Weird problem with vlan access to wAP ax.

Hello there.

I have access point with really simple basic config here.

# 2025-01-02 12:03:43 by RouterOS 7.16.2
#
# model = wAPG-5HaxD2HaxD

/interface bridge add admin-mac=*** auto-mac=no comment=defconf name=bridge
/interface vlan add interface=ether1 name=mgmt vlan-id=999
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/interface list add name=MGMT
/interface wifi channel add band=2ghz-ax disabled=no name=2g skip-dfs-channels=10min-cac width=20/40mhz
/interface wifi channel add band=5ghz-ax disabled=no name=5g skip-dfs-channels=10min-cac width=20/40/80mhz
/interface wifi security add authentication-types=wpa2-psk,wpa3-psk disabled=no ft=yes ft-over-ds=yes name=ap01
/interface wifi configuration add country=Ukraine disabled=no mode=ap name=cfg1 security=petfood ssid=ap01
/interface wifi set [ find default-name=wifi1 ] channel=2g configuration=cfg1 configuration.mode=ap disabled=no
/interface wifi set [ find default-name=wifi2 ] channel=5g configuration=cfg1 configuration.mode=ap disabled=no
/ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server add address-pool=default-dhcp interface=bridge name=defconf
/interface bridge port add bridge=bridge comment=defconf interface=ether2
/interface bridge port add bridge=bridge comment=defconf interface=wifi1
/interface bridge port add bridge=bridge comment=defconf interface=wifi2
/ip neighbor discovery-settings set discover-interface-list=MGMT
/ipv6 settings set disable-ipv6=yes
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=ether1 list=WAN
/interface list member add interface=mgmt list=MGMT
/interface list member add interface=ether1 list=MGMT
/ip address add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
/ip dhcp-client add comment=defconf interface=ether1 use-peer-dns=no
/ip dhcp-client add add-default-route=no interface=mgmt use-peer-dns=no use-peer-ntp=no
/ip dhcp-server network add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns set allow-remote-requests=yes cache-size=4096KiB servers=9.9.9.9,149.112.112.112 use-doh-server=https://dns.quad9.net/dns-query verify-doh-cert=yes
/ip dns adlist add ssl-verify=no url=https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
/ip dns static add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input dst-port=22,80,8291 in-interface-list=MGMT log-prefix="==" protocol=tcp
/ip firewall filter add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip service set telnet disabled=yes
/ip service set ftp disabled=yes
/ip service set api disabled=yes
/ip service set api-ssl disabled=yes
/system clock set time-zone-name=Europe/Kiev
/system identity set name="AP 01"
/system note set note="Attention! Internet trafic on ether1 and NOT on vlan999[mgmt]!!!"
/system routerboard settings set auto-upgrade=yes
/tool mac-server set allowed-interface-list=LAN
/tool mac-server mac-winbox set allowed-interface-list=MGMT

My vlan is getting its own IP address, I can ping it, but all of sudden I have no access to AP. No web\winbox\ssh at all on vlan interface, but everything works on ether1. Sniffer can see incoming packets.

Looks like I’m too close to see clearly. What should I check?

You should check if you added your VLAN to the correct interface list.

Also this is not simple AP setup, looks like you are trying to use your wAP ax as a router not simple AP.

What do you actually want from your setup ? Do you want simple AP or do you want to use it as a wireless router ?

You currently have your ap configured as router, what would you like it to be and how would you like it to work?
If you want to know more about VLAN, have a look at this great topic:
http://forum.mikrotik.com/t/using-routeros-to-vlan-your-network/126489/1

It’s okay. It give internet to completely isolated office branch, that use only wifi, so putting one AP as router looked better idea than making separate vlan for it. Also I got some problems configuring AX capsman, because capsman filtering was removed from ax, so I made it standalone.

Now on ether1 it has main office network as WAN and management vlan. So I need it to have internet from office network, and manage it through vlan.

I put ether1 in MGMT interface list just to finish configuring, because if I remove it, I lose access to AP through office network, and has no access through vlan. Users in LAN woud have no access to AP management copletely, and access will be removed by firewall after end of configuring.

