Table of Contents | ||
---|---|---|
|
Overview
This document applies to 7.12 and older. The WifiWave2 package contains software for managing compatible 802.11ax and 802.11ac wave 2 wireless interfaces. New versions use the new wifi package and corresponding manual.
Builds for x86, ppc, mmips and tile architectures contain the configuration utilities needed to centrally manage interfaces (as a CAPsMAN controller). Builds for arm and arm64 also contain interface drivers and firmware.
...
Configuration in the command line is done under /interface/wifiwave2/, when using a graphical configuration tool (WinBox or WebFig), wifiwave2 interfaces can be configured using either the 'Wireless' or 'QuickSet' tabs.
WifiWave2 Terminology
Before we move on let's familiarise ourselves with terms important for understanding the operation of the WifiWave2. These terms will be used throughout the article.
- Profile - refers to the configuration preset created under one of this WifiWave2 sub-menus: aaa, channel, security, datapath, or interworking.
- Configuration profile - configuration preset defined under /interface/wifiwave2/configuration, it can reference various profiles.
- Station - wireless client.
Basic Configuration:
Basic password-protected AP
...
Code Block | ||
---|---|---|
| ||
/interface/wifiwave2 reset wifi1 |
Configuration profiles
One of the new WifiWave2 additions is configuration profiles, you can create various presets, that can be assigned to interfaces as needed. Configuration settings for WifiWave2 are grouped in profiles according to the parameter sections found at end of this page - aaa, channel, configuration, datapath, interworking, and security, and can then be assigned to interfaces. Configuration profiles can include other profiles as well as separate parameters from other categories.
...
Code Block | ||||
---|---|---|---|---|
| ||||
# Creating a security profile, which will be common for both interfaces /interface wifiwave2 security add name=common-auth authentication-types=wpa2-psk,wpa3-psk passphrase="diceware makes good passwords" wps=disable # Creating a common configuration profile and linking the security profile to it /interface wifiwave2 configuration add name=common-conf ssid=MikroTik country=Latvia security=common-auth # Creating separate channel configurations for each band /interface wifiwave2 channel add name=ch-2ghz frequency=2412,2432,2472 width=20mhz add name=ch-5ghz frequency=5180,5260,5500 width=20/40/80mhz # Assigning to each interface the common profile as well as band-specific channel profile /interface wifiwave2 set wifi1 channel=ch-2ghz configuration=common-conf disabled=no set wifi2 channel=ch-5ghz configuration=common-conf disabled=no /interface/wifiwave2/actual-configuration print 0 name="wifi1" mac-address=74:4D:28:94:22:9A arp-timeout=auto radio-mac=74:4D:28:94:22:9A configuration.ssid="MikroTik" .country=Latvia security.authentication-types=wpa2-psk,wpa3-psk .passphrase="diceware makes good passwords" .wps=disable channel.frequency=2412,2432,2472 .width=20mhz 1 name="wifi2" mac-address=74:4D:28:94:22:9B arp-timeout=auto radio-mac=74:4D:28:94:22:9B configuration.ssid="MikroTik" .country=Latvia security.authentication-types=wpa2-psk,wpa3-psk .passphrase="diceware makes good passwords" .wps=disable channel.frequency=5180,5260,5500 .width=20/40/80mhz |
Access List
The access list provides multiple ways of filtering and managing wireless connections.
...
The access list has two kinds of parameters - WifiWave2 filtering, and WifiWave2 action. Filtering properties are only used for matching clients, to whom the access list rule should be applied to. Action parameters can change connection parameters for that specific client and potentially overriding its default connection parameters with ones specified in the access list rule.
MAC address authentication
Implemented through the query-radius action, MAC address authentication is a way to implement a centralized whitelist of client MAC addresses using a RADIUS server.
When a client device tries to associate with an AP, which is configured to perform MAC address authentication, the AP will send an access-request message to a RADIUS server with the device's MAC address as the user name and an empty password. If the RADIUS server answers with access-accept to such a request, the AP proceeds with whatever regular authentication procedure (passphrase or EAP authentication) is configured for the interface.
Access rule examples
Only accept connections to guest network from nearby devices during business hours
...
