Hello normis,
Thank you for your answer, here is the mAP exported configuration :
It's not the cleanest since I'm doing a lot of tests in a lot of ways ... it may contain errors atm.
# aug/02/2017 10:46:11 by RouterOS 6.39
# software id = AH6I-2PKJ
#
/interface bridge
add admin-mac=E4:8D:8C:7F:3C:E7 auto-mac=no comment=defconf name=bridge
add name=bridge-vlan-prive
add name=bridge-vlan-public
/interface vlan
add interface=ether1 name=vlan-prive-eth1 vlan-id=3
add interface=ether1 name=vlan-public-eth1 vlan-id=2
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk management-protection=allowed mode=dynamic-keys name=wifi-public supplicant-identity=MikroTik wpa-pre-shared-key="*****" wpa2-pre-shared-key="*****"
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-Ce disabled=no distance=indoors frequency=auto mode=ap-bridge name=wlan-public security-profile=wifi-public ssid=public wds-default-bridge=bridge-vlan-public wds-mode=dynamic-mesh wireless-protocol=802.11
add mac-address=E6:8D:8C:7F:3C:E7 master-interface=wlan-public name=wlan-prive security-profile=wifi-public ssid=intra wds-default-bridge=bridge-vlan-prive wds-mode=dynamic-mesh
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/interface bridge port
add bridge=bridge comment=defconf disabled=yes interface=ether2
add bridge=bridge-vlan-public interface=vlan-public-eth1
add bridge=bridge-vlan-prive interface=vlan-prive-eth1
add bridge=bridge-vlan-prive interface=wlan-prive
add bridge=bridge-vlan-public interface=wlan-public
/interface l2tp-server server
set caller-id-type=ip-address
/ip address
add address=10.0.10.2/24 interface=vlan-public-eth1 network=10.0.10.0
add address=10.0.0.2/24 interface=vlan-prive-eth1 network=10.0.0.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid interface=ether1
/ip dns
set allow-remote-requests=yes
/ip firewall filter
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=input comment="defconf: drop all from WAN" disabled=yes in-interface=ether1
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface=ether1
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" out-interface=ether1
/ip route
add distance=1 gateway=10.0.10.1
/system clock
set time-zone-name=Europe/Paris
/system identity
set name=MikroTik-mAP
/tool mac-server
set [ find default=yes ] disabled=yes
add disabled=yes interface=bridge
/tool mac-server mac-winbox
set [ find default=yes ] disabled=yes
add interface=bridge
And here is the actual registration table :
# INTERFACE RADIO-NAME MAC-ADDRESS AP SIGNAL-STRENGTH TX-RATE UPTIME
0 wlan-public B8:57:D8:D6:2F:CD no -75dBm@12Mbps 57.7... 3m48s
1 wlan-public 38:94:96:F7:95:07 no -51dBm@6Mbps 54Mbps 3m20s
2 wlan-public EC:10:7B:23:C7:A9 no -62dBm@1Mbps 39Mb... 2m16s
3 wlan-public 84:C7:EA:43:0D:ED no -65dBm@1Mbps 11Mbps 1m31s
4 wlan-public 84:A6:C8:E3:2E:F7 no -53dBm@6Mbps 1Mbps 1m28s
I also have another problem : I have two devices (laptop), situated 5 meters away from the mAP (plain sight) and getting disconnected every 2 or 3 minutes. And the same, when we use the cheap netgear device these laptops have no problem at all.
Let me know if you see something wrong with my configuration, of if you need more informations on anything. I can run some test today but after that the time is out for that mAP, I will had to replace it since I need to move to something else.
Thanks,
Cyril