Manual - Interface - Wireless - MikroTik Wiki
Manual - Interface - Wireless - MikroTik Wiki
Manual - Interface - Wireless - MikroTik Wiki
From MikroTik Wiki
< Manual:Interface
Contents
1 Overview
2 General interface properties
2.1 Basic and MCS Rate table
2.2 Frame protection support (RTS/CTS)
2.3 Nv2
2.3.1 Nv2 Troubleshooting
3 Access List
3.1 Properties
4 Align
4.1 Menu Specific Commands
5 Connect List
5.1 Properties
5.2 Usage
5.2.1 Restrict station connections only to specific access points
5.2.2 Disallow connections to specific access points
5.2.3 Select preferred access points
5.2.4 Restrict WDS link establishment
6 Info
7 Manual TX Power Table
8 Wireless hardware table
9 Nstreme
10 Nstreme Dual
11 Registration Table
12 Security Profiles
12.1 Basic properties
12.2 WPA properties
12.2.1 WPA EAP properties
12.2.2 RADIUS properties
12.2.3 WEP properties
12.3 Management frame protection
12.4 Operation details
12.4.1 RADIUS MAC authentication
12.4.1.1 Caching
12.4.2 RADIUS EAP passthrough authentication
12.4.3 Statically configured WEP keys
12.4.4 WDS security configuration
12.4.4.1 WDS and WPA/WPA2
12.4.4.2 WDS and WEP
12.4.5 Security profile and access point matching in the connect list
13 Virtual interfaces
13.1 VirtualAP
13.2 Virtual Clients
14 Sniffer
14.1 Packets
15 Scan
16 Snooper
16.1 Settings
17 Spectral scan
18 WDS
19 WPS
19.1 WPS Server
19.2 WPS Client
20 Repeater
21 Roaming
21.1 Station Roaming
22 VLAN tagging
22.1 Vlan tag override
23 Winbox
Overview
Standards:
Package: wireless
RouterOS wireless comply with IEEE 802.11 standards, it provides complete support for 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac as long as
additional features like WPA, WEP, AES encryption, Wireless Distribution System (WDS), Dynamic Frequency selection (DFS), Virtual Access Point,
Nstreme and NV2 proprietary protocols and many more. Wireless features compatibility table for different wireless protocols.
Wireless can operate in several modes: client (station), access point, wireless bridge etc. Client/station also can operate in different modes, a complete
list of supported modes can be found here.
General interface properties
Submenu: /interface wireless
Property Description
adaptive‐noise‐immunity (apandclientmode | client This property is only effective for cards based on Atheros chipset.
mode | none; Default: none)
allow‐sharedkey (yes | no; Default: no) Allow WEP Shared Key clients to connect. Note that no authentication is done for these
clients (WEP Shared keys are not compared to anything) they are just accepted at once
(if access list allows that)
ampdu‐priorities (list of integer [0..7]; Default: 0) Frame priorities for which AMPDU sending (aggregating frames and sending using
block acknowledgment) should get negotiated and used. Using AMPDUs will increase
throughput, but may increase latency, therefore, may not be desirable for realtime traffic
(voice, video). Due to this, by default AMPDUs are enabled only for besteffort traffic.
amsdu‐limit (integer [0..8192]; Default: 8192) Max AMSDU that device is allowed to prepare when negotiated. AMSDU aggregation
may significantly increase throughput especially for small frames, but may increase
latency in case of packet loss due to retransmission of aggregated frame. Sending and
receiving AMSDUs will also increase CPU usage.
amsdu‐threshold (integer [0..8192]; Default: 8192) Max frame size to allow including in AMSDU.
antenna‐gain (integer [0..4294967295]; Default: 0) Antenna gain in dBi, used to calculate maximum transmit power according to country
regulations.
antenna‐mode (anta | antb | rxatxb | txarxb; Default: ) Select antenna to use for transmitting and for receiving
anta use only 'a' antenna
antb use only 'b' antenna
txarxb use antenna 'a' for transmitting, antenna 'b' for receiving
rxatxb use antenna 'b' for transmitting, antenna 'a' for receiving
area (string; Default: ) Identifies group of wireless networks. This value is announced by AP, and can be
matched in connectlist by areaprefix. This is a proprietary extension.
arp (disabled | enabled | proxyarp | replyonly; Default: Read more >>
enabled)
arp‐timeout (auto | integer; Default: auto) ARP timeout is time how long ARP record is kept in ARP table after no packets are
recieved form IP. Value auto equals to value of arptimeout in /ip settings, defoult is
30s.
band (2ghzb | 2ghzb/g | 2ghzb/g/n | 2ghzonlyg | 2ghz Defines set of used data rates, channel frequencies and widths.
onlyn | 5ghza | 5ghza/n | 5ghzonlyn | 5ghza/n/ac |
5ghzonlyac; Default: )
basic‐rates‐a/g (12Mbps | 18Mbps | 24Mbps | 36Mbps | Similar to the basicratesb property, but used for 5ghz, 5ghz10mhz, 5ghz5mhz, 5ghz
48Mbps | 54Mbps | 6Mbps | 9Mbps; Default: 6Mbps) turbo, 2.4ghzb/g, 2.4ghzonlyg, 2ghz10mhz, 2ghz5mhz and 2.4ghzgturbo bands.
basic‐rates‐b (11Mbps | 1Mbps | 2Mbps | 5.5Mbps; List of basic rates, used for 2.4ghzb, 2.4ghzb/g and 2.4ghzonlyg bands.
Default: 1Mbps)
Client will connect to AP only if it supports all basic rates announced by the AP. AP will
establish WDS link only if it supports all basic rates of the other AP.
This property has effect only in AP modes, and when value of rateset is configured.
bridge‐mode (disabled | enabled; Default: enabled) Allows to use stationbridge mode. Read more >>
burst‐time (integer | disabled; Default: disabled) Time in microseconds which will be used to send data without stopping. Note that no
other wireless cards in that network will be able to transmit data during bursttime
microseconds. This setting is available only for AR5000, AR5001X, and AR5001X+
chipset based cards.
channel‐width (20/40/80mhzCeee | 20/40/80mhzeCee | Use of extension channels (e.g. Ce, eC etc) allows additional 20MHz extension channels
20/40/80mhzeeCe | 20/40/80mhzeeeC | 20/40mhzCe | and if it should be located below or above the control (main) channel. Extension channel
20/40mhzeC | 40mhzturbo | 20mhz | 10mhz | 5mhz; allows 802.11n devices to use up to 40MHz (802.11ac up to 80MHz) of spectrum in total
Default: 20mhz) thus increasing max throughput.
comment (string; Default: ) Short description of the interface
compression (yes | no; Default: no) Setting this property to yes will allow the use of the hardware compression. Wireless
interface must have support for hardware compression. Connections with devices that do
not use compression will still work.
country (name of the country | no_country_set; Default: Limits available bands, frequencies and maximum transmit power for each frequency.
no_country_set) Also specifies default value of scanlist. Value no_country_set is an FCC compliant set
of channels.
default‐ap‐tx‐limit (integer [0..4294967295]; Default: This is the value of aptxlimit for clients that do not match any entry in the accesslist.
0) 0 means no limit.
default‐authentication (yes | no; Default: yes) For AP mode, this is the value of authentication for clients that do not match any entry
in the accesslist. For station mode, this is the value of connect for APs that do not
match any entry in the connectlist
default‐client‐tx‐limit (integer [0..4294967295]; This is the value of clienttxlimit for clients that do not match any entry in the access
Default: 0) list. 0 means no limit
default‐forwarding (yes | no; Default: yes) This is the value of forwarding for clients that do not match any entry in the accesslist
disable‐running‐check (yes | no; Default: no) When set to yes interface will always have running flag. If value is set to no', the router
determines whether the card is up and running for AP one or more clients have to be
registered to it, for station, it should be connected to an AP.
disabled (yes | no; Default: yes) Whether interface is disabled
disconnect‐timeout (time [0s..15s]; Default: 3s) This interval is measured from third sending failure on the lowest data rate. At this point
3 * (hwretries + 1) frame transmits on the lowest data rate had failed. During
disconnecttimeout packet transmission will be retried with onfailretrytime interval.
If no frame can be transmitted successfully during diconnecttimeout, connection is
closed, and this event is logged as "extensive data loss". Successful frame transmission
resets this timer.
distance (integer | dynamic | indoors; Default: dynamic) How long to wait for confirmation of unicast frames before considering transmission
unsuccessful. Value 'dynamic' causes AP to detect and use smallest timeout that works
with all connected clients. Acknowledgments are not used in Nstreme protocol.
frame‐lifetime (integer [0..4294967295]; Default: 0) Discard frames that have been queued for sending longer than framelifetime. By
default, when value of this property is 0, frames are discarded only after connection is
closed.
frequency (integer [0..4294967295]; Default: ) Channel frequency value in MHz on which AP will operate.
Allowed values depend on selected band, and are restricted by country setting and
wireless card capabilities. This setting has no effect if interface is in any of station
modes, or in wdsslave mode, or if DFS is active.
Note: If using mode "superchannel", any frequency supported by the card will be
accepted, but on the RouterOS client, any nonstandard frequency must be configured in
the scanlist, otherwise it will not be scanning in nonstandard range. In Winbox, scanlist
frequencies are in bold, any other frequency means the clients will need scanlist
configured.
frequency‐mode (manualtxpower | regulatorydomain | Three frequency modes are available:
superchannel; Default: manualtxpower)
regulatorydomain Limit available channels and maximum transmit power for
each channel according to the value of country
manualtxpower Same as above, but do not limit maximum transmit power.
superchannel Conformance Testing Mode. Allow all channels supported by the
card.
