I have recently install package wifi-qcom-ac into hAP ac3 with 7.18.2 . This serves as CAPSMAN. I installed the same package wifi-qcom-ac to cAP ac with 7.18.2. When I'm connecting to cAP ac it works perfectly and the performance is better than before with wireless package. But the wifi connection to hAP ac3 does not work even I have enough signal strength.
So I installed package wireless on hAP ac3 back again and the wifi connection works well.
Here are the config files of the hAP ac3 with wifi-qcom-ac:
Code: Select all
# 2025-03-26 19:43:27 by RouterOS 7.18.2
# software id = XXXX-XXXX
#
# model = RBD53iG-5HacD2HnD
# serial number = XXXXXXXXXXXX
/interface bridge add admin-mac=XXXXXXXXXX auto-mac=no comment=defconf name=bridge port-cost-mode=short
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/interface lte apn set [ find default=yes ] use-network-apn=no
/interface wifi datapath add bridge=bridge comment=defconf disabled=no name=capdp
/interface wifi security add authentication-types=wpa2-psk,wpa3-psk disabled=no name=security1_AC
/interface wifi configuration add country=Czech disabled=no name=cfg_AC security=security1_AC ssid=XX
/ip pool add name=dhcp ranges=10.1.10.2-10.1.10.254
/ip dhcp-server add address-pool=dhcp interface=bridge lease-time=1h10m name=defconf
/routing bgp template set default disabled=no output.network=bgp-networks
/routing ospf instance add disabled=no name=default-v2
/routing ospf area add disabled=yes instance=default-v2 name=backbone-v2
/ip smb set enabled=no
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether3 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether4 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=*1 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=*2 internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings set discover-interface-list=LAN
/ipv6 settings set max-neighbor-entries=8192
/interface detect-internet set detect-interface-list=all
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=ether1 list=WAN
/interface wifi capsman set enabled=yes package-path="" require-peer-certificate=no upgrade-policy=suggest-same-version
/interface wifi provisioning add action=create-dynamic-enabled disabled=no master-configuration=cfg_AC name-format="CAP - %I, %r"
/ip address add address=10.1.10.1/24 comment=defconf interface=ether2 network=10.1.10.0
/ip address add address=XXX.XXX.XXX.XXX/16 interface=ether1 network=XXX.XXX.XXX.XXX
/ip dhcp-client add comment=defconf disabled=yes interface=ether1
/ip dhcp-server network add address=10.1.10.0/24 comment=defconf gateway=10.1.10.1 netmask=24
/ip dns set allow-remote-requests=yes servers=XXX.XXX.XXX.XXX,XXX.XXX.XXX.XXX
/ip dns static add address=10.1.10.1 comment=defconf name=router.lan type=A
/ip firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip ipsec profile set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip route add disabled=no dst-address=0.0.0.0/0 gateway=XXX.XXX.XXX.XXX
/ip service set telnet port=2300
/ip service set ssh port=2200
/ip ssh set strong-crypto=yes
/routing bfd configuration add disabled=no
/system clock set time-zone-name=Europe/Prague
/system identity set name="Pod schody"
/system logging add topics=wireless,debug
/system logging add topics=caps
/system note set show-at-login=no
/tool mac-server set allowed-interface-list=LAN
/tool mac-server mac-winbox set allowed-interface-list=LAN
Here is the config files of the hAP ac3 with wireless:
Code: Select all
# 2025-03-26 19:10:48 by RouterOS 7.18.2
# software id = XXXX-XXXX
#
# model = RBD53iG-5HacD2HnD
# serial number = XXXXXXXXXXXX
/caps-man channel add band=2ghz-g/n control-channel-width=20mhz extension-channel=Ce name=channel_2
/caps-man channel add band=5ghz-n/ac control-channel-width=20mhz extension-channel=Ceee name=channel_5
/interface bridge add admin-mac=XXXXXXXXXX auto-mac=no comment=defconf name=bridge port-cost-mode=short
/interface wireless
# managed by CAPsMAN
# channel: 2452/20-Ce/gn(17dBm), SSID: XX, CAPsMAN forwarding
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX country="czech republic" distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=XX wireless-protocol=802.11
/interface wireless
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac/P(17dBm), SSID: XX, CAPsMAN forwarding
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX country="czech republic" distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=XX wireless-protocol=802.11
/caps-man datapath add bridge=bridge client-to-client-forwarding=yes name=datapath1
/caps-man security add authentication-types=wpa2-psk encryption=aes-ccm name=security1
/caps-man configuration add channel=channel_2 country="czech republic" datapath=datapath1 distance=indoors installation=indoor mode=ap name=cfg_2 security=security1 ssid=XX
/caps-man configuration add channel=channel_5 country="czech republic" datapath=datapath1 installation=indoor mode=ap name=cfg_5 security=security1 ssid=XX
/caps-man configuration add country="czech republic" datapath=datapath1 installation=indoor mode=ap name=cfg1 security=security1 ssid=XX
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/interface lte apn set [ find default=yes ] use-network-apn=no
/interface wifi datapath add bridge=bridge comment=defconf disabled=no name=capdp
/interface wifi security add authentication-types=wpa2-psk,wpa3-psk disabled=no name=security1_AC
/interface wifi configuration add country=Czech disabled=no name=cfg_AC security=security1_AC ssid=XX