I know the meaning of term “vlan”, thanx. :slight_smile:

Simplify, have main router provide all vlans and rules etc.
Use wapAX simply as a switch AP, the objective of giving one branch of office isolated access to internet is accomplished.
This simply means a vlan only for them and the MT device gets an IP address from the trusted vLAN.
ONE BRIDGE, rest vlans, done!
Use one port as on off bridge port for configuration purposes safe, and easy place to recover from any issues later as well.
Will assume trusted subnet is vlan999 with lanip 192.168.99.0/24
Will assume isolated office subnet is vlan88 with lanip 192.168.88.0/24
Step One: add ether2 settings below, and then continue config changes from ether2 ( plug in laptop with IPV4 settings 192.168.55.2 and your in )

Clean, simple easy, works!!.. ( and best of all NO phucking capsman )

/interface bridge 
add admin-mac=*** auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] name=OffBridge2
/interface vlan 
add interface=bridge name=mgmt999  vlan-id=999
/interface list 
add name=MGMT
/interface wifi channel 
add band=2ghz-ax disabled=no name=2g skip-dfs-channels=10min-cac width=20/40mhz
add band=5ghz-ax disabled=no name=5g skip-dfs-channels=10min-cac width=20/40/80mhz
/interface wifi security 
add authentication-types=wpa2-psk,wpa3-psk disabled=no ft=yes ft-over-ds=yes name=ap01
/interface wifi configuration 
add country=Ukraine disabled=no mode=ap name=cfg1 security=petfood ssid=ap01
/interface wifi 
set [ find default-name=wifi1 ] channel=2g configuration=cfg1 configuration.mode=ap disabled=no
set [ find default-name=wifi2 ] channel=5g configuration=cfg1 configuration.mode=ap disabled=no
/interface bridge port
add bridge=bridge ingress-filtering=yes frame-types=admit-only-vlan-tagged interface=ether1 comment="trunk from router"
add bridge=bridge ingress-filtering=yes frame-types=admit-only-priority-and-untagged interface=wifi1 pvid=88
add bridge=bridge ingress-filtering=yes frame-types=admit-only-priority-and-untagged interface=wifi2 pvid=88
/ip neighbor discovery-settings 
set discover-interface-list=MGMT
/interface bridge vlan
add bridge=bridge tagged=bridge,ether1  vlan-id=999
add bridge-bridge tagged=ether1  untagged=wifi1,wifi2  vlan-id=88
/ipv6 settings set disable-ipv6=yes
/interface list member
add interface=mgmt999 list=MGMT
add interface=OffBridge2 list=MGMT
/ip address 
add address=192.168.99.X/24  interface=mgmt999  network=192.168.99.0  { where X is the assigned IP to the wapax on the trusted subnet }
add address=192.168.55.1/30  interface=OffBridge2 network=192.168.55.0
/ip dns 
set  servers=192.168.99.1
/ip route
add dst-address=0.0.0.0/0 gateway=192.168.99.1
/ip service set telnet disabled=yes
/ip service set ftp disabled=yes
/ip service set api disabled=yes
/ip service set api-ssl disabled=yes
/system clock set time-zone-name=Europe/Kiev
/system identity set name="AP 01"
/system note set note="Attention! Internet trafic on vlan88 and NOT on vlan999[mgmt]!!!"
/system routerboard settings set auto-upgrade=yes
/tool mac-server 
set allowed-interface-list=none
/tool mac-server mac-winbox 
set allowed-interface-list=MGMT

By the way this past weekend I bought two boxes of chocolate, one from Kyiv and one from KharKiv…

Still could help to have a look at that topic.

What IP address do you have on the client when managing this routerboard? Is it in the same network segment as where the routers mgt IP is in?

Amen to that brother, a vlan is a vlan except when using RoS and then mysteriously people get confused.

Do you have multiple Mikrotik APs ? If you don’t then there is no need for CAPsMAN.

Do you have multiple Mikrotik APs ?

I have a dozen of mipsbe-wapac, capac, capacxl etc. And capsman to rule em all.

What IP address do you have on the client when managing this routerboard? Is it in the same network segment as where the routers mgt IP is in?

ether1: 192.168.1.X/24 (dhcp)
ether1-vlan: 10.0.0.X/24 (dhcp)
bridge (ether2+wlan1+wlan2): 192.168.88.1/24

It must be managed only through 10.0.0.0/24 from PCs in different networks alowed by main router firewall rules. No access from other networks. Now it is temporarily managed from PC in 192.168.1.0/24. I have a bunch of SwOs devices similarly managed without any problems.