List of available channels for each band can be seen in /interface wireless info allowed
channels. This mode allows you to test wireless channels outside the default scanlist
and/or regulatory domain. This mode should only be used in controlled environments, or
if you have a special permission to use it in your region. Before v4.3 this was called
Custom Frequency Upgrade, or Superchannel. Since RouterOS v4.3 this mode is
available without special key upgrades to all installations.
frequency‐offset (integer [2147483648..2147483647]; Allows to specify offset if the used wireless card operates at a different frequency than is
Default: 0) shown in RouterOS, in case a frequency converter is used in the card. So if your card
works at 4000MHz but RouterOS shows 5000MHz, set offset to 1000MHz and it will be
displayed correctly. The value is in MHz and can be positive or negative.
guard‐interval (any | long; Default: any) Whether to allow use of short guard interval (refer to 802.11n MCS specification to see
how this may affect throughput). "any" will use either short or long, depending on data
rate, "long" will use long.
hide‐ssid (yes | no; Default: no) .
yes AP does not include SSID in the beacon frames, and does not reply to probe
requests that have broadcast SSID.
no AP includes SSID in the beacon frames, and replies to probe requests that
have broadcast SSID.
This property has effect only in AP mode. Setting it to yes can remove this network from
the list of wireless networks that are shown by some client software. Changing this
setting does not improve security of the wireless network, because SSID is included in
other frames sent by the AP.
ht‐basic‐mcs (list of (mcs0 | mcs1 | mcs2 | mcs3 | mcsModulation and Coding Schemes (http://en.wikipedia.org/wiki/IEEE_802.11n
4 | mcs5 | mcs6 | mcs7 | mcs8 | mcs9 | mcs10 | mcs 2009#Data_rates) that every connecting client must support. Refer to 802.11n for MCS
11 | mcs12 | mcs13 | mcs14 | mcs15 | mcs16 | mcs17 | specification.
mcs18 | mcs19 | mcs20 | mcs21 | mcs22 | mcs23);
Default: mcs0; mcs1; mcs2; mcs3; mcs4; mcs5;
mcs6; mcs7)
ht‐supported‐mcs (list of (mcs0 | mcs1 | mcs2 | mcs3 |
Modulation and Coding Schemes (http://en.wikipedia.org/wiki/IEEE_802.11n
mcs4 | mcs5 | mcs6 | mcs7 | mcs8 | mcs9 | mcs10 | 2009#Data_rates) that this device advertises as supported. Refer to 802.11n for MCS
mcs11 | mcs12 | mcs13 | mcs14 | mcs15 | mcs16 | specification.
mcs17 | mcs18 | mcs19 | mcs20 | mcs21 | mcs22 |
mcs23); Default: mcs0; mcs1; mcs2; mcs3; mcs4;
mcs5; mcs6; mcs7; mcs8; mcs9; mcs10; mcs11;
mcs12; mcs13; mcs14; mcs15; mcs16; mcs17; mcs
18; mcs19; mcs20; mcs21; mcs22; mcs23)
hw‐fragmentation‐threshold (integer[256..3000] | Specifies maximum fragment size in bytes when transmitted over wireless medium.
disabled; Default: 0) 802.11 standard packet (MSDU in 802.11 terminology) fragmentation allows packets to
be fragmented before transmitting over wireless medium to increase probability of
successful transmission (only fragments that did not transmit correctly are
retransmitted). Note that transmission of fragmented packet is less efficient than
transmitting unfragmented packet because of protocol overhead and increased resource
usage at both transmitting and receiving party.
hw‐protection‐mode (ctstoself | none | rtscts; Default: Frame protection support property read more >>
none)
hw‐protection‐threshold (integer [0..65535]; Default: 0) Frame protection support property read more >>
hw‐retries (integer [0..15]; Default: 7) Number of times sending frame is retried without considering it a transmission failure.
Data rate is decreased upon failure and frame is sent again. Three sequential failures on
lowest supported rate suspend transmission to this destination for the duration of onfail
retrytime. After that, frame is sent again. The frame is being retransmitted until
transmission success, or until client is disconnected after disconnecttimeout. Frame
can be discarded during this time if framelifetime is exceeded.
interworking‐profile (enabled | disabled; Default:
disabled)
keepalive‐frames (enabled | disabled; Default: enabled)
l2mtu (integer [0..65536]; Default: 1600)
mac‐address (MAC; Default: )
master‐interface (string; Default: ) Name of wireless interface that has virtualap capability. Virtual AP interface will only
work if master interface is in apbridge, bridge or wdsslave mode. This property is only
for virtual AP interfaces.
max‐station‐count (integer [1..2007]; Default: 2007) Maximum number of associated clients. WDS links also count toward this limit.
mode (station | stationwds | apbridge | bridge | Selection between different station and access point (AP) modes.
alignmentonly | nstremedualslave | wdsslave | station
pseudobridge | stationpseudobridgeclone | station Station modes:
bridge; Default: station)
station Basic station mode. Find and connect to acceptable AP.
stationwds Same as station, but create WDS link with AP, using proprietary
extension. AP configuration has to allow WDS links with this device. Note that
this mode does not use entries in wds.
stationpseudobridge Same as station, but additionally perform MAC address
translation of all traffic. Allows interface to be bridged.
stationpseudobridgeclone Same as stationpseudobridge, but use station
bridgeclonemac address to connect to AP.
AP modes:
apbridge Basic access point mode.
bridge Same as apbridge, but limited to one associated client.
wdsslave Same as apbridge, but scan for AP with the same ssid and establishes
WDS link. If this link is lost or cannot be established, then continue scanning. If
dfsmode is radardetect, then APs with enabled hidessid will not be found
during scanning.
Special modes:
alignmentonly Put interface in a continuous transmit mode that is used for
aiming remote antenna.
nstremedualslave allow this interface to be used in nstremedual setup.
MAC address translation in pseudobridge modes works by inspecting packets and
building table of corresponding IP and MAC addresses. All packets are sent to AP
with the MAC address used by pseudobridge, and MAC addresses of received
packets are restored from the address translation table. There is single entry in
address translation table for all nonIP packets, hence more than one host in the
bridged network cannot reliably use nonIP protocols. Note: Currently IPv6
doesn't work over Pseudobridge
Virtual AP interfaces do not have this property, they follow the mode of their
master interface.
mtu (integer [0..65536]; Default: 1500)
multicast‐buffering (disabled | enabled; Default:
enabled)
multicast‐helper (default | disabled | full; Default: When set to full multicast packets will be sent with unicast destination MAC address,
default) resolving multicast problem on wireless link. This option should be enabled only on
access point, clients should be configured in stationbridge mode. Available starting
from v5.15.
disabled disables the helper and sends multicast packets with multicast
destination MAC addresses
full all multicast packet mac address are changed to unicast mac addresses prior
sending them out
default default choice that currently is set to disabled. Value can be changed in
future releases.
name (string; Default: ) name of the interface
noise‐floor‐threshold (default | integer [128..127]; This property is only effective for cards based on AR5211 chipset.
Default: default)
nv2‐cell‐radius (integer [10..200]; Default: 30) Setting affects the size of contention time slot that AP allocates for clients to initiate
connection and also size of time slots used for estimating distance to client. When setting
is too small, clients that are farther away may have trouble connecting and/or disconnect
with "ranging timeout" error. Although during normal operation the effect of this setting
should be negligible, in order to maintain maximum performance, it is advised to not
increase this setting if not necessary, so AP is not reserving time that is actually never
used, but instead allocates it for actual data transfer.
on AP: distance to farthest client in km
on station: no effect
nv2‐noise‐floor‐offset (default | integer [0..20];
Default: default)
nv2‐preshared‐key (string; Default: )
nv2‐qos (default | framepriority; Default: default) Sets the packet priority mechanism, firstly data from high priority queue is sent, then
lower queue priority data until 0 queue priority is reached. When link is full with high
priority queue data, lower priority data is not sent. Use it very carefully, setting works on
AP
framepriority manual setting that can be tuned with Mangle rules.
default default setting where small packets receive priority for best latency
nv2‐queue‐count (integer [2..8]; Default: 2)
nv2‐security (disabled | enabled; Default: disabled)
on‐fail‐retry‐time (time [100ms..1s]; Default: 100ms) After third sending failure on the lowest data rate, wait for specified time interval before
retrying.
periodic‐calibration (default | disabled | enabled; Setting default enables periodic calibration if info defaultperiodiccalibration property
Default: default) is enabled. Value of that property depends on the type of wireless card. This property is
only effective for cards based on Atheros chipset.
periodic‐calibration‐interval (integer [1..10000]; This property is only effective for cards based on Atheros chipset.
Default: 60)
preamble‐mode (both | long | short; Default: both) Short preamble mode is an option of 802.11b standard that reduces perframe overhead.
On AP:
long Do not use short preamble.
short Announce short preamble capability. Do not accept connections from
clients that do not have this capability.
both Announce short preamble capability.
On station:
long do not use short preamble.
short do not connect to AP if it does not support short preamble.
both Use short preamble if AP supports it.
prism‐cardtype (100mW | 200mW | 30mW; Default: ) Specify type of the installed Prism wireless card.
proprietary‐extensions (post2.9.25 | pre2.9.25; RouterOS includes proprietary information in an information element of management
Default: post2.9.25) frames. This parameter controls how this information is included.
pre2.9.25 This is older method. It can interoperate with newer versions of
RouterOS. This method is incompatible with some clients, for example, Centrino
based ones.
post2.9.25 This uses standardized way of including vendor specific information,
that is compatible with newer wireless clients.
radio‐name (string; Default: MAC address of an Descriptive name of the device, that is shown in registration table entries on the remote
interface) devices. This is a proprietary extension.
rate‐selection (advanced | legacy; Default: advanced) Starting from v5.9 default value is advanced since legacy mode was inefficient.
rate‐set (configured | default; Default: default) Two options are available:
default default basic and supported rate sets are used. Values from basicrates
and supportedrates parameters have no effect.
configured use values from basicrates, supportedrates, basicmcs, mcs. Read
more >>.
rx‐chains (list of integer [0..2]; Default: 0) Which antennas to use for receive.
scan‐list The default value is all channels from selected band that are supported by card and
(Comma separated list of frequencies and frequency allowed by the country and frequencymode settings (this list can be seen in info). For
ranges | default. Since v6.35 (wirelessrep) type also default scan list in 5ghz band channels are taken with 20MHz step, in 5ghzturbo band
support range:step option; Default: default) with 40MHz step, for all other bands with 5MHz step. If scanlist is specified
manually, then all matching channels are taken. (Example: scanlist=default,5200
5245,24122427 This will use the default value of scan list for current band, and add to
it supported frequencies from 52005245 or 24122427 range.)