Code Block | ||
---|---|---|
| ||
/interface wifiwave2 access-list add action=accept disabled=no mac-address=22:F9:70:E5:D2:8E interface=wifi1 passphrase=StrongPassword |
Frequency scan
The '/interface/wifiwave2/frequency-scan wifi1' command provides information about RF conditions on available channels that can be obtained by running the frequency-scan command. Used to approximate the spectrum usage, it can be useful to find less crowded frequencies.
...
Info |
---|
Running a frequency scan will disconnect all connected clients, or if the interface is in station mode, it will disconnect from AP. |
Scan command
The '/interface wifiwave2 scan' command will scan for access points and print out information about any APs it detects. It doesn't show the frequency usage, per channel, but it will reveal all access points that are transmitting. You can use the "connect" button, to initiate a connection to a specific AP.
The scan command takes all the same parameters as the frequency-scan command.
Sniffer
The sniffer command enables monitor mode on a wireless interface. This turns the interface into a passive receiver for all WiFi transmissions.
The command continuously prints out information on received packets and can save them locally to a pcap file or stream them using the TZSP protocol.
The sniffer will operate on whichever channel is configured for the chosen interface.
WPS
WPS client
The wps-client command enables obtaining authentication information from a WPS-enabled AP.
Code Block | ||
---|---|---|
| ||
/interface/wifiwave2/wps-client wifi1 |
WPS server
An AP can be made to accept WPS authentication by a client device for 2 minutes by running the following command.
Code Block | ||
---|---|---|
| ||
/interface/wifiwave2 wps-push-button wifi1 |
Radios
Information about the capabilities of each radio can be gained by running the `/interface/wifiwave2/radio print detail` command. It can be useful to see what bands are supported by the interface and what channels can be selected. The country profile that is applied to the interface will influence the results.
...
If we take hAP ax2, as an example, we can see that number of chains is 2, and the max data rate is 1200 - 1201 in the MCS table. In the MCS table we need to find entry for 2 spatial streams - chains, and the respective data rate, which in this case shows us that 80MHz is the maximum supported channel width.
Registration table
'/interface/wifiwave2/registration-table/' displays a list of connected wireless clients and detailed information about them.
De-authentication
Wireless peers can be manually de-authenticated (forcing re-association) by removing them from the registration table.
Code Block | ||
---|---|---|
| ||
/interface/wifiwave2/registration-table remove [find where mac-address=02:01:02:03:04:05] |
WifiWave2 CAPsMAN
WifiWave2 CAPsMAN allows applying wireless settings to multiple MikroTik WifiWave2 AP devices from a central configuration interface.
...
Info |
---|
WifiWave2 CAPsMAN can only control WifiWave2 interfaces, and WifiWave2 CAPs can join only WifiWave2 CAPsMAN, similarly, regular CAPsMAN only supports non-WifiWave2 caps. |
CAPsMAN - CAP simple configuration example:
CAPsMAN in WifiWave2 uses the same menu as a regular WifiWave2 interface, meaning when you pass configuration to CAPs, you have to use the same configuration, security, channel configuration, etc. as you would for regular WifiWave2 interfaces.
...
Info |
---|
The interface that should act as CAP needs additional configuration under "interface/wifiwave2/set wifiX configuration.manager=" |
CAPsMAN - CAP VLAN configuration example:
In this example, we will assign VLAN20 to our main SSID, and will add VLAN30 for the guest network, ether5 from CAPsMAN is connected to CAP.
...
Code Block | ||
---|---|---|
| ||
/interface bridge add name=bridgeLocal /interface wifiwave2 datapath add bridge=bridgeLocal comment=defconf disabled=no name=capdp /interface wifiwave2 set [ find default-name=wifi1 ] configuration.manager=capsman datapath=capdp disabled=no set [ find default-name=wifi2 ] configuration.manager=capsman datapath=capdp disabled=no /interface bridge port add bridge=bridgeLocal comment=defconf interface=ether1 add bridge=bridgeLocal comment=defconf interface=ether2 add bridge=bridgeLocal comment=defconf interface=ether3 add bridge=bridgeLocal comment=defconf interface=ether4 add bridge=bridgeLocal comment=defconf interface=ether5 /interface wifiwave2 cap set discovery-interfaces=bridgeLocal enabled=yes slaves-datapath=capdp /ip dhcp-client add interface=bridgeLocal disabled=no |
Advanced examples
Replacing stock wireless
The wifiwave2 package can be installed on some products, which ship with the bundled 'wireless' package, replacing it.
