[admin@MikroTik] > interface/wifi/print detail
Flags: M - master; D - dynamic; B - bound; X - disabled, I - inactive, R - running
0 BR name="WiFi_2-Devices" l2mtu=1560 mac-address=4A:A9:8A:69:D2:AF arp-timeout=auto master-interface=WiFi_2-Main
configuration.mode=ap .ssid="WiFi-2 - Devices"
security.authentication-types=wpa2-psk .passphrase="xxxyyyzzz"
datapath.bridge=Bridge-Device .client-isolation=yes
1 BR name="WiFi_2-IoT" l2mtu=1560 mac-address=4A:A9:8A:69:D2:AE arp-timeout=auto master-interface=WiFi_2-Main
configuration.mode=ap .ssid="WiFi-2 - IoT"
security.authentication-types=wpa2-psk .passphrase="xxxyyyzzz"
datapath.client-isolation=yes
2 M B default-name="wifi2" name="WiFi_2-Main" l2mtu=1560 mac-address=48:A9:8A:69:D2:AE arp-timeout=auto radio-mac=48:A9:8A:69:D2:AE
configuration=PippoNet-conf
configuration.mode=ap .ssid="WiFi-2" .country=Italy
security.authentication-types=wpa2-psk,wpa3-psk .passphrase="xxxyyyzzz"
datapath.bridge=Bridge-LAN
channel=ch-2ghz
channel.frequency=2412,2437 .width=20mhz
3 M BR default-name="wifi1" name="WiFi_5-Main" l2mtu=1560 mac-address=48:A9:8A:69:D2:AD arp-timeout=auto radio-mac=48:A9:8A:69:D2:AD
configuration=PippoNet-conf
configuration.mode=ap .ssid="WiFi-5" .country=Italy
security.authentication-types=wpa2-psk,wpa3-psk .passphrase="xxxyyyzzz"
datapath.bridge=Bridge-LAN
channel=ch-5ghz
channel.frequency=5180 .width=20/40/80mhz
16:27:37 echo: wireless,info 78:BD:BC:DD:00:31@WiFi_2-IoT disconnected, connection lost, signal strength -76
16:27:37 echo: wireless,debug 78:BD:BC:DD:00:31@WiFi_2-IoT disassociated, connection lost, signal strength -76
16:28:35 echo: wireless,debug 78:BD:BC:DD:00:31@WiFi_2-IoT associated, signal strength -75
16:28:35 echo: wireless,info 78:BD:BC:DD:00:31@WiFi_2-IoT connected, signal strength -75
16:30:19 echo: wireless,info 78:BD:BC:DD:00:31@WiFi_2-IoT disconnected, connection lost, signal strength -76
16:30:19 echo: wireless,debug 78:BD:BC:DD:00:31@WiFi_2-IoT disassociated, connection lost, signal strength -76
/interface/wifi/export
# 2024-04-24 17:29:26 by RouterOS 7.15rc1
# software id = IQJT-ARXV
#
# model = C52iG-5HaxD2HaxD
# serial number = HE608P3JDNE
/interface wifi channel
add disabled=no frequency=2412 name=ch-2ghz width=20mhz
add disabled=no frequency=5180 name=ch-5ghz width=20/40/80mhz
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=Main-auth
/interface wifi
add configuration.mode=ap .ssid="PippoNet - Devices" datapath.bridge=Bridge-Device .client-isolation=yes disabled=no mac-address=\
4A:A9:8A:69:D2:AF master-interface=WiFi_2-Main name=WiFi_2-Devices security.authentication-types=wpa2-psk
add configuration.mode=ap .ssid="PippoNet - IoT" datapath.client-isolation=yes disabled=no mac-address=4A:A9:8A:69:D2:AE \
master-interface=WiFi_2-Main name=WiFi_2-IoT security.authentication-types=wpa2-psk
set [ find default-name=wifi2 ] channel=ch-2ghz channel.frequency=2412,2437 configuration=PippoNet-conf configuration.mode=ap \
datapath.bridge=Bridge-LAN disabled=no name=WiFi_2-Main
set [ find default-name=wifi1 ] channel=ch-5ghz configuration=PippoNet-conf configuration.country=Italy .mode=ap datapath.bridge=\
Bridge-LAN disabled=no name=WiFi_5-Main
/interface wifi configuration
add country=Italy datapath.bridge=Bridge-LAN disabled=no name=PippoNet-conf security=Main-auth ssid=PippoNet
/interface wifi
add configuration.mode=ap .ssid="PippoNet - Devices" datapath.bridge=Bridge-Device .client-isolation=yes disabled=no mac-address=\
4A:A9:8A:69:D2:AF master-interface=WiFi_2-Main name=WiFi_2-Devices security.authentication-types=wpa2-psk
add configuration.mode=ap .ssid="PippoNet - IoT" datapath.client-isolation=yes disabled=no mac-address=4A:A9:8A:69:D2:AE \
master-interface=WiFi_2-Main name=WiFi_2-IoT security.authentication-types=wpa2-psk
set [ find default-name=wifi1 ] channel=ch-5ghz configuration=PippoNet-conf configuration.country=Italy .mode=ap datapath.bridge=\
Bridge-LAN disabled=no name=WiFi_5-Main
It should be "configuration.ssid" and "datapath.client-isolation=yes" instead.