Since RouterOS v6.0 with Winbox or Webfig, for inputting of multiple frequencies, add
each frequency or range of frequencies into separate multiple scanlists. Using a comma
to separate frequencies is no longer supported in Winbox/Webfig since v6.0.
Since RouterOS v6.35 (wirelessrep) scanlist support step feature where it is possible to
manually specify the scan step. Example: scanlist=55005600:20 will generate such
scanlist values 5500,5520,5540,5560,5580,5600
security‐profile (string; Default: default) Name of profile from securityprofiles
ssid (string (0..32 chars); Default: value of SSID (service set identifier) is a name that identifies wireless network.
system/identity)
station‐bridge‐clone‐mac (MAC; Default: ) This property has effect only in the stationpseudobridgeclone mode.
Use this MAC address when connection to AP. If this value is 00:00:00:00:00:00,
station will initially use MAC address of the wireless interface.
As soon as packet with MAC address of another device needs to be transmitted, station
will reconnect to AP using that address.
station‐roaming (disabled | enabled; Default: enabled) Station Roaming feature is available only for 802.11 wireless protocol and only for
station modes. Read more >>
supported‐rates‐a/g (list of rates [12Mbps | 18Mbps | List of supported rates, used for all bands except 2ghzb.
24Mbps | 36Mbps | 48Mbps | 54Mbps | 6Mbps | 9Mbps];
Default: 6Mbps; 9Mbps; 12Mbps; 18Mbps; 24Mbps;
36Mbps; 48Mbps; 54Mbps)
supported‐rates‐b (list of rates [11Mbps | 1Mbps | 2Mbps
List of supported rates, used for 2ghzb, 2ghzb/g and 2ghzb/g/n bands. Two devices
| 5.5Mbps]; Default: 1Mbps; 2Mbps; 5.5Mbps; 11Mbps) will communicate only using rates that are supported by both devices. This property has
effect only when value of rateset is configured.
tdma‐period‐size (integer [1..10]; Default: 2) Specifies TDMA period in milliseconds. It could help on the longer distance links, it
could slightly increase bandwidth, while latency is increased too.
tx‐chains (list of integer [0..2]; Default: 0) Which antennas to use for transmit.
tx‐power (integer [30..30]; Default: ) For 802.11ac wireless interface it's total power but for 802.11a/b/g/n it's power per chain.
tx‐power‐mode (default, cardrates, allratedfixed, sets up txpower mode for wireless card
manualtable; Default: default)
default use values stored in the card
cardrates use transmit power as defined by txpower setting
allratedfixed use same transmit power for all data rates. Can damage the card if
transmit power is set above rated value of the card for used rate
manualtable define transmit power for each rate separately. Can damage the
card if transmit power is set above rated value of the card for used rate.
update‐stats‐interval (; Default: ) How often to request update of signals strength and ccq values from clients.
Access to registrationtable also triggers update of these values.
This is proprietary extension.
vht‐basic‐mcs (none | MCS 07 | MCS 08 | MCS 09; Modulation and Coding Schemes
Default: MCS 07) (http://en.wikipedia.org/wiki/IEEE_802.11ac#Data_rates_and_speed) that every
connecting client must support. Refer to 802.11ac for MCS specification.
You can set MCS interval for each of Spatial Stream
none will not use selected Spatial Stream
MCS 07 client must support MCS0 to MCS7
MCS 08 client must support MCS0 to MCS8
MCS 09 client must support MCS0 to MCS9
vht‐supported‐mcs (none | MCS 07 | MCS 08 | MCS 09; Modulation and Coding Schemes
Default: MCS 09) (http://en.wikipedia.org/wiki/IEEE_802.11ac#Data_rates_and_speed) that this device
advertises as supported. Refer to 802.11ac for MCS specification.
You can set MCS interval for each of Spatial Stream
none will not use selected Spatial Stream
MCS 07 devices will advertise as supported MCS0 to MCS7
MCS 08 devices will advertise as supported MCS0 to MCS8
MCS 09 devices will advertise as supported MCS0 to MCS9
wds‐cost‐range (start [end] integer[0..4294967295]; Bridge port cost of WDS links are automatically adjusted, depending on measured link
Default: 50150) throughput. Port cost is recalculated and adjusted every 5 seconds if it has changed by
more than 10%, or if more than 20 seconds have passed since the last adjustment.
Setting this property to 0 disables automatic cost adjustment.
Automatic adjustment does not work for WDS links that are manually configured as a
bridge port.
wds‐default‐bridge (string | none; Default: none) When WDS link is established and status of the wds interface becomes running, it will
be added as a bridge port to the bridge interface specified by this property. When WDS
link is lost, wds interface is removed from the bridge. If wds interface is already
included in a bridge setup when WDS link becomes active, it will not be added to bridge
specified by , and will (needs editing)
wds‐default‐cost (integer [0..4294967295]; Default: 100) Initial bridge port cost of the WDS links.
wds‐ignore‐ssid (yes | no; Default: no) By default, WDS link between two APs can be created only when they work on the same
frequency and have the same SSID value. If this property is set to yes, then SSID of the
remote AP will not be checked. This property has no effect on connections from clients
in stationwds mode. It also does not work if wdsmode is staticmesh or dynamicmesh.
wds‐mode (disabled | dynamic | dynamicmesh | static | Controls how WDS links with other devices (APs and clients in stationwds mode) are
staticmesh; Default: disabled) established.
disabled does not allow WDS links.
static only allows WDS links that are manually configured in wds
dynamic also allows WDS links with devices that are not configured in wds, by
creating required entries dynamically. Such dynamic WDS entries are removed
automatically after the connection with the other AP is lost.
mesh modes use different (better) method for establishing link between AP, that is
not compatible with APs in nonmesh mode. This method avoids onesided WDS
links that are created only by one of the two APs. Such links cannot pass any data.
When AP or station is establishing WDS connection with another AP, it uses
connectlist to check whether this connection is allowed. If station in stationwds
mode is establishing connection with AP, AP uses accesslist to check whether this
connection is allowed.
If mode is stationwds, then this property has no effect.
wireless‐protocol (802.11 | any | nstreme | nv2 | nv2 Specifies protocol used on wireless interface;
nstreme | nv2nstreme802.11 | unspecified; Default:
unspecified) unspecified protocol mode used on previous RouterOS versions (v3.x, v4.x).
Nstreme is enabled by old enablenstreme setting, Nv2 configuration is not
possible.
any : on AP regular 802.11 Access Point or Nstreme Access Point; on station
selects Access Point without specific sequence, it could be changed by connectlist
rules.
nstreme enables Nstreme protocol (the same as old enablenstreme setting).
nv2 enables Nv2 protocol.
nv2 nstreme : on AP uses first wirelessprotocol setting, always Nv2; on station
searches for Nv2 Access Point, then for Nstreme Access Point.
nv2 nstreme 802.11 on AP uses first wirelessprotocol setting, always Nv2; on
station searches for Nv2 Access Point, then for Nstreme Access Point, then for
regular 802.11 Access Point.
Warning! Nv2 doesn't have support for Virtual AP
wmm‐support (disabled | enabled | required; Default: Specifies whether to enable WMM.
disabled)
wps‐mode (disabled | pushbutton | pushbuttonvirtual Read more >>
only; Default: depending on the device model)
Basic and MCS Rate table
Default basic and supported rates, depending on selected band
band basic rates basicHTmcs basicVHTmcs VHTmcs HTmcs supported rates
2.4ghzb 1 111
2.4ghzonlyg 6 111,654
2.4ghzonlyn 6 07 023 111,654
2.4ghzb/g 111 111,654
2.4ghzb/g/n 111 none 023 111,654
2.4ghzg/n 6 none 023 654
2.4ghzgturbo 6 654
5ghza 6 654
5ghza/n 6 none 023 654
5ghzonlyn 6 07 023 654
5ghza/n/ac 6 none none 09 023 654
5ghzonlyac 6 none 07 09 023 654
Used settings when rateset=configured
band used settings
2.4ghzb basicb, supportedb
2.4ghzb/g, 2.4ghzonlyg basicb, supportedb, basica/g, supporteda/g
2.4ghzonlyn, 2.4ghzb/g/n basicb, supportedb, basica/g, supporteda/g, htbasicmcs, htsupportedmcs
2.4ghzg/n basica/g,supporteda/g,htbasicmcs,htsupportedmcs
5ghza basica/g,supporteda/g
5ghza/n, 5ghzonlyn basica/g,supporteda/g,htbasicmcs,htsupportedmcs
5ghza/n/ac, 5ghzonlyac basica/g,supporteda/g,htbasicmcs,htsupportedmcs,vhtbasicmcs,vhtsupportedmcs
Settings independent from rateset:
1. allowed mcs depending on number of chains:
1 chain: 07
2 chains: 015
3 chains: 023
2. if standard channel width (20Mhz) is not used, then 2ghz modes (except 2.4ghzb) are not using b rates (111)
Frame protection support (RTS/CTS)
802.11 standard provides means to protect transmission against other device transmission by using RTS/CTS protocol. Frame protection helps to fight
"hidden node" problem. There are several types of protection:
RTS/CTS based protection device willing to send frame at first sends RequestToSend frame and waits for ClearToSend frame from intended
destination. By "seeing" RTS or CTS frame 802.11 compliant devices know that somebody is about to transmit and therefore do not initiate
transmission themselves
"CTS to self" based protection device willing to send frame sends CTS frame "to itself". As in RTS/CTS protocol every 802.11 compliant device
receiving this frame know not to transmit. "CTS to self" based protection has less overhead, but it must be taken into account that this only
protects against devices receiving CTS frame (e.g. if there are 2 "hidden" stations, there is no use for them to use "CTS to self" protection,
because they will not be able to receive CTS sent by other station in this case stations must use RTS/CTS so that other station knows not to
transmit by seeing CTS transmitted by AP).
Protection mode is controlled by hwprotectionmode setting of wireless interface. Possible values: none for no protection (default), rtscts for
RTS/CTS based protection or ctstoself for "CTS to self" based protection.