/interface wireless security-profiles set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip pool add name=dhcp ranges=10.1.10.2-10.1.10.254
/ip dhcp-server add address-pool=dhcp interface=bridge lease-time=1h10m name=defconf
/routing bgp template set default disabled=no output.network=bgp-networks
/routing ospf instance add disabled=no name=default-v2
/routing ospf area add disabled=yes instance=default-v2 name=backbone-v2
/caps-man manager set enabled=yes upgrade-policy=suggest-same-version
/caps-man provisioning add action=create-dynamic-enabled hw-supported-modes=gn master-configuration=cfg_2 name-format=prefix-identity name-prefix=2GHz-
/caps-man provisioning add action=create-dynamic-enabled hw-supported-modes=ac,an master-configuration=cfg_5 name-format=prefix-identity name-prefix=5GHz-
/caps-man provisioning add action=create-dynamic-enabled disabled=yes master-configuration=cfg1 name-format=prefix-identity
/ip smb set enabled=no
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether2 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether3 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether4 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=ether5 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=wlan1 internal-path-cost=10 path-cost=10
/interface bridge port add bridge=bridge comment=defconf ingress-filtering=no interface=wlan2 internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings set discover-interface-list=LAN
/ipv6 settings set max-neighbor-entries=8192
/interface detect-internet set detect-interface-list=all
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=ether1 list=WAN
/interface wifi capsman set enabled=yes package-path="" require-peer-certificate=no upgrade-policy=suggest-same-version
/interface wifi provisioning add action=create-dynamic-enabled disabled=no master-configuration=cfg_AC name-format="CAP - %I, %r"
/interface wireless cap
#
set caps-man-addresses=127.0.0.1 enabled=yes interfaces=wlan1,wlan2
/ip address add address=10.1.10.1/24 comment=defconf interface=ether2 network=10.1.10.0
/ip address add address=XXX.XXX.XXX.XXX/16 interface=ether1 network=XXX.XXX.XXX.XXX
/ip dhcp-client add comment=defconf disabled=yes interface=ether1
/ip dhcp-server network add address=10.1.10.0/24 comment=defconf gateway=10.1.10.1 netmask=24
/ip dns set allow-remote-requests=yes servers=XXX.XXX.XXX.XXX,XXX.XXX.XXX.XXX
/ip dns static add address=10.1.10.1 comment=defconf name=router.lan type=A
/ip firewall filter add action=jump chain=forward comment="jump to kid-control rules" jump-target=kid-control
/ip firewall filter add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip ipsec profile set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip route add disabled=no dst-address=0.0.0.0/0 gateway=XXX.XXX.XXX.XXX
/ip service set telnet port=2300
/ip service set ssh port=2200
/ip ssh set strong-crypto=yes
/routing bfd configuration add disabled=no
/system clock set time-zone-name=Europe/Prague
/system identity set name="Pod schody"
/system logging add topics=wireless,debug
/system logging add topics=caps
/system note set show-at-login=no
/tool mac-server set allowed-interface-list=LAN
/tool mac-server mac-winbox set allowed-interface-list=LAN
Here is the config files of the cAP ac with wifi-qcom-ac:
Code: Select all
# 2025-03-26 19:33:35 by RouterOS 7.18.2
# software id = XXXX-XXXX
#
# model = RBcAPGi-5acD2nD
# serial number = XXXXXXXXXXXX
/interface bridge add admin-mac=XXXXXXXXXX auto-mac=no comment=defconf name=bridgeLocal
/interface wifi datapath add bridge=bridgeLocal comment=defconf disabled=no name=capdp
/interface wifi
# managed by CAPsMAN XXXXXXXXXX%bridgeLocal, traffic processing on CAP
# mode: AP, SSID: VS, channel: 2412/n/Ce
set [ find default-name=wifi1 ] configuration.manager=capsman datapath=capdp disabled=no
/interface wifi
# managed by CAPsMAN XXXXXXXXXX%bridgeLocal, traffic processing on CAP
# mode: AP, SSID: VS, channel: 5500/ac/Ceee/D
set [ find default-name=wifi2 ] configuration.manager=capsman datapath=capdp disabled=no
/interface bridge port add bridge=bridgeLocal comment=defconf interface=ether1
/interface bridge port add bridge=bridgeLocal comment=defconf interface=ether2
/interface wifi cap set discovery-interfaces=bridgeLocal enabled=yes
/ip dhcp-client add comment=defconf interface=bridgeLocal
/system clock set time-zone-name=Europe/Prague
/system identity set name="Technicka mistnost 1. patro"
/system note set show-at-login=no
/tool graphing interface add
/tool graphing queue add
/tool graphing resource add
When the hAP ac3 has wifi-qcom-ac loaded I see in the log following infos:
Code: Select all
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx disconnected, connection lost, signal strength-70
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx disassociated, connection lost, signal strength-70
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx connected, signal strength-45
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx associated, signal strength -45
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx disconnected, connection lost, signal strength-50
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx disassociated, connection lost, signal strength-50
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx associated, signal strength-47
XX:XX:XX:XX:XX:XX@CAP - ac, xxxxxxxxxxx connected, signal strength -47