SXTsq 5 ax station mode - help needed

Hi forum

First of all happy holidays and greetings from Switzerland. My name is Andrew and I just registered here. I am helping a friend to get connected to the Internet on his boat. The boat is made of metal and the existing Wifi on the docks barely passes through the hull for obvious reasons. I got him a SXTsq 5 ax that I would like to use in station-mode and mount it on a pole which has a free sight of line to the existing access points. The distance is around 50 feet.

I spent hours of configuring the device, with help of Chat GPT, bits and pieces from this forum and reddit, however I cant get it working. I would say that I have an intermediate knowledge of networking however didn’t have touch-points with Mikrotik so far :slight_smile: Generally I use Zyxel-Hardware and probably under-estimated the Mikrotik-universe.

status quo
existing 5Ghz Wifi in line of sight at the docks
SXTsq 5 ax in station-mode
bridge1 created with wifi1 and ethernet1
Fritzbox as a router inside the boat

goal
Receive Wifi from the docks and pass it in station-mode from the SXTsq via cable to the router (Fritzbox)

issue
I cannot see my 5Ghz SSID called test with a simple password when I perform a scan. However I can see the neighbours SSIDs. The SXTsq is around 3 feet away from the Access-Point. Testwise I used another Fritzbox to generate a 5Ghz SSID and even this one I could not see. I have a fixed channel 48 and set the country code to Switzerland. I just configured it minimally like SSID, password, country, Band.

Please find attached the configuration so far in Winbox and attached the export.

as I am a new user I cannot upload files/images, hence I created a Onedrive-folder: https://1drv.ms/f/c/ba48cb3fc23d7857/IgDq7y3_UOa7Q6evFg8NcPBJAVm11DKHnDqxuN-vOwANy0w?e=kbU9oi

Would appreciate any help to sort the issue out, I cannot understand why it doesn’t see my 5Ghz networks and would like to avoid any issues when I install it on the boat.

Onedrive link is a big no no for me.

You can always copy and paste your config between code quotes.

What frequency do you use for your test ssid ? Sure that SXTsq can use it ?

Hi there

thanks for the quick reply, and sorry for that. Had to read through how to get the config, hope this helps :slight_smile:

To your questions: I use 48 as a fixed channel on 5.230 – 5.250 Ghz, country code Switzerland, 802.11AC and testwise AX.

What I dont understand: I see all the neighbors Wifis which are like 6-10 and probably configured in a very standard way (DCS, WPA2, visible SSID)

2025-12-24 13:39:04 by RouterOS 7.20.6

software id = 9SJT-QQFZ

model = SXTsq-5axD

serial number = removed

/interface bridge
add name=bridge1
/interface wifi
set [ find default-name=wifi1 ] channel.band=5ghz-ac configuration.country=
Switzerland .mode=station .ssid=test disabled=no
security.authentication-types=wpa2-psk .encryption=""
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=wifi1
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/system clock
set time-zone-autodetect=no time-zone-name=GMT+0
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.ch.pool.ntp.org

These are the neighbors networks that the Mikrotik can see.

And you are sure that ssid is not hidden ?

How do you know your test ssid is where you think it should be ? Just trying to rule out the obvious mistakes.

Unless the dock wifi also uses Mikrotik as AP (improbable), the only mode you can use is station-pseudobridge (if you want to use it as a switch-like-device), and for this to work you need to set the bridge protocol mode to none, something like:
/interface bridge set [find where name=bridge1] protocol-mode=none

Check:

Or - if you want to use it as station the connection will need to be routed and your configuration misses 1/2 to 3/4 of the needed settings (DHCP client/server, IP addresses, firewall if wanted, etc.).

The (actually very minimal) configuration you posted on Onedrive as code:

# 2025-12-24 13:39:04 by RouterOS 7.20.6
# software id = 9SJT-QQFZ
#
# model = SXTsq-5axD
# serial number = HKB0AVHVZZJ
/interface bridge
add name=bridge1
/interface wifi
set [ find default-name=wifi1 ] channel.band=5ghz-ac configuration.country=\
    Switzerland .mode=station .ssid=test disabled=no \
    security.authentication-types=wpa2-psk .encryption=""
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=wifi1
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/system clock
set time-zone-autodetect=no time-zone-name=GMT+0
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.ch.pool.ntp.org

but it misses a lot of settings.

So you have to decide, what is sometimes called "extender" or "repeater" is usually the (partially wirelesss) equivalent of a switch, and you won't have "real" L2 connectivity (some people call this L2.5 connectivity with station-pseudobridge) as you would have if you could use station-bridge (4 address mode, only possible if the AP is a Mikrotik of the same generation), otherwise (introducing a double NAT) you can set it up as a router.

BTW, all this is unrelated to the "cannot see my test wifi isssue", but once that will be solved it will become important.

Check what's in your channels tab.

Try setting your test access point, which you don't see, to a channel from those you see, for example, 5620

Also: unset the empty setting security.encryption="" ... it disables all encryption algorithms and that's not right for WPA2.

thanks for all the replies and help.

@holvoetn yes, the SSID is not hidden, I can see it from all my other devices like smartphone, notebooks, tablets.

@safelogj great input, I see that the surrounding networks are on DFS channels. I have changed mine to channel 124 as one of the networks I can see within the scan. However I still cannot see my test-SSID.

@mkx thanks, I have enabled all encryption types, however still cannot see my test-SSID.

What I dont understand: I can see all the surrounding networks, why shouldn’t I see mine? The surrounding networks. I tried to config as little as possible to see all networks and then

config of the 5Ghz radio.

you AP is ax and you station is ac?

sorry, no the AP is AX and station is AX. I have set the AP to AC and the station AC testwise, however still I cannot see it during the scan.