Frame size threshold at which protection should be used is controlled by hwprotectionthreshold setting of wireless interface.
For example, to enable "CTStoself" based frame protection on AP for all frames, not depending on size, use command:
[admin@MikroTik] /interface wireless> set 0 hw‐protection‐mode=cts‐to‐self hw‐protection‐threshold=0
To enable RTS/CTS based protection on client use command:
[admin@MikroTik] /interface wireless> set 0 hw‐protection‐mode=rts‐cts hw‐protection‐threshold=0
Nv2
MikroTik has developed a new wireless protocol based on TDMA technology (Time Division Multiple Access) (Nstreme version 2). See the Nv2
documentation: NV2
TDMA is a channel access method for shared medium networks. It allows several users to share the same frequency channel by dividing the signal into
different time slots. The users transmit in rapid succession, one after the other, each using his own time slot. This allows multiple stations to share the
same transmission medium (e.g. radio frequency channel) while using only a part of its channel capacity.
The most important benefits of Nv2 are:
Increased speed
More client connections in PTM environments
Lower latency
No distance limitations
No penalty for long distances
Starting from RouterOS v5.0beta5 you can configure Nv2 in the Wireless menu. Please take a look at the NV2 protocol implementation status. Nv2
protocol limit is 511 clients.
Warning: Nv2 doesn't have support for Virtual AP
Nv2 Troubleshooting
Increase throughput on long distance with tdmaperiodsize. In Every "period", the Access Point leaves part of the time unused for data transmission
(which is equal to round trip time the time in which the frame can be sent and received from the client), it is used to ensure that client could receive the
last frame from Access Point, before sending its own packets to it. The longer the distance, the longer the period is unused.
For example, the distance between Access Point and client is 30km. Frame is sent in 100us one direction, respectively roundtriptime is ~200us. tdma
periodsize default value is 2ms, it means 10% of the time is unused. When tdmaperiodsize is increased to 4ms, only 5% of time is unused. For 60km
wireless link, roundtriptime is 400ms, unused time is 20% for default tdmaperiodsize 2ms, and 10% for 4ms. Bigger tdmaperiodsize value
increases latency on the link.
Access List
Submenu: /interface wireless access‐list
Access list is used by access point to restrict allowed connections from other devices, and to control connection parameters.
Operation:
Access list rules are checked sequentially.
Disabled rules are always ignored.
Only the first matching rule is applied.
If there are no matching rules for the remote connection, then the default values from the wireless interface configuration are used.
If remote device is matched by rule that has authentication=no value, the connection from that remote device is rejected.
Warning: If there is no entry in ACL about client which connects to AP (wireless,debug wlan2: A0:0B:BA:D7:4D:B2 not in local ACL, by default
accept), then ACL for this client is ignored during all connection time.
For example, if client's signal during connection is 41 and we have ACL rule
/interface wireless access‐list
add authentication=yes forwarding=yes interface=wlan2 signal‐range=‐55..0
Then connection is not matched to any ACL rule and if signal drops to 70..80, client will not be disconnected.
To make it work correctly it is required that client is matched by any of ACL rules.
If we modify ACL rules in previous example to:
/interface wireless access‐list
add interface=wlan2 signal‐range=‐55
add authentication=no forwarding=no interface=wlan2 signal‐range=‐120..‐56
Then if signal drops to 56, client will be disconnected.
Properties
Property Description
ap‐tx‐limit (integer [0..4294967295]; Default: 0) Limit rate of data transmission to this client. Value 0 means no limit. Value is in bits per
second.
authentication (yes | no; Default: yes) .
no Client association will always fail.
yes Use authentication procedure that is specified in the securityprofile of the
interface.
client‐tx‐limit (integer [0..4294967295]; Default: 0) Ask client to limit rate of data transmission. Value 0 means no limit.
This is a proprietary extension that is supported by RouterOS clients.
Value is in bits per second.
comment (string; Default: ) Short description of an entry
disabled (yes | no; Default: no)
forwarding (yes | no; Default: yes) .
no Client cannot send frames to other station that are connected to same access
point.
yes Client can send frames to other stations on the same access point.
interface (string | all; Default: all) Rules with interface=all are used for all wireless interfaces. To make rule that applies
only to one wireless interface, specify that interface as a value of this property.
mac‐address (MAC; Default: 00:00:00:00:00:00) Rule matches client with the specified MAC address. Value 00:00:00:00:00:00 matches
always.
management‐protection‐key (string; Default: "")
private‐algo (104bitwep | 40bitwep | aesccm | none | Only for WEP modes.
tkip; Default: none)
private‐key (string; Default: "") Only for WEP modes.
private‐pre‐shared‐key (string; Default: "") Used in WPA PSK mode.
signal‐range (NUM..NUM both NUM are numbers in Rule matches if signal strength of the station is within the range.
the range 120..120; Default: 120..120)
If signal strength of the station will go out of the range that is specified in the rule,
access point will disconnect that station.
time (TIMETIME,sun,mon,tue,wed,thu,fri,sat TIME is Rule will match only during specified time.
time interval 0..86400 seconds; all day names are
optional; value can be unset; Default: ) Station will be disconnected after specified time ends. Both start and end time is
expressed as time since midnight, 00:00.
Rule will match only during specified days of the week.
Align
Submenu: /interface wireless align
Property Description
active‐mode (yes | no; Default: yes) If in active mode, station will send out frames for align.
audio‐max (integer [2147483648..2147483647]; Default: Maxumum signal strength for beeper
20)
audio‐min (integer [2147483648..2147483647]; Default: Minimum signal strength for beeper
100)
audio‐monitor (MAC; Default: 00:00:00:00:00:00) Which MAC address to use for audio monitoring
filter‐mac (MAC; Default: 00:00:00:00:00:00) Filtered out MAC address that will be shown in monitor screen.
frame‐size (integer [200..1500]; Default: 300) Size of the frames used by monitor.
frames‐per‐second (integer [1..100]; Default: 25) Frame transmit interval
receive‐all (yes | no; Default: no) If set to "no", monitoring will work only if both wireless stations are in align mode.
ssid‐all (yes | no; Default: no) Whether to show all SSIDs in the monitor or only one configured in wireless settings.
Menu Specific Commands
Property Description
monitor (interface name) Start align monitoring
test‐audio (integer [2147483648..2147483647]) Test the beeper
Connect List
Submenu: /interface wireless connect‐list
connectlist is used to assign priority and security settings to connections with remote access points, and to restrict allowed connections. connectlist is
an ordered list of rules. Each rule in connectlist is attached to specific wireless interface, specified in the interface property of that rule (this is unlike
accesslist, where rules can apply to all interfaces). Rule can match MAC address of remote access point, it's signal strength and many other parameters.
Operation:
connectlist rules are always checked sequentially, starting from the first.
disabled rules are always ignored.
Only the first matching rule is applied.
If connectlist does not have any rule that matches remote access point, then the default values from the wireless interface configuration are used.
If access point is matched by rule that has connect=no value, connection with this access point will not be attempted.
If access point is matched by rule that has connect=yes value, connection with this access point will be attempted.
In station mode, if several remote access points are matched by connect list rules with connect=yes value, connection will be attempted
with access point that is matched by rule higher in the connectlist.
If no remote access points are matched by connectlist rules with connect=yes value, then value of defaultauthentication interface
property determines whether station will attempt to connect to any access point. If defaultauthentication=yes, station will choose access
point with best signal and compatible security.
In access point mode, connectlist is checked before establishing WDS link with remote device. If access point is not matched by any rule in the
connect list, then the value of defaultauthentication determines whether WDS link will be established.
Properties
Property Description
3gpp (string; Default: )
area‐prefix (string; Default: ) Rule matches if area value of AP (a proprietary extension) begins with specified
value.area value is a proprietary extension.
comment (string; Default: ) Short description of an entry
connect (yes | no; Default: yes) Available options:
yes Connect to access point that matches this rule.
no Do not connect to any access point that matches this rule.
disabled (yes | no; Default: no)
mac‐address (MAC; Default: 00:00:00:00:00:00) Rule matches only AP with the specified MAC address. Value 00:00:00:00:00:00
matches always.
security‐profile (string | none; Default: none) Name of security profile that is used when connecting to matching access points, If value
of this property is none, then security profile specified in the interface configuration will
be used. In station mode, rule will match only access points that can support specified
security profile. Value none will match access point that supports security profile that is
specified in the interface configuration. In access point mode value of this property will
not be used to match remote devices.
signal‐range (NUM..NUM both NUM are numbers in Rule matches if signal strength of the access point is within the range. If station
the range 120..120; Default: 120..120) establishes connection to access point that is matched by this rule, it will disconnect
from that access point when signal strength goes out of the specified range.
ssid (string; Default: "") Rule matches access points that have this SSID. Empty value matches any SSID. This
property has effect only when station mode interface ssid is empty, or when access point
mode interface has wdsignoressid=yes
wireless‐protocol (802.11 | any | nstreme | tdma;
Default: any)
interface (string; Default: ) Each rule in connect list applies only to one wireless interface that is specified by this
setting.
Usage
Restrict station connections only to specific access points
Set value of defaultauthentication interface property to no.
/interface wireless set station‐wlan default‐authentication=no
Create rules that matches allowed access points. These rules must have connect=yes and interface equal to the name of station wireless interface.
/interface wireless connect‐list add interface=station‐wlan connect=yes mac‐address=00:11:22:33:00:01
/interface wireless connect‐list add interface=station‐wlan connect=yes mac‐address=00:11:22:33:00:02
Disallow connections to specific access points
Set value of defaultauthentication interface property to yes.
/interface wireless set station‐wlan default‐authentication=yes
Create connect=no rules that match those access points that station should not connect to. These rules must have connect=no and interface equal
to the name of station wireless interface.
/interface wireless connect‐list add interface=station‐wlan connect=no mac‐address=00:11:22:33:44:55
Select preferred access points
Create rules that match preferred access points. These rules must have connect=yes and interface equal to the name of station wireless interface.
Put rules that match preferred access points higher in the connectlist, in the order of preference.
Restrict WDS link establishment
Place rules that match allowed access points at the top.
