Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

3. Assign the configuration to your master profile (or directly to CAP itself)

Code Block
languageros
/caps-man security add authentication-types=wpa2-eap eap-methods=passthrough encryption=aes-ccm group-encryption=aes-ccm name=radius
/radius add address=x.x.x.x secret=SecretUserPass service=wireless
/caps-man configuration set security=radius


Radius authentication with different radius servers for each SSID

...

4. Assign the configuration to your master profile (or directly to CAP itself)

Code Block
languageros
/caps-man security add authentication-types=wpa2-eap eap-methods=passthrough encryption=aes-ccm group-encryption=aes-ccm name=radius 
/caps-man aaa set called-format=ssid 
/radius add address=x.x.x.x secret=SecretUserPass service=wireless called-id=SSID1 
/radius add address=y.y.y.y secret=SecretUserPass service=wireless called-id=SSID2 
/caps-man configuration set security=radius

...


Now everyone connecting to CAP's with ssid=SSID1 will have their radius authentication requests sent to x.x.x.x and everyone connecting to CAP's with ssid=SSID2 will have their radius authentication requests sent to y.y.y.y

...

CAPsMAN interfaces are managed in /caps-man interface menu:

Code Block
languageros
[admin@CM] > /caps-man interface print

...

 

...


Flags: M - master, D - dynamic, B - bound, X - disabled, I - inactive, R - running 

...

#

...

 NAME RADIO-MAC MASTER-INTERFACE 
0 M BR cap2 00:0C:42:1B:4E:F5 none 
1 B cap3 

...

00:00:00:00:00:00 cap2


//caps-man manager

PropertyDescription
enabled (yes | no; Default: no)Disable or enable CAPsMAN functionality
certificate (auto | certificate name | none; Default: none)Device certificate
ca-certificate (auto | certificate name | none; Default: none)Device CA certificate
require-peer-certificate (yes | no; Default: no)Require all connecting CAPs to have a valid certificate
package-path (string |; Default: )Folder location for the RouterOS packages. For example, use "/upgrade" to specify the upgrade folder from the files section. If empty string is set, CAPsMAN can use built-in RouterOS packages, note that in this case only CAPs with the same architecture as CAPsMAN will be upgraded.
upgrade-policy (none | require-same-version | suggest-same-upgrade; Default: none)Upgrade policy options
  • none - do not perform upgrade
  • require-same-version - CAPsMAN suggest to upgrade the CAP RouterOS version and if it fails it will not provision the CAP. (Manual provision is still possible)
  • suggest-same-version - CAPsMAN suggests to upgrade the CAP RouterOS version and if it fails it will still be provisioned

...

When the DTLS connection with CAP is successfully established (which means that CAP identifier is known and valid), CAPsMAN makes sure there is no stale connection with CAP using the same identifier. Currently connected CAPs are listed in /caps-man remote-cap menu:

...

Code Block
languageros
[admin@CM] /caps-man> remote-cap print 
# ADDRESS IDENT STATE RADIOS 0 00:0C:42:00:C0:

...

32/27044 MT-000C4200C032 Run 1


CAPsMAN distinguishes between actual wireless interfaces (radios) based on their builtin MAC address (radio-mac). This implies that it is impossible to manage two radios with the same MAC address on one CAPsMAN. Radios currently managed by CAPsMAN (provided by connected CAPs) are listed in /caps-man radio menu:

...

caps-man radio menu:

Code Block
languageros
[admin@CM] /caps-man> radio print 
Flags: L - local, P - provisioned 
# RADIO-MAC INTERFACE REMOTE-AP-IDENT 
0 P 00:03:7F:48:CC:07 cap1 MT-000C4200C032


When CAP connects, CAPsMAN at first tries to bind each CAP radio to CAPsMAN master interface based on radio-mac. If an appropriate interface is found, radio gets set up using master interface configuration and configuration of slave interfaces that refer to particular master interface. At this moment interfaces (both master and slaves) are considered bound to radio and radio is considered provisioned.

...

To get the active provisioning matchers:

Code Block
languageros
[admin@CM] /caps-man provisioning> print 
Flags: X - disabled 

...

0

...

 radio-mac=00:00:00:00:00:00 action=create-enabled master-configuration=main-cfg 

...

slave-configurations=virtual-ap-cfg name-prefix=""

...


For user's convenience there are commands that allow the re-execution of the provisioning process for some radio or all radios provided by some AP:

Code Block
languageros
[admin@CM] > caps-man radio provision 0

and

Code Block
languageros
[admin@CM] > caps-man remote-cap provision 0


/caps-man radio

see /caps-man provisioning

...

Registration table contains a list of clients that are connected to radios controlled by CAPsMAN and is available in /caps-man registration-table menu:


Code Block
languageros
[admin@CM] /caps-man> registration-table

...

 print
# INTERFACE MAC-ADDRESS UPTIME RX-SIGNAL

...

0 cap1 

...

00:03:7F:48:CC:0B 1h38m9s210ms

...

 -36


/caps-man remote-cap

see /caps-man provisioning

/caps-man security

Example

Assuming that rest of the settings are already configured and only the "Security" part have been left.

Radius authentication with one server

1. Create CAPsMAN security configuration

2. Configure Radius server client

3. Assign the configuration to your master profile (or directly to CAP itself)

Code Block
languageros
/caps-man security add authentication-types=wpa2-eap eap-methods=passthrough encryption=aes-ccm group-encryption=aes-ccm name=radius 
/radius add address=x.x.x.x secret=SecretUserPass service=wireless 
/caps-man configuration set security=radius

...



Radius authentication with different radius servers for each SSID

1. Create CAPsMAN security configuration

2. Configure AAA settings

3. Configure Radius server clients

4. Assign the configuration to your master profile (or directly to CAP itself)

Code Block
languageros
/caps-man security add authentication-types=wpa2-eap eap-methods=passthrough encryption=aes-ccm group-encryption=aes-ccm name=radius 
/caps-man aaa set called-format=ssid 
/radius add address=x.x.x.x secret=SecretUserPass service=wireless called-id=SSID1 
/radius add address=y.y.y.y secret=SecretUserPass service=wireless called-id=SSID2 
/caps-man configuration set security=radius

...


Now everyone connecting to CAP's with ssid=SSID1 will have their radius authentication requests sent to x.x.x.x and everyone connecting to CAP's with ssid=SSID2 will have their radius authentication requests sent to y.y.y.y