I have tried the channel widths: 20/40Mhz Ce, eC and also 20/40Mhz.

Just a guess, but what if?

Your access point's manual

https://i-teh.com/upload/iblock/564/tnzpst7g1wii32lpv2gapryuku1wp4ta.pdf

says the power mode IEEE 802.3af - no wireless
Could this be your situation?

good point, I am not sure but I dont think it has an impact as I can choose the radio mode with the settings. I also tried a Fritzbox 4040 and established a 5Ghz network and could not see it.

anyway, lets say I am at the docks and hope that I can see the network there. Do I understand correctly that I could use station mode and the SXTsq could act as a router and then passes the signal to a switch etc? I read that I need to configure the DHCP settings, firewall and bridge.

In my understanding pseudo-bridge would not create a own LAN-subnet and therefore would get the IP from the docks network and thats what I want to avoid and have an own LAN inside the boat.

I would give it a try and would be happy if you could have a look at my config before I install it.

BIG Thank you for your warm welcome and very quick support, highly appreciated :slight_smile:

yes, if you use the SXT as a Router you’d need to configure this.
Im not sure if the SXT comes default as “router”.
But you can get a default config from tangent here:

https://tangentsoft.com/mikrotik/wiki?name=Default%20Router%20Configuration

Thats also true but i thought you want to use another router on the boat?
Then you’d theoretically just need 1 firewall rule on the SXT (deny input from non-”lan” interface)

yeah initially I wanted the Fritzbox to be the router, however (at least as per Chat GPT) its not a good idea.

reasoning from Chat GPT:


Why use the MikroTik as the router and not the Fritz!Box?

When connecting to marina / public Wi-Fi, the MikroTik should act as the router (station mode with NAT) and the Fritz!Box should be used only as an access point.

Reasons:

  • Public Wi-Fi networks often use client isolation, MAC limits, and captive portals. Routing hides all onboard devices behind one single client, which is far more reliable.

  • NAT on the MikroTik is more robust and predictable than pseudo-bridging or routing on the Fritz!Box.

  • All onboard devices stay in a private, controlled subnet, so AirPlay, Bonjour, and local services work reliably.

  • Troubleshooting is simpler: upstream Wi-Fi issues are handled by the MikroTik, local Wi-Fi by the Fritz!Box.

I have never configured a bridge and therefore no real experience. I am happy to use the Mikrotik as a router and then the Fritzbox as an IP-Client to distribute Wifi inside the boat and plug in devices like Apple TV.

I give it a try and would be happy if you guys could review the config I will post these days.

This isn’t actually a real reason lol.

But if your SXT doesnt come with default config check out tangents explanation of the default config. Its pretty good!
It should guide you on how to setup and even give you commands to run :slight_smile:

Im guessing basic IPv4 is enough.

thats my config so far that I created with the help of Chat GPT. Mikrotik acts as a router and the Fritzbox would then be an IP-client.

  • mode set to station under wifi
  • DHCP range is: 192.168.10.1
  • country for Wifi set to Germany as the boat is there
  • 5Ghz AC set, maybe I need to change it to another standard when I am there and can check it
  • CCMP as Encryption type

would be glad on your feedback, as mentioned this is my first Mikrotik device and I have never dealt with this type of device/environment, mostly cloud-based stuff from Zyxel Nebula.

# 2025-12-03 12:20:45 by RouterOS 7.20.6
# software id = 9SJT-QQFZ
#
# model = SXTsq-5axD
# serial number = HKB0AVHVZZJ
/interface bridge
add name=bridge1
/interface wifi
set [ find default-name=wifi1 ] channel.band=5ghz-ac .skip-dfs-channels=\
    disabled .width=20/40/80mhz configuration.country=Germany .installation=\
    outdoor .mode=station .ssid="Hafen Burkheim" disabled=no \
    security.authentication-types=wpa2-psk .encryption=ccmp
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.10.100-192.168.10.200
/interface bridge port
add bridge=bridge1 interface=ether1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=ether1 list=LAN
add comment=defconf interface=wifi1 list=WAN
/ip address
add address=192.168.10.1/24 comment=defconf interface=bridge1 network=\
    192.168.10.0
/ip dhcp-client
# Interface not active
add comment=defconf interface=wifi1
/ip dhcp-server
add address-pool=default-dhcp interface=bridge1 name=defconf
/ip dhcp-server network
add address=192.168.10.0/24 comment=defconf dns-server=192.168.10.1 gateway=\
    192.168.10.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.10.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat out-interface=wifi1
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
    dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

Config looks like defconf with wifi added as WAN.
So it seems good. With some things i noticed.

You dont really need to set this. ccmp is default.

You SHOULDN’T need this. It SHOULD automatically choose the lowest common standard.

let me also add these 2 are not necessary on station mode. skip-dfs you can just ignore

In Germany, there’s only outdoor DFS 5ghz channels :slight_smile:

Channel width you can change if you want to force a width. Otherwise it will follow the AP it connects to.
(Maybe if theres lots of noise force it to 20mhz)

thanks a lot, I will give it a try and let you know (it may take some weeks until I am there again) I have deleted the 5Ghz AC band as well as Skip-DFS and the Channel width. I really hope it works and I can still not understand why I cant see my two Wifi-networks that I wanted to try, well it remains an unsolved mystery :stuck_out_tongue:

You have installation=outdoor. That is fine, but you won’t see any AP that is on an indoor channel.

Maybe that is the reason it does not work. In most countries, outdoor is 5500 and above, and indoor is 5180-5300 as well as the 5500 and above channels. So when your test AP is configured as indoor, they may not be able to see each other.