Add denyall rule at the end of connect list.
Info
Submenu: /interface wireless info
Property Description
2ghz‐10mhz‐power‐channels ()
2ghz‐11n‐channels ()
2ghz‐5mhz‐power‐channels ()
2ghz‐b‐channels ()
2ghz‐g‐channels ()
2ghz‐g‐turbo‐channels ()
5ghz‐10mhz‐power‐channels ()
5ghz‐11n‐channels ()
5ghz‐5mhz‐power‐channels ()
5ghz‐channels ()
5ghz‐turbo‐channels ()
capabilities ()
chip‐info ()
default‐periodic‐calibration ()
firmware ()
ht‐chains ()
interface‐type ()
name ()
pci‐info ()
supported‐bands ()
Manual TX Power Table
Submenu: /interface wireless manual‐tx‐power‐table
Property Description
comment (string; Default: ) Short description of an entry
manual‐tx‐powers (list of [Rate:TxPower];
Rate ::= 11Mbps | 12Mbps | 18Mbps | 1Mbps | 24Mbps |
...
TxPower ::= integer [30..30]; Default: )
name (string) Name of the wireless interface to which tx powers will be applied.
Wireless hardware table
Warning: You must adhere to regulatory domain requirements in your country. If you are allowed to use other frequencies, note that Antenna Gain and
Transmit Power may decrease depending on board and frequency. Devices are calibrated only for regulatory frequencies, use non standard frequencies at
your own risk. The list only specifies frequencies accepted by the wireless chip, these frequencies might not always work due to antenna that is built into
the product, device design, filters and other factors. USE STRICTLY AT YOUR OWN RISK
Integrated wireless interface frequency table
Board name Wireless interfaces Frequency range [MHz]
2011UAS2HnD 1 23122732
751G2HnD 1 22002700
751U2HnD 1 22002700
9112Hn 1 23122732
9115HacD 1 49206100
9115Hn 1 49206100
9115HnD 1 49206100
911G2HPnD 1 23122732
911G5HPacD /NB /QRT 1 49206100
911G5HPnD /QRT 1 49206100
912UAG2HPnD /OUT 1 23122732
912UAG5HPnD /OUT 1 49206100
921GS5HPacD15S /19S 1 49206100
921UAGS5SHPacDNM 1 49206100
921UAGS5SHPacTNM 1 49206100
922UAGS5HPacD /NM 1 49206100
922UAGS5HPacT /NM 1 49206100
9412nD /TC 1 23122732
951G2HnD 1 23122732
951Ui2HnD 1 23122732
951Ui2nD 1 23122732
952Ui5ac2nD /TC 2 23122732,49206100
953GS5HnT /RP 1 49206100
962UiGS5HacT2HnT 2 23122732,49206100
cAP2n 1 23122732
cAP2nD 1 23122732
cAPL2nD 1 23122732
CRS1098G1S2HnDIN 1 23122732
CRS12524G1S2HnDIN 1 23122732
Disc5nD 1 49206100
DynaDishG5HacD 1 49206100
Groove52HPn 1 49206100,23122732
GrooveA52HPn 1 49206100,23122732
GrooveG52HPacn 1 49206100,23122732
GrooveGA52HPacn 1 49206100,23122732
LDF5nD 1 49206100
LHG5nD 1 49206100
mAP2n 1 23122732
mAP2nD 1 23122732
mAPL2nD 1 23122732
Metal2SHPn 1 22002700
Metal5SHPn 1 48006100
Metal9HPn 1 902928
MetalG52SHPacn 1 49206100,23122732
OmniTikG5HacD 1 49206100
OmniTikPG5HacD 1 49206100
OmniTIKU5HnD 1 48006100
OmniTIKUPA5HnD 1 48006100
QRTG2SHPnD 1 23122732
SEXTANTG5HPnD 1 49206100
SXT2nDr2 1 23122732
SXT5HacD2n 2 23122732,49206100
SXT5HPnDr2 1 49206100
SXT5nDr2 1 49206100
SXTG2HnD 1 22002700
SXTG2HnDr2 1 23002700
SXTG5HPacD 1 49206100
SXTG5HPacDHG /SA 1 49206100
SXTG5HPnDHGr2 /SAr2 1 49206100
SXTG6HPnD 1 55006500
wAP2nD /BE 1 23122732
wAPG5HacT2HnD /BE 2 23122732,49206100
R11e2HnD 1 23122732
R11e2HPnD 1 23122732
R11e5HacD 1 49206100
R11e5HacT 1 49206100
R11e5HnD 1 49206100
R2SHPn 1 22002700
R52H 1 49206100,21922507
R52HnD 1 48006100,22002700
R52nM 1 48006100,22002700
R5SHPn 1 48006100
Nstreme
Submenu: /interface wireless nstreme
This menu allows to switch a wireless card to the nstreme mode. In this case the card will work only with nstreme clients.
Property Description
comment (string; Default: ) Short description of an entry
disable‐csma (yes | no; Default: no) Disable CSMA/CA when polling is used (better performance)
enable‐nstreme (yes | no; Default: no) Whether to switch the card into the nstreme mode
enable‐polling (yes | no; Default: yes) Whether to use polling for clients
framer‐limit (integer [100..4000]; Default: 3200) Maximal frame size
framer‐policy (bestfit | dynamicsize | exactsize | none; The method how to combine frames. A number of frames may be combined into a
Default: none) bigger one to reduce the amount of protocol overhead (and thus increase speed). The
card is not waiting for frames, but in case a number of packets are queued for
transmitting, they can be combined. There are several methods of framing:
none do nothing special, do not combine packets (framing is disabled)
bestfit put as many packets as possible in one frame, until the framerlimit limit
is met, but do not fragment packets
exactsize put as many packets as possible in one frame, until the framerlimit
limit is met, even if fragmentation will be needed (best performance)
dynamicsize choose the best frame size dynamically
name (string) Name of an interface, to which setting will be applied. Read only.
Note: The settings here (except for enabling nstreme) are relevant only on Access Point, they are ignored for client devices! The client automatically
adapts to the AP settings.
WDS for Nstreme protocol requires using stationwds mode on one of the peers. Configurations with WDS between AP modes (bridge and apbridge)
will not work.
Nstreme Dual
Submenu: /interface wireless nstreme‐dual
Two radios in nstremedualslave mode can be grouped together to make nstreme2 PointtoPoint connection. To put wireless interfaces into a nstreme2
group, you should set their mode to nstremedualslave. Many parameters from /interface wireless menu are ignored, using the nstreme2, except:
frequencymode
country
antennagain
txpower
txpowermode
antennamode
Property Description
arp (disabled | enabled | proxyarp | replyonly; Default: Read more >>
enabled)
comment (string; Default: ) Short description of an entry
disable‐csma (yes | no; Default: no) Disable CSMA/CA (better performance)
disable‐running‐check (yes | no; Default: no) Whether the interface should always be treated as running even if there is no connection
to a remote peer
disabled (yes | no; Default: yes)
framer‐limit (integer [64..4000]; Default: 2560) Maximal frame size
framer‐policy (bestfit | exactsize | none; Default: none) The method how to combine frames. A number of frames may be combined into one
bigger one to reduce the amout of protocol overhead (and thus increase speed). The card
are not waiting for frames, but in case a number packets are queued for transmitting,
they can be combined. There are several methods of framing:
none do nothing special, do not combine packets
bestfit put as much packets as possible in one frame, until the framerlimit limit
is met, but do not fragment packets
exactsize put as much packets as possible in one frame, until the framerlimit
limit is met, even if fragmentation will be needed (best performance)
ht‐channel‐width (2040mhz | 20mhz | 40mhz; Default:
20mhz)
ht‐guard‐interval (both | long | short; Default: long)
ht‐rates (list of rates [1,2,3,4,5,6,7,8]; Default:
1,2,3,4,5,6,7,8)
ht‐streams (both | double | single; Default: single)
l2mtu (integer [0..65536]; Default: )
mtu (integer [0..65536]; Default: 1500)
name (string; Default: ) Name of an entry
rates‐a/g (list of rates [6Mbps,9Mbps, 12Mbps, 18Mbps, Rates to be supported in 802.11a or 802.11g standard
24Mbps, 36Mbps, 48Mbps, 54Mbps]; Default:
6Mbps,9Mbps,12Mbps, 18Mbps, 24Mbps, 36Mbps,
48Mbps, 54Mbps)
rates‐b (list of rates [1Mbps, 2Mbps, 5.5Mbps, 11Mbps]; Rates to be supported in 802.11b standard
Default: 1Mbps, 2Mbps, 5.5Mbps, 11Mbps)
remote‐mac (MAC; Default: 00:00:00:00:00:00) Which MAC address to connect to (this would be the remote receiver card's MAC
address)
rx‐band (2ghzb | 2ghzg | 2ghzn | 5ghza | 5ghzn; Operating band of the receiving radio
Default: )
rx‐channel‐width (10mhz; Default: 20mhz)
rx‐frequency (integer [0..4294967295]; Default: ) RX card operation frequency in Mhz.
rx‐radio (string; Default: ) Name of the interface used for receive.
tx‐band (2ghzb | 2ghzg | 2ghzn | 5ghza | 5ghzn; Operating band of the transmitting radio
Default: )
tx‐channel‐width (10mhz; Default: 20mhz)
tx‐frequency (integer [0..4294967295]; Default: ) TX card operation frequency in Mhz.
tx‐radio (string; Default: ) Name of the interface used for transmit.
Warning: WDS cannot be used on Nstremedual links.
Note: The difference between txfreq and rxfreq should be about 200MHz (more is recommended) because of the interference that may occur!
Note: You can use different bands for rx and tx links. For example, transmit in 2ghzg and receive data, using 2ghzb band.
Registration Table
Submenu: /interface wireless registration‐table
In the registration table, you can see various information about currently connected clients. It is used only for Access Points.
All properties are readonly.
Property Description
802.1x‐port‐enabled (yes | no) whether the data exchange is allowed with the peer (i.e., whether 802.1x authentication
is completed, if needed)
ack‐timeout (integer) current value of acktimeout
ap (yes | no) Shows whether registered device is configured as access point.
ap‐tx‐limit (integer) transmit rate limit on the AP, in bits per second
authentication‐type () authentication method used for the peer
bridge (yes | no)
bytes (integer , integer) number of sent and received packet bytes
client‐tx‐limit (integer) transmit rate limit on the AP, in bits per second
comment (string) Description of an entry. comment is taken from appropriate Access List entry if
specified.
compression (yes | no) whether data compresson is used for this peer
distance (integer)
encryption (aesccm | tkip) unicast encryption algorithm used
evm‐ch0 ()
evm‐ch1 ()
evm‐ch2 ()
frame‐bytes (integer,integer) number of sent and received data bytes excluding header information
frames (integer,integer) Number of frames that need to be sent over wireless link. This value can be compared to
hwframes to check wireless retransmits. Read more >>
framing‐current‐size (integer) current size of combined frames
framing‐limit (integer) maximal size of combined frames
framing‐mode () the method how to combine frames
group‐encryption () group encryption algorithm used
hw‐frame‐bytes (integer,integer) number of sent and received data bytes including header information
hw‐frames (integer,integer) Number of frames sent over wireless link by the driver. This value can be compared to
frames to check wireless retransmits. Read more >>
interface (string) Name of the wireless interface to which wireless client is associated
last‐activity (time) last interface data tx/rx activity
last‐ip (IP Address) IP address found in the last IP packet received from the registered client
mac‐address (MAC) MAC address of the registered client
management‐protection (yes | no)
nstreme (yes | no) Shows whether nstreme is enabled
p‐throughput (integer) estimated approximate throughput that is expected to the given peer, taking into account
the effective transmit rate and hardware retries. Calculated once in 5 seconds
packed‐bytes (integer, integer) number of bytes packed into larger frames for transmitting/receiving (framing)
packed‐frames (integer, integer) number of frames packed into larger ones for transmitting/receiving (framing)
packets (integer.integer) number of sent and received network layer packets
radio‐name (string) radio name of the peer
routeros‐version (string) RouterOS version of the registered client
rx‐ccq () Client Connection Quality (CCQ) for receive. Read more >>
rx‐rate (integer) receive data rate
signal‐strength (integer) average strength of the client signal recevied by the AP
signal‐strength‐ch0 ()
signal‐strength‐ch1 ()
signal‐strength‐ch2 ()
signal‐to‐noise ()
strength‐at‐rates () signal strength level at different rates together with time how long were these rates used
tdma‐retx ()
tdma‐rx‐size ()
tdma‐timing‐offset () tdmatimingoffset is proportional to distance and is approximately two times the
propagation delay. AP measures this so that it can tell clients what offset to use for their
transmissions clients then subtract this offset from their target transmission time such
that propagation delay is accounted for and transmission arrives at AP when expected.
You may occasionally see small negative value (like few usecs) there for close range
clients because of additional unaccounted delay that may be produced in transmitter or
receiver hardware that varies from chipset to chipset.
tdma‐tx‐size (integer) Value in bytes that specifies the size of data unit whose loss can be detected (data unit
over which CRC is calculated) sent by device. In general the bigger the better, because
overhead is less. On the other hand, small value in this setting can not always be
considered a signal that connection is poor if device does not have enough pending data
that would enable it to use bigger data units (e.g. if you are just pinging over link), this
value will not go up.
tdma‐windfull ()
tx‐ccq () Client Connection Quality (CCQ) for transmit. Read more >>
tx‐evm‐ch0 ()
tx‐evm‐ch1 ()
tx‐evm‐ch2 ()
tx‐frames‐timed‐out ()
tx‐rate ()
tx‐signal‐strength ()
tx‐signal‐strength‐ch0 ()
tx‐signal‐strength‐ch1 ()
tx‐signal‐strength‐ch2 ()
uptime (time) time the client is associated with the access point
wds (yes | no) whether the connected client is using wds or not
wmm‐enabled (yes | no) Shows whether WMM is enabled.
Security Profiles
Submenu: /interface wireless security‐profiles
Security profiles are configured under the /interface wireless securityprofiles path in the console, or in the "Security Profiles" tab of the "Wireless"
window in the WinBox. Security profiles are referenced by the wireless interface securityprofile parameter and securityprofile parameter of the
connect lists.
Basic properties
mode (one of none, statickeysoptional, statickeysrequired or dynamickeys; default value: none) :
none Encryption is not used. Encrypted frames are not accepted.
statickeysrequired WEP mode. Do not accept and do not send unencrypted frames.
Station in statickeysrequired mode will not connect to an access point in statickeysoptional mode.
statickeysoptional WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will
send unencrypted frames if encryption algorithm is specified as none.
Station in statickeysoptional mode will not connect to an access point in statickeysrequired mode.
See also: staticstaprivatealgo, statictransmitkey
dynamickeys WPA mode.
name : see generic properties
WPA properties
These properties have effect only when mode=dynamickeys.
authenticationtypes (multiple choice of wpapsk, wpa2psk, wpaeap and wpa2eap; default value is empty) : Set of supported authentication
types. Access point will advertise supported authentication types, and client will connect to access point only if supports any of the advertised
authentication types.
unicastciphers (multiple choice of tkip, aesccm; default value is empty) : Access point advertises that it supports specified ciphers. Client
attempts connection only to access points that supports at least one of the specified ciphers.
One of the ciphers will be used to encrypt unicast frames that are sent between access point and station.
groupciphers (multiple choice of tkip, aesccm; default value is empty) : Access point advertises one of these ciphers, and uses it to encrypt all
broadcast and multicast frames. Client attempts connection only to access points that use one of the specified group ciphers.
tkip Temporal Key Integrity Protocol encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of
WEP flaws
aesccm more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP
legacy should use only this
groupkeyupdate (time interval in the 30s..1h range; default value: 5m) : Controls how often access point updates group key. This key is used to
encrypt all broadcast and multicast frames.
This property has no effect in station mode.
wpapresharedkey, wpa2presharedkey (text) : WPA and WPA2 preshared key mode requires all devices in a BSS to have common secret
key. Value of this key can be an arbitrary text.
RouterOS also allows to override preshared key value for specific clients, using either privatepresharedkey property in the accesslist, or the
MikrotikWirelessPsk attribute in the RADIUS MAC authentication response. This is an extension.
These properties have effect only when authenticationtypes contains either wpapsk or wpa2psk.
wpapresharedkey is used for wpapsk authentication type. wpa2presharedkey is used for wpa2psk.
WPA EAP properties
These properties have effect only when authenticationtypes contains wpaeap or wpa2eap, and mode=dynamickeys.
eapmethods (array of eaptls, passthrough) :
eaptls Use builtin EAP TLS authentication. Both client and server certificates are supported. See description of tlsmode and tls
certificate properties.
passthrough Access point will relay authentication process to the RADIUS server. This value is ignored in station mode.
Order of values is significant for access point configuration, it is used by access point when offering specified methods to clients.
Example: Access point uses securityprofile where eapmethods=eaptls,passthrough:
Access point offers EAPTLS method to the client.
Client refuses.
Access point starts relaying EAP communication to the radius server.
supplicantidentity (text; default value is same as system/identity of router at the moment of profile creation) : EAP identity that is sent by client
at the beginning of EAP authentication. This value is used as a value for UserName attribute in RADIUS messages sent by RADIUS EAP
accounting and RADIUS EAP passthrough authentication.
tlsmode (one of verifycertificate, dontverifycertificate, nocertificates; default value: nocertificates) :
verifycertificate Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional
identity verification is done.
Note: Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject
valid certificate because router's clock is outside that period.
See also: certificate configuration.
dontverifycertificate Do not check certificate of the remote device. Access point will not require client to provide certificate.
nocertificates Do not use certificates. TLS session is established using 2048 bit anonymous DiffieHellman key exchange.
When using first two modes, remote device has to support one of the "RC4MD5", "RC4SHA" or "DESCBC3SHA" TLS cipher suites. In the
last mode remote device must support "ADHDESCBC3SHA" cipher suite.
This property has effect only when eapmethods contains eaptls.
tlscertificate (none or name of certificate; default value: none) : Access point always needs certificate when configured with tlsmode=verify
certificate, or tlsmode=dontverifycertificate. Client needs certificate only if access point is configured with tlsmode=verifycertificate. In this
case client needs valid certificate that is signed by CA known to the access point.
This property has effect only if tlsmode≠nocertificates.
This property has effect only when eapmethods contains eaptls.
RADIUS properties
radiusmacauthentication (yes or no; default value: no) : This property affects the way how access point processes clients that are not found in
the accesslist.
no allow or reject client authentication based on the value of defaultauthentication property of the wireless interface.
yes Query RADIUS server using MAC address of client as user name. With this setting the value of defaultauthentication has no effect.
radiusmacaccounting (yes or no; default value: no) : (needs editing)
radiuseapaccounting (yes or no; default value: no) : (needs editing)
interimupdate (time interval; default value: 0) : When RADIUS accounting is used, access point periodically sends accounting information
updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using AcctInterim
Interval attribute.
radiusmacformat (one of XX:XX:XX:XX:XX:XX, XXXX:XXXX:XXXX, XXXXXX:XXXXXX, XXXXXXXXXXXX, XXXXXXXXXXXX,
XXXXXXXXXXXX, XX XX XX XX XX XX; default value: XX:XX:XX:XX:XX:XX) : Controls how MAC address of the client is encoded by access
point in the UserName attribute of the MAC authentication and MAC accounting RADIUS requests.
radiusmacmode (one of asusername, asusernameandpassword; default value: asusername) : By default access point uses empty password,
when sending AccessRequest during MAC authentication. When this property is set to asusernameandpassword, access point will use the
same value for UserPassword attribute as for the UserName attribute.
radiusmaccaching (either disabled or time interval; default value: disabled) : If this value is set to time interval, the access point will cache
RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value
disabled will disable cache, access point will always contact RADIUS server.
