Community discussions

MikroTik App
 
HAL9OOO
just joined
Topic Author
Posts: 4
Joined: Wed Apr 14, 2021 10:55 pm

Guest Network via CapsMan with Home Mesh

Fri Apr 16, 2021 8:58 pm

I am trying to create guest network on an Audience router with Home Mesh enabled. Creating a Virtual wireless connection gives me no radio and I cannot use the existing interfaces as a master since they are dynamic. i have established a datapath and created provisions and a new configuration to no avail. here is my current config, please help.
# apr/16/2021 13:43:49 by RouterOS 6.48.2
# software id = VZAH-VDVR
#
# model = RBD25G-5HPacQD2HPnD
# serial number = BB0C0A755642
/caps-man channel
add band=5ghz-a/n/ac control-channel-width=20mhz extension-channel=XXXX name=\
guestchannel1
/caps-man configuration
add channel.band=2ghz-b/g/n channel.control-channel-width=20mhz \
channel.extension-channel=XX comment=defconf \
datapath.client-to-client-forwarding=yes datapath.local-forwarding=yes \
distance=indoors installation=indoor name=cfg-2ghz ssid=MikroTik755642-2
add channel.band=5ghz-a/n/ac channel.control-channel-width=20mhz \
channel.extension-channel=XXXX comment=defconf \
datapath.client-to-client-forwarding=yes datapath.local-forwarding=yes \
distance=indoors installation=indoor name=cfg-5ghz-ac ssid=\
MikroTik755642-5
add channel.band=5ghz-a/n channel.control-channel-width=20mhz \
channel.extension-channel=XX comment=defconf \
datapath.client-to-client-forwarding=yes datapath.local-forwarding=yes \
distance=indoors installation=indoor name=cfg-5ghz-an ssid=\
MikroTik755642-5
add channel=guestchannel1 channel.band=5ghz-a/n/ac \
channel.control-channel-width=20mhz channel.extension-channel=XXXX \
distance=indoors installation=indoor name=Guest ssid=Guest
/interface bridge
add admin-mac=74:4D:28:F9:1D:C5 auto-mac=no comment=defconf name=bridge
add name=bridge_guest
/interface wireless
# managed by CAPsMAN
# channel: 2457/20-eC/gn(27dBm), SSID: MikroTik755642-2, local forwarding
set [ find default-name=wlan1 ] disabled=no ssid=MikroTik
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac(26dBm), SSID: MikroTik755642-5, local forwarding
set [ find default-name=wlan2 ] disabled=no ssid=MikroTik
/caps-man datapath
add bridge=bridge_guest name=guesdp1
/caps-man security
add authentication-types=wpa2-psk,wpa2-eap encryption=aes-ccm name=\
guestsecprofile
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk comment=defconf disable-pmkid=yes mode=\
dynamic-keys name=wpsSync supplicant-identity=MikroTik
add authentication-types=wpa2-psk mode=dynamic-keys name=guest \
supplicant-identity=MikroTik
/interface wireless
set [ find default-name=wlan3 ] band=5ghz-a/n/ac channel-width=20/40mhz-XX \
disabled=no mode=ap-bridge security-profile=wpsSync ssid=SYNC-F91DC8
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=guest_pool ranges=192.168.1.10-192.168.1.250
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
add address-pool=guest_pool authoritative=after-2sec-delay disabled=no \
interface=bridge_guest name=guest-dhcp
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add comment=defconf disabled=no interface=bridge
/caps-man provisioning
add action=create-dynamic-enabled comment=defconf hw-supported-modes=gn \
master-configuration=cfg-2ghz name-format=prefix-identity name-prefix=\
2ghz
add action=create-dynamic-enabled comment=defconf hw-supported-modes=ac \
master-configuration=cfg-5ghz-ac name-format=prefix-identity name-prefix=\
5ghz-ac
add action=create-dynamic-enabled comment=defconf hw-supported-modes=an \
master-configuration=cfg-5ghz-an name-format=prefix-identity name-prefix=\
5ghz-an
add action=create-dynamic-enabled comment=Guest hw-supported-modes=ac \
master-configuration=Guest name-format=prefix-identity name-prefix=123
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge_guest interface=*F
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface wireless cap
#
set bridge=bridge caps-man-addresses=127.0.0.1 enabled=yes interfaces=\
wlan1,wlan2
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
add address=192.168.1.1/24 interface=bridge_guest network=192.168.1.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=8.8.8.8 gateway=192.168.1.1 netmask=24
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=accept chain=srcnat
/system clock
set time-zone-name=America/New_York
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
 
nesquikexe
just joined
Posts: 1
Joined: Wed Mar 23, 2022 10:11 pm

Re: Guest Network via CapsMan with Home Mesh

Wed Mar 23, 2022 10:47 pm

Is this a possibility or is it required to set #2 and #3 Audience as repeaters? Appreciate any input.

Who is online

Users browsing this forum: Bing [Bot] and 37 guests