I have a CAPsMAN setup with the following devices:
- an RB960PGS hexPoE acting as the CAPsMAN
- two RBcAPL-3nD 's, acting as the cAPs, running a 2.4ghz network, connected to the CAPsMAN by ethernet
- one random dlink router, acting as a switch through ethernet for other devices
Now my problem is, the network performance is atrocious. My computer is not further away than 3 metres from the AP, yet I have really really bad connection. When I try to ping the CAPsMAN router, I usually get values between 40ms and 5000ms. Mostly it is the following pattern: few (at most 4) good replies (less than 60ms), then one or two over 1000ms, or timeouts. This causes a horrible experience, disconnecting me from winbox while managing the router, making my web pages load slow, and rendering any online game unplayable. The strange thing is, the CAPsMAN radio shows a good signal (under -55db).
There are about 20-25 devices connected to the network, 3-4 connected by ethernet, the rest through wifi.
The devices connected through ethernet (e.g a raspberry pi connected through ethernet) work perfectly, capable of streaming a 1080p video.
Does anybody has any idea what could cause my problem?
Code: Select all
# jul/03/2018 01:10:54 by RouterOS 6.42.3
# software id = LF03-8878
#
# model = 960PGS
# serial number = *******
/caps-man channel
add band=2ghz-g/n frequency=2427 name="ch 2"
/interface bridge
add admin-mac=CC:2D:E0:56:BE:5D auto-mac=no comment=defconf name=bridge
/caps-man datapath
add bridge=bridge client-to-client-forwarding=no local-forwarding=no name=\
datapath1
/caps-man rates
add basic=\
5.5Mbps,11Mbps,6Mbps,9Mbps,12Mbps,18Mbps,24Mbps,36Mbps,48Mbps,54Mbps \
name=rate1 supported=\
5.5Mbps,11Mbps,6Mbps,9Mbps,12Mbps,18Mbps,24Mbps,36Mbps,48Mbps,54Mbps
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=master \
passphrase=b530209j
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=newSec \
passphrase=b530209j
/caps-man configuration
add channel="ch 2" country=hungary datapath=datapath1 mode=ap name=master \
security=master ssid=wrt54gl
add channel="ch 2" datapath=datapath1 name=other security=master ssid=\
wrt54glKonyha
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.100-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes
/caps-man provisioning
add action=create-dynamic-enabled disabled=yes master-configuration=other \
radio-mac=64:D1:54:F6:35:36
add action=create-dynamic-enabled master-configuration=master name-format=\
identity
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1
add bridge=bridge interface="MikroTIk cAP Konyha-1"
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=\
ether1
/ip dhcp-server lease
# lots of static dhcp addresses
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes max-concurrent-queries=200 \
max-concurrent-tcp-sessions=40 servers=1.0.0.1,1.1.1.1,9.9.9.9,8.8.8.8
/ip dns static
add address=192.168.88.1 name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-address=176.63.201.205 dst-port=1032 \
protocol=tcp to-addresses=192.168.88.43 to-ports=22
/system clock
set time-zone-name=Europe/Budapest
/system routerboard settings
set silent-boot=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN