled=yes l2mtu=1600 mac-address=xx:xx:xx:xx:xx master-interface=none name=cap2 radio-mac=xx:xx:xx:xx:xx radio-name=xxxxxxxxxx
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=security1
/caps-man interface
add channel=Default5g configuration=SkynetMT_5Ghz disabled=no l2mtu=1600 mac-address=xx:xx:xx:xx:xx master-interface=none name=cap1 radio-mac=xx:xx:xx:xx:xx radio-name=xxxxxxxxxx security=
security1
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=dhcp_pool0 ranges=192.168.88.100-192.168.88.254
add name=OVPN-POOL ranges=10.10.1.200-10.10.1.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=bridge1 name=dhcp1
/ppp profile
add dns-server=192.168.88.1 local-address=OVPN-POOL name=OVPN-PERFIL remote-address=OVPN-POOL use-compression=no use-encryption=required
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=bridge1
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=SkynetMT_24Ghz
/interface bridge port
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=*18
add bridge=bridge1 interface=*19
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether2
/interface ovpn-server server
set certificate=SERVIDOR cipher=blowfish128,aes128,aes192,aes256 default-profile=OVPN-PERFIL enabled=yes require-client-certificate=yes
/ip address
add address=192.168.88.1/24 interface=bridge1 network=192.168.88.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add interface=ether1
/ip dhcp-server lease
add address=192.168.88.10 client-id=xxxxxxxxxx mac-address=xxxxxxxxxx server=dhcp1
add address=192.168.88.231 client-id=xxxxxxxxxx mac-address=xxxxxxxxxx server=dhcp1
/ip dhcp-server network
add address=10.10.1.0/24 comment=VPN dns-server=192.168.88.1 gateway=192.168.88.1 netmask=24
add address=192.168.88.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4
/ip dns static
add address=192.168.88.228 name=xxxxxxxxxx
add address=192.168.88.228 name=xxxxxxxxxx
/ip firewall address-list
add address=192.168.88.2-192.168.88.254 list=allowed_to_router
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
add address=192.88.99.0/24 comment=“6to4 relay Anycast [RFC 3068]” list=not_in_internet
/ip firewall filter
add action=accept chain=input comment=“default configuration” connection-state=established,related
add action=accept chain=input src-address-list=allowed_to_router
add action=accept chain=input protocol=icmp
add action=drop chain=input
add action=fasttrack-connection chain=forward comment=FastTrack connection-state=established,related
add action=accept chain=forward comment=“Established, Related” connection-state=established,related
add action=drop chain=forward comment=“Drop invalid” connection-state=invalid log=yes log-prefix=invalid
add action=drop chain=forward comment=“Drop tries to reach not public addresses from LAN” dst-address-list=not_in_internet in-interface=bridge1 log=yes log-prefix=!public_from_LAN out-interface=
!bridge1
add action=drop chain=forward comment=“Drop incoming packets that are not NATted" connection-nat-state=!dstnat connection-state=new in-interface=pppoe-out1 log=yes log-prefix=!NAT add action=drop chain=forward comment="Drop incoming packets that are not NAT
ted” connection-nat-state=!dstnat connection-state=new in-interface=ether1 log=yes log-prefix=!NAT
add action=jump chain=forward comment=“jump to ICMP filters” jump-target=icmp protocol=icmp
add action=drop chain=forward comment=“Drop incoming from internet which is not public IP” in-interface=pppoe-out1 log=yes log-prefix=!public src-address-list=not_in_internet
add action=drop chain=forward comment=“Drop incoming from internet which is not public IP” in-interface=ether1 log=yes log-prefix=!public src-address-list=not_in_internet
add action=drop chain=forward comment=“Drop packets from LAN that do not have LAN IP” in-interface=bridge1 log=yes log-prefix=LAN_!LAN src-address=!192.168.88.0/24
add action=accept chain=icmp comment=“echo reply” icmp-options=0:0 protocol=icmp
add action=accept chain=icmp comment=“net unreachable” icmp-options=3:0 protocol=icmp
add action=accept chain=icmp comment=“host unreachable” icmp-options=3:1 protocol=icmp
add action=accept chain=icmp comment=“host unreachable fragmentation required” icmp-options=3:4 protocol=icmp
add action=accept chain=icmp comment=“allow echo request” icmp-options=8:0 protocol=icmp
add action=accept chain=icmp comment=“allow time exceed” icmp-options=11:0 protocol=icmp
add action=accept chain=icmp comment=“allow parameter bad” icmp-options=12:0 protocol=icmp
add action=drop chain=icmp comment=“deny all other types”
add action=accept chain=input comment=“ACCEPT VPN” dst-port=1194 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat out-interface=pppoe-out1
add action=masquerade chain=srcnat disabled=yes out-interface=ether1
add action=masquerade chain=srcnat comment=“OPENVPN → LAN” src-address=10.10.1.0/24
add action=dst-nat chain=dstnat comment=“RASPBERRYPI: SSH” dst-port=22002 in-interface=pppoe-out1 log=yes protocol=tcp to-addresses=192.168.88.10 to-ports=22002
add action=dst-nat chain=dstnat comment=“XBOX: 88” dst-port=88 in-interface=pppoe-out1 log=yes protocol=tcp to-addresses=192.168.88.231 to-ports=88
add action=dst-nat chain=dstnat comment=“XBOX: 3074” dst-port=3074 in-interface=pppoe-out1 log=yes protocol=udp to-addresses=192.168.88.231 to-ports=3074
add action=dst-nat chain=dstnat comment=“XBOX: 4500” dst-port=4500 in-interface=pppoe-out1 log=yes protocol=udp to-addresses=192.168.88.231 to-ports=4500
add action=dst-nat chain=dstnat comment=“XBOX: 3544” dst-port=3544 in-interface=pppoe-out1 log=yes protocol=udp to-addresses=192.168.88.231 to-ports=3544
add action=dst-nat chain=dstnat comment=“XBOX: 500” dst-port=500 in-interface=pppoe-out1 log=yes protocol=udp to-addresses=192.168.88.231 to-ports=500
add action=dst-nat chain=dstnat comment=“XBOX: 3074” dst-port=3074 in-interface=pppoe-out1 log=yes protocol=tcp to-addresses=192.168.88.231 to-ports=3074
add action=redirect chain=dstnat comment=“Direct all dns requests to the router.” dst-port=53 protocol=udp to-addresses=192.168.88.1 to-ports=53
/ppp secret
add name=jpereira profile=OVPN-PERFIL service=ovpn
/system clock
set time-zone-name=Europe/Madrid