Warning |
---|
Installing the wifiwave2 package disables other means of configuring wireless interfaces. Before installation, make sure to back up any wireless and regular CAPsMAN configuration you may want to retain. |
Compatibility
Due to storage, RAM, and architecture requirements, only the following products can replace their bundled wireless software package with wifiwave2:
...
It is also possible to install the WifiWave2 package on other devices to use WifiWave2 CAPsMAN: builds for x86, ppc, mmips and tile architectures contain the configuration utilities needed to centrally manage interfaces (as a CAPsMAN controller). Builds for arm and arm64 also contain interface drivers and firmware.
Benefits
- WPA3 authentication and OWE (opportunistic wireless encryption)
- 802.11w standard management frame protection
- 802.11r/k/v
- MU-MIMO and beamforming
- 400Mb/s maximum data rate in the 2.4GHz band for IPQ4019 interfaces
- OFDMA
Lost features
The following notable features of the bundled wireless package do not have equivalents in the wifiwave2 package
- Nstreme and Nv2 wireless protocols
Property Reference
AAA properties
Properties in this category configure an access point's interaction with AAA (RADIUS) servers.
...
Property | Description |
---|---|
called-format (format-string) | Format for the value of the Called-Station-Id RADIUS attribute, in AP's messages to RADIUS servers. Default:II-II-II-II-II-II:S |
calling-format (format-string) | Format for the value of the Calling-Station-Id RADIUS attribute, in AP's messages to RADIUS servers. Default: AA-AA-AA-AA-AA-AA |
interim-update (time interval) | Interval at which to send interim updates about traffic accounting to the RADIUS server. Default: 5m |
mac-caching (time interval | 'disabled') | Length of time to cache RADIUS server replies, when MAC address authentication is enabled. Default value: disabled. |
name (string) | A unique name for the AAA profile. No default value. |
nas-identifier (string) | Value of the NAS-Identifier attribute, in AP's messages to RADIUS servers. Defaults to the host name of the device (/system/identity). |
password-format (format-string) | Format for value to use in calculating the value of the User-Password attribute in AP's messages to RADIUS servers when performing MAC address authentication. Default value: "" (an empty string). |
username-format (format-string) | Format for the value of the User-Name attribute in APs messages to RADIUS servers when performing MAC address authentication. Default value : |
Channel properties
Properties in this category specify the desired radio channel.
Property | Description | ||||||
---|---|---|---|---|---|---|---|
band (2ghz-g | 2ghz-n | 2ghz-ax | 5ghz-a | 5ghz-ac | 5ghz-an | 5ghz-ax) | Supported frequency band and wireless standard. Defaults to newest supported standard. | ||||||
frequency (list of integers or integer ranges) |
For an interface in station mode, specifies frequencies on which to scan for APs. Leave unset (default) to consider all frequencies supported by the radio and permitted by the applicable regulatory profille. The parameter can contain 1 or more comma-separated values of integers or, optionally, ranges of integers denoted using the syntax RangeBeginning-RangeEnd:RangeStep Examples of valid channel.frequency values:
| ||||||
secondary-frequency (list of integers | 'disabled') | Frequency (in MHz) to use for the center of the secondary part of a split 80+80MHz channel. Only official 80MHz channels (5210, 5290, 5530, 5610, 5690, 5775) are supported. Leave unset (default) for automatic selection of secondary channel frequency. | ||||||
skip-dfs-channels (10min-cac | all | disabled) | Whether to avoid using channels, on which channel availability check (listening for presence of radar signals) is required.
| ||||||
width ( 20mhz | 20/40mhz | 20/40mhz-Ce | 20/40mhz-eC | 20/40/80mhz | 20/40/80+80mhz | 20/40/80/160mhz) | Width of radio channel. Defaults to widest channel supported by the radio hardware. |
Configuration properties
This section includes properties relating to the operation of the interface and the associated radio.