WEP properties
These properties have effect only when mode is statickeysrequired or statickeysoptional. See section "Wireless#Statically_configured_WEP_keys".
statickey0, statickey1, statickey2, statickey3 (hexadecimal representation of the key. Length of key must be appropriate for selected
algorithm see section "Statically configured WEP keys; default value is empty) : (needs editing)
staticalgo0, staticalgo1, staticalgo2, staticalgo3 (one of none, 40bitwep, 104bitwep, tkip or aesccm; default value: none) : Encryption
algorithm to use with the corresponding key.
statictransmitkey (one of key0, key1, key2 or key3; default value: key0) : Access point will use the specified key to encrypt frames for
clients that do not use private key. Access point will also use this key to encrypt broadcast and multicast frames.
Client will use the specified key to encrypt frames if staticstaprivatealgo=none.
If corresponding staticalgo property has value none, frame will be sent unencrypted (when mode=statickeysoptional) or will not be sent at all
(when mode=statickeysrequired).
staticstaprivatekey (hexadecimal representation of the key. Length of key must be appropriate for selected algorithm see section "Statically
configured WEP keys") : This property is used only in station mode. Access point uses corresponding key either from privatekey property of
accesslist, or from MikrotikWirelessEncKey attribute in RADIUS AccessAccept MAC authentication response.
staticstaprivatealgo (one of none, 40bitwep, 104bitwep, tkip or aesccm) : Encryption algorithm to use with station private key. Value none
disables use of the private key.
This property is used only in station mode. Access point has to get corresponding value either from privatealgo property of accesslist, or from
MikrotikWirelessEncAlgo attribute in RADIUS AccessAccept MAC authentication response.
Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
Management frame protection
Used for: Deauthentication attack prevention, MAC address cloning issue.
RouterOS implements proprietary management frame protection algorithm based on shared secret. Management frame protection means that RouterOS
wireless device is able to verify source of management frame and confirm that particular frame is not malicious. This feature allows to withstand
deauthentication and disassociation attacks on RouterOS based wireless devices.
Management protection mode is configured in securityprofile with managementprotection setting. Possible values are: disabled management
protection is disabled (default), allowed use management protection if supported by remote party (for AP allow both, nonmanagement protection
and management protection clients, for client connect both to APs with and without management protection), required establish association only
with remote devices that support management protection (for AP accept only clients that support management protection, for client connect only to
APs that support management protection).
Management protection shared secret is configured with securityprofile managementprotectionkey setting.
When interface is in AP mode, default management protection key (configured in securityprofile) can be overridded by key specified in accesslist or
RADIUS attribute.
[admin@mikrotik] /interface wireless security‐profiles> print
0 name="default" mode=none authentication‐types="" unicast‐ciphers=""
group‐ciphers="" wpa‐pre‐shared‐key="" wpa2‐pre‐shared‐key=""
supplicant‐identity="n‐str‐p46" eap‐methods=passthrough
tls‐mode=no‐certificates tls‐certificate=none static‐algo‐0=none
static‐key‐0="" static‐algo‐1=none static‐key‐1="" static‐algo‐2=none
static‐key‐2="" static‐algo‐3=none static‐key‐3=""
static‐transmit‐key=key‐0 static‐sta‐private‐algo=none
static‐sta‐private‐key="" radius‐mac‐authentication=no
radius‐mac‐accounting=no radius‐eap‐accounting=no interim‐update=0s
radius‐mac‐format=XX:XX:XX:XX:XX:XX radius‐mac‐mode=as‐username
radius‐mac‐caching=disabled group‐key‐update=5m
management‐protection=disabled management‐protection‐key=""
[admin@mikrotik] /interface wireless security‐profiles> set default management‐protection=
allowed disabled required
Operation details
RADIUS MAC authentication
Note: RAIDUS MAC authentication is used by access point for clients that are not found in the accesslist, similarly to the defaultauthentication
property of the wireless interface. It controls whether client is allowed to proceed with authentication, or is rejected immediately.
When radiusmacauthentication=yes, access point queries RADIUS server by sending AccessRequest with the following attributes:
UserName Client MAC address. This is encoded as specified by the radiusmacformat setting. Default encoding is
"XX:XX:XX:XX:XX:XX".
NasPortId name of wireless interface.
UserPassword When radiusmacmode=asusernameandpassword this is set to the same value as UserName. Otherwise this attribute is
empty.
CallingStationId Client MAC address, encoded as "XXXXXXXXXXXX".
CalledStationId MAC address and SSID of the access point, encoded as "XXXXXXXXXXXX:SSID" (minus separated pairs of MAC
address digits, followed by colon, followed by SSID value).
AcctSessionId Added when radiusmacaccounting=yes.
When access point receives AccessAccept or AccessReject response from the RADIUS server, it stores the response and either allows or rejects client.
Access point uses following RADIUS attributes from the AccessAccept response:
AscendDataRate
AscendXmitRate
MikrotikWirelessForward Same as accesslist forwarding.
MikrotikWirelessEncAlgo Same as accesslist privatealgo.
MikrotikWirelessEncKey Same as accesslist privatekey.
MikrotikWirelessPsk Same as accesslist privatepresharedkey.
MikrotikWirelessMpkey Same as Managementprotectionkey in Access list
SessionTimeout Time, after which client will be disconnected.
AcctInterimInterval Overrides value of interimupdate.
Class If present, value of this attribute is saved and included in AccountingRequest messages.
Caching
Caching of RADIUS MAC authentication was added to support RADIUS authentication for clients that require from the access point very quick
response to the association request. Such clients time out before response from RADIUS server is received. Access point caches authentication response
for some time and can immediately reply to the repeated association request from the same client.
RADIUS EAP passthrough authentication
When using WPA EAP authentication type, clients that have passed MAC authentication are required to perform EAP authentication before being
authorized to pass data on wireless network. With passthrough EAP method the access point will relay authentication to RADIUS server, and use
following attributes in the AccessRequest RADIUS message:
UserName EAP supplicant identity. This value is configured in the supplicantidentity property of the client security profile.
NasPortId name of wireless interface.
CallingStationId Client MAC address, encoded as "XXXXXXXXXXXX".
CalledStationId MAC address and SSID of the access point, encoded as "XXXXXXXXXXXX:SSID" (pairs of MAC address digits
separated by minus sign, followed by colon, followed by SSID value).
AcctSessionId Added when radiuseapaccounting=yes.
AcctMultiSessionId MAC address of access point and client, and unique 8 byte value, that is shared for all accounting sessions that share
single EAP authentication. Encoded as AAAAAAAAAAAACCCCCCCCCCCCXXXXXXXXXXXXXXXX.
Added when radiuseapaccounting=yes.
Access point uses following RADIUS attributes from the AccessAccept server response:
Class If present, value of this attribute is saved and included in AccountingRequest messages.
SessionTimeout Time, after which client will be disconnected. Additionally, access point will remember authentication result, and if during this
time client reconnects, it will be authorized immediately, without repeating EAP authentication.
AcctInterimInterval Overrides value of interimupdate.
Statically configured WEP keys
Different algorithms require different length of keys:
40bitwep 10 hexadecimal digits (40 bits). If key is longer, only first 40 bits are used.
104bitwep 26 hexadecimal digits (104 bits). If key is longer, only first 104 bits are used.
tkip At least 64 hexadecimal digits (256 bits).
aesccm At least 32 hexadecimal digits (128 bits).
Key must contain even number of hexadecimal digits.
WDS security configuration
WDS links can use all available security features. However, they require careful configuration of security parameters.
It is possible to use one security profile for all clients, and different security profiles for WDS links. Security profile for WDS link is specified in
connectlist. Access point always checks connect list before establishing WDS link with another access point, and used security settings from matching
connect list entry. WDS link will work when each access point will have connect list entry that matches the other device, has connect=yes and specifies
compatible securityprofile.
WDS and WPA/WPA2
If access point uses security profile with mode=dynamickeys, then encryption will be used for all WDS links. Since WPA authentication and key
exchange is not symmetrical, one of the access points will act as a client for the purpose of establishing secure connection. This is similar to how static
mesh and dynamicmesh WDS modes work. Some problems, like single sided WDS link between two incorrectly configured access points that use non
mesh mode, is not possible if WPA encryption is enabled. However, nonmesh modes with WPA still have other issues (like constant reconnection
attempts in case of configuration mismatch) that are solved by use of the mesh WDS modes.
In general, WPA properties on both access points that establish WPA protected WDS link have to match. These properties are authenticationtypes,
unicastciphers, groupciphers. For nonmesh WDS mode these properties need to have the same values on both devices. In mesh WDS mode each
access point has to support the other one as a client.
Theoretically it is possible to use RADIUS MAC authentication and other RADIUS services with WDS links. However, only one access point will
interact with the RADIUS server, the other access point will behave as a client.
Implementation of eaptls EAP method in RouterOS is particularly well suited for WDS link encryption. tlsmode=nocertificates requires no additional
configuration, and provides very strong encryption.
WDS and WEP
mode, staticstaprivatekey and staticstaprivatealgo parameters in the security profile assigned to the WDS link need to have the same values on
both access points that establish WDS link with WPA encryption.
Security profile and access point matching in the connect list
Client uses value of connectlist securityprofile property to match only those access points that support necessary security.
mode=statickeysrequired and mode=statickeysoptional matches only access points with the same mode in interface securityprofile.
If mode=dynamickeys, then connect list entry matches if all of the authenticationtypes, unicastciphers and groupciphers contain at least one
value that is advertised by access point.
Virtual interfaces
VirtualAP
It is possible to create virtual access points using the add command in the wireless menu. You must specify the masterinterface which the virtual
interface will belong to. The VirtualAP will inherit the mode of the master, but can have it's own SSID and Security Profile. Virtual AP interface will
only work if master interface is in apbridge, bridge or wdsslave mode. It works only with 802.11 protocol, Nv2 is not supported.
This feature is useful for separating access for different types of users. You can assign different bandwidth levels and passwords and instruct users to
connect to the specific virtual network, it will appear to wireless clients as a different SSID or a different device. For example, when using QuickSet to
configure a guest network, the VirtualAP feature is used in the background.
To create a new virtualap: /interface> wireless add mode=ap‐bridge master‐interface=wlan1 ssid=guests security‐profile=guests (such security profile first
needs to be created)
Note: you can create up to 127 virtual interfaces per physical interface. It is not recommended to create more 30, since the performance will start to
degrade.