/interface/wifi/set .ssid="foobar"
/interface/wifi/set configuration.mode=ap .ssid="foobar"
You are (obviously) absolutely right. Was expecting other kind of log entries.Post viewtopic.php?p=1071902#p1071489 already reports an extract of the debugging log, doesn't it?
wireless,debug B0:3C:DC:E1:66:67@WiFi_2-Main reauthenticating
wireless,info B0:3C:DC:E1:66:67@WiFi_2-Main disconnected, SA Query timeout, signal strength -67
wireless,debug B0:3C:DC:E1:66:67@WiFi_2-Main disassociated, SA Query timeout, signal strength -67
wireless,debug B0:3C:DC:E1:66:67@WiFi_2-Main associated, signal strength -66
wireless,info B0:3C:DC:E1:66:67@WiFi_2-Main connected, signal strength -65
wireless,debug 00:BB:3A:E7:7E:8A@WiFi_2-Devices associated, signal strength -64
# Restart private-5g wi-fi interface if not on channel 5500.
:local interface [/interface/wifi/monitor private-5g as-value once];
:local currentchannel ($interface->"channel");
:if ($currentchannel != "5500/ax/Ceee") do={
:log warning "Wi-Fi channel is $currentchannel, restarting interface"
/interface/wifi/disable private-5g
/interface/wifi/enable private-5g
} else={
:put "Nothing to do, channel is 5500"
}
This was the other suggestion made that I've not tried yet.has anyone tried to set "disabled" for management protection?
No, that would be a flaw. You certainly have a reason to restrict the frequency to a single one. If you want a "fallback", you need to configure at least a second frequency.IMO this is a flaw - if a single frequency is specified and it can't be used due to radar event, it should resort to auto mode and pick at least a working frequency
This is the real issue. ROS simply does not re-check the channel. And that's why it stays down forever. It should do a 1min CAC check after a 30min silence and get the damn interface up und running again.It should also retry the original frequency 30 minutes later as per the DFS standard and switch back to it.
I might agree with this but as you say, the flaw is that it never tries CAC again after 30 minutes. If you had 5500, 5180 programmed in there and a radar event occurs on 5500, sure fail back to 5180 but then go back to 5500 after 30 mins if the CAC passes.No, that would be a flaw. You certainly have a reason to restrict the frequency to a single one. If you want a "fallback", you need to configure at least a second frequency.
Or does the AP that is controlled by capsman do the check.
Ok thanks. Must have been pure coincidence then.Or does the AP that is controlled by capsman do the check.
Radar checks are always done by device which does Tx/Rx ... which means AP.
Yes this!Maybe not because whilst the access point carries out the physical radar check, it could be CAPsMAN that decides what to do with event and which frequency to move to?
My reasoning here is that CAPsMAN holds the configuration data on frequency, not the access point?
When I talk about radar events, I mean events that occur long after the access point first starts up, not the initial CAC check.
I have an ax3 with capsman along with an ax2 AP and from time to time I get a radar eventMaybe not coincidence because whilst the access point carries out the physical radar check, it could be CAPsMAN that decides what to do with the radar event and which frequency to move to?
My reasoning here is that CAPsMAN holds the configuration data on frequency, not the access point?
When I talk about radar events, I mean events that occur long after the access point first starts up, not the initial CAC check. They show up in the logs. In nearly all my tests, I've never seen the CAC check fail at initial start-up. In fact, in a very interference heavy site running cAP ac, I've never seen a radar event and that's a CAPsMAN controlled setup. I've only ever seen it at home on my standalone hAP ax2 where there are surrounding neighbour access points but I really do doubt "real" radar.
So it's entirely possible that the code run through when a radar event occurs is different between a standalone and CAPsMAN controlled device. If the code path is different, a different outcome is entirely possible.
*) wifi - added "reselect-interval" support;
*) wifi - improve channel selection after radar detection events;
*) wifi - improved stability of DFS check in the 5GHz-A band;
Maybe not coincidence because whilst the access point carries out the physical radar check, it could be CAPsMAN that decides what to do with the radar event and which frequency to move to?
My reasoning here is that CAPsMAN holds the configuration data on frequency, not the access point?
Indeed and that's why I'd love for the engineers to engage in some of these "chewing the fat" discussions. Sure, I know they're busy, busy, busy but I feel it would help overall. Not in here though, too much noise So a separate discussion system. Happens a lot in Open Source development.This part is something only MT knows.
Before opening the discussion, I installed the new 7.15rc2 to verify if the changes included fixed something; no notable improvements.@robmaltsystems there are some changes in upcoming ROS 7.15 which maybe address some of your issues.
"improve" and "improve stability" is MikroTik jargon.Code: Select all*) wifi - added "reselect-interval" support; *) wifi - improve channel selection after radar detection events; *) wifi - improved stability of DFS check in the 5GHz-A band;
- "improve": we fixed one specific bug on mentioned topic.
- "improve stability": we fixed a crash of system/service/command/device triggered by specific actions/conditions