Property | Description | ||||
---|---|---|---|---|---|
antenna-gain (integer 0..30) | Overrides the default antenna gain. The master interface of each radio sets the antenna gain for every interface which uses the same radio. This setting cannot override the antenna gain to be lower than the minimum antenna gain of a radio. | ||||
beacon-interval (time interval 100ms..1s) | Interval between beacon frames of an AP. Default: 100ms.
| ||||
chains (list of integer 0..7 ) | Radio chains to use for receiving signals. Defaults to all chains available to the corresponding radio hardware. | ||||
country (name of a country) | Determines, which regulatory domain restrictions are applied to an interface. Defaults to "United States".
| ||||
dtim-period (integer 1..255) | Period at which to transmit multicast traffic, when there are client devices in power save mode connected to the AP. Expressed as a multiple of the beacon interval. Higher values enable client devices to save more energy, but increase network latency. Default: 1 | ||||
hide-ssid (no | yes) |
Default: no | ||||
manager (capsman |capsman-or-local | local) | capsman - the interface will act as CAP only, this option should not be passed via provisioning rules to the CAP capsman-or-local - the interface will get configuration via CAPsMAN or use its own, if /interface/wifiwave2/cap is not enabled. local - interface won't contact CAPsMAN in order to get configuration. Default: local | ||||
mode (ap | station) | Interface operation mode
| ||||
multicast-enhance (enabled | disabled) | With the multicast-enhance feature enabled, an AP will convert every multicast-addressed IP or IPv6 packet into multiple unicast-addressed frames for each connected station. Default: disabled | ||||
qos-classifier (dscp-high-3-bits | priority) |
Default: priority
| ||||
ssid (string) | The name of the wireless network, aka the (E)SSID. No default value. | ||||
tx-chains (list of integer 0..7) | Radio chains to use for transmitting signals. Defaults to all chains available to the corresponding radio hardware. | ||||
tx-power (integer 0..40) | A limit on the transmit power (in dBm) of the interface. Can not be used to set power above limits imposed by the regulatory profile. Unset by default. |
Datapath properties
Parameters relating to forwarding packets to and from wireless client devices.
Property | Description | ||
---|---|---|---|
bridge (bridge interface) | Bridge interface to add interface to, as a bridge port. No default value. | ||
bridge-cost (integer) | Bridge port cost to use when adding as bridge port. Default: 10 | ||
bridge-horizon (none | integer) | Bridge horizon to use when adding as bridge port Default: none. | ||
client-isolation (no | yes) | Determines whether client devices connecting to this interface are (by default) isolated from others or not. This policy can be overridden on a per-client basis using access list rules, so a an AP can have a mixture of isolated and non-isolated clients. Traffic from an isolated client will not be forwarded to other clients and unicast traffic from a non-isolated client will not be forwarded to an isolated one. Default: no | ||
interface-list (interface list) | List to which add the interface as a member. No default value. | ||
vlan-id (none | integer 1..4095) | Default VLAN ID to assign to client devices connecting to this interface (only relevant to interfaces in AP mode).
|
Security Properties
Parameters relating to authentication.
Property | Description | ||
---|---|---|---|
authentication-types (list of wpa-psk, wpa2-psk, wpa-eap, wpa2-eap, wpa3-psk, owe, wpa3-eap, wpa3-eap-192) | Authentication types to enable on the interface. The default value is an empty list (no authenticaion, an open network). Configuring a passphrase, adds to the default list the wpa2-psk authentication method (if the interface is an AP) or both wpa-psk and wpa2-psk (if the interface is a station). Configuring an eap-username and an eap-password adds to the default list wpa-eap and wpa2-eap authentication methods. | ||
connect-group ( string ) | APs within the same connect group do not allow more than 1 client device with the same MAC address. This is to prevent malicious authorized users from intercepting traffic intended to other users ('MacStealer' attack) or performing a denial of service attack by spoofing the MAC address of a victim. Handling of new connections with duplicate MAC addresses depends on the connect-priority of AP interfaces involved. By default, all APs are assigned the same connect-group. | ||
connect-priority (accept-priority/hold-priority (integers)) | Theese parameters determine, how a connection is handled if the MAC address of the client device is the same as that of another active connection to another AP. If omitted, hold-priority is the same as accept-priority. | ||
dh-groups (list of 19, 20, 21) | Identifiers of elliptic curve cryptography groups to use in SAE (WPA3) authentication. | ||
disable-pmkid (no | yes) | For interfaces in AP mode, disables inclusion of a PMKID in EAPOL frames. Disabling PMKID can cause compatibility issues with client devices which make use of it.