Virtual Clients
Note: Starting from 6.35 only in wirelessrep or wirelesscm2 package
It is also possible to create virtual clients and have both an AP and a Client on the same physical interface. This allows to make a repeater setup with
only using one hardware card. The process of configuration is exacly the same as above, but use mode station:
To create a new virtualclient: /interface> wireless add mode=station master‐interface=wlan1 ssid=where‐to‐connect security‐profile=your‐profile (such
security profile first needs to be created)
Note: Virtual interfaces will always use the Master interface wireless frequency. If the Master interface has 'auto' frequency enabled it will use the
wireless frequency that the Master interface selected.
Sniffer
Submenu: /interface wireless sniffer
Wireless sniffer allows to capture frames including Radio header, 802.11 header and other wireless related information.
Property Description
channel‐time (; Default: 200ms)
file‐limit (integer [10..4294967295]; Default: 10) Allocated file size in bytes which will be used to store captured data. Applicable if file
name is specified.
file‐name (string; Default: ) Name of the file where to store captured data.
memory‐limit (integer [10..4294967295]; Default: 10) Allocated memory buffer in bytes used to store captured data.
multiple‐channels (yes | no; Default: no)
only‐headers (yes | no; Default: no) If set to yes, then sniffer will capture only information stored in frame headers.
receive‐errors (yes | no; Default: no)
streaming‐enabled (yes | no; Default: no) Whether to stream captured data to specified streaming server
streaming‐max‐rate (integer [0..4294967295]; Default: 0)
streaming‐server (IPv4; Default: 0.0.0.0) IP address of the streaming server.
Packets
Submenu: /interface wireless sniffer packet
Submenu shows captured packets.
Scan
Scan command allows to see available AP in the frequency range defined in the scanlist. Using scan command the interface operation is disabled
(wireless link is disconnected during the scan operation) Since RouterOS v6.35 (wirelessrep) background scan is supported which can be used during
the wireless interface operation without disconnecting the wireless link. Background scan is supported only using 802.11 wireless protocol.
Scan tool will continue scanning for AP until user stops the scan process. It is possible to use 'rounds' setting for the scan tool to do scan through the
scanlist entries specific times. It is useful when running scan tool using scripts. Example of scan command for one round:
/interface wireless scan wlan1 rounds=1
'savefile' option allows to do scripted/scheduled scans and save the results in file for future analysis. Also this feature together with rounds setting
allows to get scan results from the remote wireless clients executing that command will start the scan tool which disconnect the wireless link, does the
scan through the scanlist frequencies and saves the results to file, exits the scan and connects the wireless link back. Example:
/interface wireless scan wlan1 rounds=1 save‐file=scan1
To use background wireless scan the 'background=yes' setting should be provided. Example:
/interface wireless scan wlan1 background=yes
Background scan feature is working in such conditions:
Wireless interface should be enabled
For wireless interface in AP mode when it is operating in 802.11 protocol mode and is on fixed channel (that is channel selection and initial
radar checking is over)
For wireless interface in Station mode when it is connected to 802.11 protocol AP.
Scan command is supported also on the Virtual wireless interfaces with such limitations:
It is possible when virtual interface and its master is fixed on channel (master AP is running or master station is connected to AP).
Scan is only performed in channel master interface is on.
It does not matter if background=yes|no on virtual interface scan does not disconnect clients/AP, so it is always "background".
Snooper
This tool monitors surrounding frequency usage, and displays which devices occupy each frequency. It's available both in console, and also in Winbox.
Submenu: /interface wireless snooper
Settings
Spectral scan
See separate document Manual:Spectral_scan
WDS
Submenu: /interface wireless wds
Properties:
Property Description
arp (disabled | enabled | proxyarp | replyonly; Default:
enabled)
comment (string; Default: )
disable‐running‐check (yes | no; Default: no)
disabled (yes | no; Default: yes)
l2mtu (integer [0..65536]; Default: )
master‐interface (string; Default: )
mtu (integer [0..65536]; Default: 1500)
name (string; Default: )
wds‐address (MAC; Default: 00:00:00:00:00:00)
Readonly properties:
Property Description
dynamic (yes | no)
mac‐address (MAC)
running (yes | no)
WPS
Wireless interface supports WPS Server and also WPS Client (supported by wirelessrep package starting from RouterOS v6.35).
WPS Server
WPS Server allows to connect wireless clients that support WPS to AP protected with the PreShared Key without specifying that key in the clients
configuration.
WPS Server can be enabled by changing the WPS Mode setting for the wireless interface. Example:
/interface wireless set wlan1 wps‐mode=push‐button
Wpsmode has 3 options
disabled
pushbutton WPS is activated by pushing physical button on the board (few boards has such button marked on the board case/label)
pushbuttonvirtualonly WPS is activated by pushing "WPS Accept" button from the RouterOS wireless interface menu
By pushing the WPS physical/virtual button the AP enables the WPS functionality. If within 2 minutes the WPS process isn't initiated the WPS Accept
Function is stopped.
WPS Server is enabled by default on few boards that has physical WPS button marked. For example, hap lite, hap, hap ac lite, hap ac, map lite
WPS Server is active only when wireless AP interface has PreShared Key Authentication (PSK) enabled. It is possible to configure this mode for the
Virtual AP interfaces as well.
WPS Client
WPS Client function allows the wireless client to get the PreShared Key configuration of the AP that has WPS Server enabled. WPS Client can be
enabled by such command:
/interface wireless wps‐client wlan1
WPS Client command outputs all the information of the WPS Enabled AP on the screen. Example:
[admin@MikroTik] /interface wireless> wps‐client wlan1
status: disconnected, success
ssid: MikroTik
mac‐address: E4:8D:8C:D6:E0:AC
passphrase: presharedkey
authentication: wpa2‐psk
encryption: aes‐ccm
It is possible to specify additional settings for the WPSClient command:
createprofile creates wireless security profile with the specified name, configures it with security details received from the WPS AP, specifies
the wireless interface to use the new created security profile
ssid get WPS information only from AP with specified SSID
macaddress get WPS information only from AP with specified macaddress
Repeater
Wireless repeater will allow to receive the signal from the AP and repeat the signal using the same physical interface locally for connecting other clients.
This will allow to extend the wireless service for the wireless clients. Wireless repeater function will configure the wireless interface to connect to the
AP with stationbridge or stationpseudobridge option, create a virtual AP interface, create a bridge interface and add both (main and the virtual)
interfaces to the bridge ports.
If your AP supports buttonenabled WPS mode, you can use the automatic setup command:
/interface wireless setup‐repeater wlan1
The setuprepeater does the following steps:
searches for WPS AP with button pushed
acquires SSID, key, channel from AP
resets main master interface config (same as resetconfiguration)
removes all bridge ports that were added for virtual interfaces added to this master (so there are no dangling invalid bridge ports later)
removes all virtual interfaces added to this master
creates security profile with name "<interfacename><ssid>repeater", if such security profile already exists does not create new, just updates
settings
configures master interface, interface mode is selected like this: if AP supports bridge mode, use stationbridge, else if AP supports WDS, use
stationwds, else use stationpseudobridge
creates virtual AP interface with same SSID and security profile as master
if master interface is not in some bridge, creates new bridge interface and adds master interface to it
adds virtual AP interface to the same bridge master interface is in.
If your AP does not support WPS, it is possible to specify the settings manually, using these parameters:
address MAC address of AP to setup repeater for (optional)
ssid SSID of AP to setup repeater for (optional)
passphrase key to use for AP if this IS specified, command will just scan for AP and create security profile based on info in beacon and with
this passphrase. If this IS NOT specified, command will do WPS to find out passphrase.
The same options are available in the GUI:
Roaming
Station Roaming
Station Roaming feature is available only for 802.11 wireless protocol and only for station modes. When RouterOS wireless client is connected to the
AP using 802.11 wireless protocol it will periodically perform the background scan with specific time intervals. When the background scan will find an
AP with better signal it will try to roam to that AP. The time intervals between the background scans will become shorter when the wireless signal
becomes worse and the background scan interval will become longer when the wireless client signal will get better.
VLAN tagging
Submenu: /interface wireless
With VLAN tagging it is possible to separate Virtual AP traffic on Ethernet side of "locally forwarding" AP (the one on which wireless interfaces are
bridged with Ethernet). This is necessary to separate e.g. "management" and "guest" network traffic of Ethernet side of APs.
VLAN is assigned for wireless interface and as a result all data coming from wireless gets tagged with this tag and only data with this tag will send out
over wireless. This works for all wireless protocols except that on Nv2 there's no Virtual AP support.
You can configure your RADIUS authentication server to assign users or groups of users to a specific VLAN when they authenticate to the network. To
use this option you will need to use RADIUS attributes.
Note: In case to use this option you must enable wirelessfp or wirelesscm2 package for RouterOS version up to 6.37. Starting from RouterOS v6.37
you can do that with regular wireless package.
Property Description
vlan‐mode (no tag | user service tag | use tag; Default: no Three VLAN modes are available:
tag)
notag AP don't use VLAN tagging
useservicetag VLAN ID use 802.1ad tag type
usetag VLAN ID use 802.1q tag type
vlan‐id (integer [1..4095]; Default: 1) VLAN identification number
Vlan tag override
Perinterface VLAN tag can be overridden on perclient basis by means of accesslist and RADIUS attributes (for both regular wireless and wireless
controller).
This way traffic can be separated between wireless clients even on the same interface, but must be used with care only "interface VLAN"
broadcast/multicast traffic will be sent out. If working broadcast/multicast is necessary for other (overridden) VLANs as well, multicasthelper can be
used for now (this changes every multicast packet to unicast and then it is only sent to clients with matching VLAN ids).
[ Top | Back to Content ]
Winbox
Winbox is a small utility that allows administration of Mikrotik RouterOS using a fast and simple GUI.
Note: Current Tx Power gives you information about transmit power currently used at specific data rate. Currently Not supported for AC chipsets.
Retrieved from "https://wiki.mikrotik.com/index.php?title=Manual:Interface/Wireless&oldid=29263"
This page was last modified on 8 May 2017, at 16:23.
This page has been accessed 1,073,338 times.