| ||
eap-accounting (no | yes) | Send accounting information to RADIUS server for EAP-authenticated peers. Default: no. | ||
| |||
eap-anonymous-identity (string) | Optional anonymous identity for EAP outer authentication. No default value. | ||
eap-certificate-mode (dont-verify-certificate | no-certificates | verify-certificate | verify-certificate-with-crl) | Policy for handling the TLS certificate of the RADIUS server.
| ||
eap-methods (list of peap, tls, ttls) | EAP methods to consider for authentication. Defaults to all supported methods. | ||
eap-password (string) | Password to use, when the chosen EAP method requires one. No default value. | ||
eap-tls-certificate (certificate) | Name or id of a certificate in the device's certificate store to use, when the chosen EAP authentication method requires one. No default value. | ||
eap-username (string) | Username to use when the chosen EAP method requires one. No default value. | ||
| |||
encryption (list of ccmp, ccmp-256, gcmp, gcmp-256, tkip) | A list of ciphers to support for encrypting unicast traffic. Defaults to ccmp. | ||
| |||
ft (no | yes) | Whether to enable 802.11r fast BSS transitions ( roaming). Default: no. | ||
ft-mobility-domain (integer 0..65535) | The fast BSS transition mobility domain ID. Default: 44484 (0xADC4). | ||
ft-nas-identifier (string of 2..96 hex characters) | Fast BSS transition PMK-R0 key holder identifier. Default: MAC address of the interface. | ||
ft-over-ds (no | yes ) | Whether to enable fast BSS transitions over DS (distributed system). Default: no. | ||
ft-preserve-vlanid (no | yes ) |
The default behavior is essential when relying on a RADIUS server to assign VLAN IDs to users, since a RADIUS server is only used for initial authentication. | ||
ft-r0-key-lifetime (time interval 1s..6w3d12h15m) | Lifetime of the fast BSS transition PMK-R0 encryption key. Default: 600000s (~7 days) | ||
ft-reassociation-deadline (time interval 0..70s) | Fast BSS transition reassociation deadline. Default: 20s. | ||
group-encryption (ccmp | ccmp-256 | gcmp | gcmp-256 | tkip) | Cipher to use for encrypting multicast traffic. Defaults to ccmp. | ||
group-key-update (time interval) | Interval at which the group temporal key (key for encrypting broadcast traffic) is renewed. Defaults to 24 hours. | ||
management-encryption (cmac | cmac-256 | gmac | gmac-256) | Cipher to use for encrypting protected management frames. Defaults to cmac. | ||
management-protection (allowed | disabled | required) | Whether to use 802.11w management frame protection. Incompatible with management frame protection in standard wireless package. Default value depends on value of selected authentication type. WPA2 allows use of management protection, WPA3 requires it. | ||
owe-transition-interface (interface) | Name or internal id of an interface whose MAC address and SSID to advertise as the matching AP when running in OWE transition mode. Required for setting up open APs that offer OWE, but also work with older devices that don't support the standard. See configuration example below. | ||
passphrase (string of up to 63 characters) | Passphrase to use for PSK authentication types. Defaults to an empty string - "". WPA-PSK and WPA2-PSK authentication requires a minimum of 8 chars, while WPA3-PSK does not have minimum passphrase length. | ||
sae-anti-clogging-threshold ('disabled' | integer) | Due to SAE (WPA3) associations being CPU resource intensive, overwhelming an AP with bogus authentication requests makes for a feasible denial-of-service attack. This parameter provides a way to mitigate such attacks by specifying a threshold of in-progress SAE authentications, at which the AP will start requesting that client devices include a cookie bound to their MAC address in their authentication requests. It will then only process authentication requests which contain valid cookies. Default: 5. | ||
sae-max-failure-rate ('disabled' | integer) | Rate of failed SAE (WPA3) associations per minute, at which the AP will stop processing new association requests. Default: 40. | ||
sae-pwe (both | hash-to-element | hunting-and-pecking) | Methods to support for deriving SAE password element. Default: both. | ||
wps (disabled | push-button) |
|
Steering properties
Properties in this category govern mechanisms for advertising potential roaming candidates to client devices.
Property | Description |
---|---|
neighbor-group (string) | When sending neighbor reports and BSS transition management requests, an AP will list all other APs within its neighbor group as potential roaming candidates. By default, a dynamic neighbor group is created for each set of APs with the same SSID and authentication settings. |
rrm (no | yes) | Enables sending of 802.11k neighbor reports. Default: yes |
wnm (no | yes) | Enables sending of solicited 802.11v BSS transition management requests. Default: yes |
Miscellaneous properties
Property | Description |
---|---|
arp (disabled | enabled | local-proxy-arp | proxy-arp | reply-only) | Address Resolution Protocol mode:
|
arp-timeout (time interval | 'auto') | Determines how long a dynamically added ARP table entry is considered valid since the last packet was received from the respective IP address. Value auto equals to the value ofarp-timeout in/ip settings, which defaults to 30s. |
disable-running-check (no | yes) |
|
disabled (no | yes) (X) | Hardware interfaces are disabled by default. Virtual interfaces are not. |
mac-address (MAC) | MAC address (BSSID) to use for an interface. Hardware interfaces default to the MAC address of the associated radio interface. Default MAC addresses for virtual interfaces are generated by
|
mtu (integer [32..2290]; Default: 1500) | Layer3 Maximum transmission unit. |
l2mtu (integer [32..2290]; Default: 2290) | Layer2 Maximum transmission unit. |
master-interface (interface) | Multiple interface configurations can be run simultaneously on every wireless radio. Only one of them determines the radio's state (whether it is enabled, what frequency it's using, etc). This 'master' interface, is bound to a radio with the corresponding radio-mac. To create additional ('virtual') interface configurations on a radio, they need to be bound to the corresponding master interface. No default value. |
name (string) | A name for the interface. Defaults to wifiN, where N is the lowest integer that has not yet been used for naming an interface. |
Read-only properties
Property | Description |
---|---|
bound (boolean) (B) | True for master interfaces that are currently available for WiFi manager. True for a virtual interface (configurations linked to a master interface) when both the interface itself and its master interface are not disabled and the master interface has a bound flag. |
default-name (string) | The default name for an interface. |
inactive (boolean) (I) | False for interfaces in AP mode when they've selected a channel for operation (i.e. configuration has been successfully applied). False for interfaces in station mode when they've connected to an AP (i.e. configuration has been successfully applied, an with AP with matching settings has been found). True otherwise. |
master (boolean) (M) | True for physical interfaces on router itself or detected CAP if running as CAPsMAN. False for virtual interfaces. |
radio-mac (MAC) | The MAC address of the associated radio. |
running (boolean) (R) | True, when an interface has established a link to another device. If disable-running-check is set to 'yes', true whenever the interface is not disabled. |
Access List
Filtering parameters
| |||||||
---|---|---|---|---|---|---|---|
Parameter | Description | ||||||
interface (interface | interface-list | 'any') | Match if connection takes place on the specified interface or interface belonging to specified list. Default: any. | ||||||
mac-address (MAC address) | Match if the client device has the specified MAC address. No default value. | ||||||
mac-address-mask (MAC address) | Modifies the mac-address parameter to match if it is equal to the result of performing bit-wise AND operation on the client MAC address and the given address mask. Default: FF:FF:FF:FF:FF:FF (i.e. client's MAC address must match value of mac-address exactly) | ||||||
signal-range (min..max) | Match if the strength of received signal from the client device is within the given range. Default: '-120..120' | ||||||
ssid-regexp (regex) | Match if the given regular expression matches the SSID. | ||||||
time (start-end,days) | Match during the specified time of day and (optionally) days of week. Default: 0s-1d |
...
Action parameters
| |||||||
---|---|---|---|---|---|---|---|
Parameter | Description | ||||||
allow-signal-out-of-range (time period | 'always') | The length of time which a connected peer's signal strength is allowed to be outside the range required by the signal-range parameter, before it is disconnected. If the value is set to 'always', peer signal strength is only checked during association. Default: 0s. | ||||||
action (accept | reject | query-radius) | Whether to authorize a connection
Default: accept | ||||||
client-isolation (no | yes) | Whether to isolate the client from others connected to the same AP. No default value. | ||||||
passphrase (string) | Override the default passphrase with given value. No default value. | ||||||
radius-accounting (no | yes) | Override the default RADIUS accounting policy with given value. No default value. | ||||||
vlan-id ( none | integer 1..4095 ) | Assign the given VLAN ID to matched clients. No default value. |
Frequency scan
Information about RF conditions on available channels can be obtained by running the frequency-scan command.
Command parameters | |
---|---|
Parameter | Description |
duration (time interval) | Length of time to perform the scan for before exiting. Useful for non-interactive use. Not set by default. |
freeze-frame-interval (time interval) | Time interval at which to update command output. Default: 1s. |
frequency (list of frequencies/ranges) | Frequencies to perform the scan on. See channel.frequency parameter syntax above for more detail. Defaults to all supported frequencies. |
numbers (string) | Either the name or internal id of the interface to perform the scan with. Required. Not set by default. |
rounds (integer) | Number of times to go through list of scannable frequencies before exiting. Useful for non-interactive use. Not set by default. |
save-file (string) | Name of file to save output to. Not set by default. |
...
Output parameters | |
---|---|
Parameter | Description |
channel (integer) | Frequency (in MHz) of the channel scanned. |
networks (integer) | Number of access points detected on the channel. |
load (integer) | Percentage of time the channel was busy during the scan. |
nf (integer) | Noise floor (in dBm) of the channel. |
max-signal (integer) | Maximum signal strength (in dBm) of APs detected in the channel. |
min-signal (integer) | Minimum signal strength (in dBm) of APs detected in the channel. |
primary (boolean) (P) | Channel is in use as the primary (control) channel by an AP. |
secondary (boolean) (S) | Channel is in use as a secondary (extension) channel by an AP. |
Scan command
The '/interface wifiwave2 scan' command will scan for access points and print out information about any APs it detects.
...
Output parameters | |
---|---|
Parameter | Description |
active (boolean) (A) | Signifies that beacons from the AP have been received in the last 30 seconds. |
address (MAC) | The MAC address (BSSID) of the AP. |
channel (string) | The control channel frequency used by the AP, its supported wireless standards and control/extension channel layout. |
security (string) | Authentication methods supported by the AP. |
signal (integer) | Signal strength of the AP's beacons (in dBm). |
ssid (string) | The extended service set identifier of the AP. |
sta-count (integer) | The number of client devices associated with the AP. Only available if the AP includes this information in its beacons. |
Sniffer
Command parameters | |
---|---|
Parameter | Description |
duration (time interval) | Automatically interrupt the sniffer after the specified time has passed. No default value. |
filter (string) | A string that specifies a filter to apply to captured frames. Only frames matched by the filter expression will be displayed, saved or streamed. This works similarly to filter strings in libpcap, for example. The filter can match
A string can include the following operators:
|
number (interface) | Interface to use for sniffing. |
pcap-file (string) | Save captured frames to a file with the given name. No default value (captured frames are not saved to a file by default). |
pcap-size-limit (integer) | File size limit (in bytes) when storing captured frames locally. When this limit has been reached, no new frames are added to the capture file. No default value. |
stream-address (IP address) | Stream captured packets via the TZSP protocol to the given address. No default value (captured packets are not streamed anywhere by default). |
stream-rate (integer) | Limit on the rate (in packets per second) at which captured frames are streamed via TZSP. |
WPS
interface/wifiwave2/wps-client wifi
Command parameters | |
---|---|
Parameter | Description |
duration (time interval) | Length of time after which the command will time out if no AP is found. Unlimited by default. |
interval (time interval) | Time interval at which to update command output. Default: 1s. |
mac-address (MAC) | Only attempt connecting to AP with the specified MAC (BSSID). Not set by default. |
numbers (string) | Name or internal id of the interface with which to attempt connection. Not set by default. |
ssid (string) | Only attempt to connect to APs with the specified SSID. Not set by default. |
Radios
Information about the capabilities of each radio can be gained by running the `/interface/wifiwave2/radio print detail` command.
Property | Description |
---|---|
2g-channels (list of integers) | Frequencies supported in the 2.4GHz band. |
5g-channels (list of integers) | Frequencies supported in the 5GHz band. |
bands (list of strings) | Supported frequency bands, wireless standards and channel widths. |
ciphers (list of strings) | Supported encryption ciphers. |
countries (list of strings) | Regulatory domains supported by the interface. |
min-antenna-gain (integer) | Minimum antenna gain permitted for the interface. |
phy-id (string) | A unique identifier. |
radio-mac (MAC) | MAC address of the radio interface. Can be used to match radios to interface configurations. |
rx-chains (list of integers) | IDs for radio chains available for receiving radio signals. |
tx-chains (list of integers) | IDs for radio chains available for transmitting radio signals. |
Registration table
The registration table contains read-only information about associated wireless devices.
Parameter | Description |
---|---|
authorized (boolean) (A) | True when the peer has successfully authenticated. |
bytes (list of integers) | Number of bytes in packets transmitted to a peer and received from it. |
interface (string) | Name of the interface, which was used to associate with the peer. |
mac-address (MAC) | The MAC address of the peer. |
packets (list of integers) | Number of packets transmitted to a peer and received from it. |
rx-rate (string) | Bitrate of received transmissions from peer. |
signal (integer) | Strength of signal received from the peer (in dBm). |
tx-rate (string) | Bitrate used for transmitting to the peer. |
uptime (time interval) | Time since association. |
CAPsMAN Global Configuration
Menu: /interface/wifiwave2/capsman
Property | Description |
---|---|
ca-certificate (auto | certificate name ) | Device CA certificate, CAPsMAN server requires a certificate, certificate on CAP is optional. |
certificate (auto | certificate name | none; Default: none) | Device certificate |
enabled (no | yes) | Disable or enable CAPsMAN functionality |
package-path (string |; Default: ) | Folder location for the RouterOS packages. For example, use "/upgrade" to specify the upgrade folder from the files section. If an empty string is set, CAPsMAN can use built-in RouterOS packages, note that in this case only CAPs with the same architecture as CAPsMAN will be upgraded. |
require-peer-certificate (yes | no; Default: no) | Require all connecting CAPs to have a valid certificate |
upgrade-policy (none | require-same-version | suggest-same-upgrade; Default: none) | Upgrade policy options
|
interfaces (all | interface name | none; Default: all) | Interfaces on which CAPsMAN will listen for CAP connections |
CAPsMAN Provisioning
Provisioning rules for matching radios are configured in /interface/wifiwave2/provisioning/ menu:
Property | Description |
---|---|
action (create-disabled | create-enabled | create-dynamic-enabled | none; Default: none) | Action to take if rule matches are specified by the following settings:
|
comment (string; Default: ) | Short description of the Provisioning rule |
common-name-regexp (string; Default: ) | Regular expression to match radios by common name. Each CAP's common name identifier can be found under "/interface/wifiwave2/radio" as value "REMOTE-CAP-NAME" |
supported-bands (2ghz-ax | 2ghz-g | 2ghz-n | 5ghz-a | 5ghz-ac | 5ghz-ax | 5ghz-n; Default: ) | Match radios by supported wireless modes. |
identity-regexp (string; Default: ) | Regular expression to match radios by router identity |
address-ranges (IpAddressRange[,IpAddressRanges] max 100x; Default: "") | Match CAPs with IPs within configured address range. Will only work for CAPs that joined CAPsMAN using IP, not MAC address. |
master-configuration (string; Default: ) | If action specifies to create interfaces, then a new master interface with its configuration set to this configuration profile will be created |
name-format (string) | Base string to use when constructing names of provisioned interfaces. Each new interface will be created by taking the base string and appending a number to the end of it. If included in the string, character sequence %I will be replaced by the system identity of the cAP. %C will be replaced with the cAP's TLS certificate's Common Name. Default: "cap-wifi" |
radio-mac (MAC address) | MAC address of radio to be matched. No default value. |
slave-configurations (string; Default: ) | If action specifies to create interfaces, then a new slave interface for each configuration profile in this list is created. |
disabled (yes | no; Default: no) | Specifies if the provision rule is disabled. |
CAP configuration
Menu: /interface/wifiwave2/cap
...