Skip to content
MikroTik RouterOS Docs

WiFi Basic Setup

For the impatient: create a basic WiFi access point.

WiFi Package (RouterOS 7.13+, Wi-Fi 6 hardware):

/interface/wifi/security add name=home-sec authentication-types=wpa2-psk passphrase="YourPassword123"
/interface/wifi set wifi1 configuration.ssid=MyNetwork configuration.country=UnitedStates security=home-sec disabled=no

Legacy Wireless Package:

/interface/wireless/security-profiles set default mode=dynamic-keys authentication-types=wpa2-psk wpa2-pre-shared-key="YourPassword123"
/interface/wireless set wlan1 mode=ap-bridge ssid=MyNetwork country=united_states disabled=no

Verify with:

/interface/wifi/registration-table/print
# or for legacy:
/interface/wireless/registration-table/print

What this does: Configures your MikroTik router as a WiFi access point, allowing wireless devices to connect to your network.

When to use this:

  • Setting up home or office wireless network
  • Providing guest WiFi access
  • Extending network coverage with additional APs
  • Replacing existing access points

Prerequisites:

  • MikroTik device with WiFi radio hardware (not CHR)
  • Appropriate WiFi package installed (wifi-qcom, wifi-qcom-ac, or wireless)
  • Bridge configured for LAN traffic (typical home setup)

Which Package Do I Have?

/system/package/print where name~"wifi"
PackageHardware SupportRouterOS Version
wifi-qcomWi-Fi 6 (802.11ax)7.13+
wifi-qcom-acWi-Fi 5 wave2 (802.11ac)7.13+
wirelessAll older wireless6.x and 7.x

Use these steps for Wi-Fi 6 hardware (hAP ax series, Audience, etc.) on RouterOS 7.13+.

View your WiFi radio interfaces.

/interface/wifi/print

Expected output:

Flags: X - disabled; R - running
0 X name="wifi1" mac-address=AA:BB:CC:DD:EE:FF arp=enabled ...
1 X name="wifi2" mac-address=AA:BB:CC:DD:EE:F0 arp=enabled ...

Typically wifi1 is 5 GHz and wifi2 is 2.4 GHz.

Create a WPA2 security profile with your password.

/interface/wifi/security add name=home-security \
authentication-types=wpa2-psk \
passphrase="YourSecurePassword123" \
wps=disable

For WPA2/WPA3 mixed mode (better security, broader compatibility):

/interface/wifi/security add name=home-security \
authentication-types=wpa2-psk,wpa3-psk \
passphrase="YourSecurePassword123" \
encryption=ccmp \
wps=disable

Apply settings and enable the WiFi interface.

/interface/wifi set wifi1 \
configuration.ssid=MyNetwork \
configuration.country=UnitedStates \
security=home-security \
disabled=no

Important: Always set the correct country code for regulatory compliance and optimal channel selection.

Ensure WiFi clients can reach your LAN.

/interface/bridge/port add bridge=bridge interface=wifi1

Check that the interface is running.

/interface/wifi/print

Expected output:

Flags: X - disabled; R - running
0 R name="wifi1" ... configuration.ssid=MyNetwork ...

The R flag indicates the interface is running.

Use these steps for older wireless hardware or RouterOS 6.x.

/interface/wireless/print

Modify the default security profile with WPA2.

/interface/wireless/security-profiles set default \
mode=dynamic-keys \
authentication-types=wpa2-psk \
wpa2-pre-shared-key="YourSecurePassword123"
/interface/wireless set wlan1 \
mode=ap-bridge \
ssid=MyNetwork \
band=2ghz-b/g/n \
channel-width=20/40mhz-XX \
country=united_states \
security-profile=default \
disabled=no
/interface/bridge/port add bridge=bridge interface=wlan1

Configure both radios with the same SSID for seamless roaming.

WiFi Package:

# Create shared security profile
/interface/wifi/security add name=dual-band-sec \
authentication-types=wpa2-psk,wpa3-psk \
passphrase="SecurePassword123" \
encryption=ccmp wps=disable
# Create channel profiles
/interface/wifi/channel add name=ch-5ghz \
frequency=5180,5200,5220,5240 width=20/40/80mhz band=5ghz-ax
/interface/wifi/channel add name=ch-2ghz \
frequency=2412,2437,2462 width=20mhz band=2ghz-ax
# Apply to interfaces
/interface/wifi set wifi1 \
configuration.ssid=HomeNetwork \
configuration.country=UnitedStates \
channel=ch-5ghz security=dual-band-sec disabled=no
/interface/wifi set wifi2 \
configuration.ssid=HomeNetwork \
configuration.country=UnitedStates \
channel=ch-2ghz security=dual-band-sec disabled=no
# Add both to bridge
/interface/bridge/port add bridge=bridge interface=wifi1
/interface/bridge/port add bridge=bridge interface=wifi2

Create a separate guest network that isolates clients from each other and the main LAN.

WiFi Package:

# Create guest security
/interface/wifi/security add name=guest-sec \
authentication-types=wpa2-psk passphrase="GuestAccess2024" wps=disable
# Create datapath with client isolation
/interface/wifi/datapath add name=guest-dp client-isolation=yes
# Create virtual AP on wifi1
/interface/wifi add master-interface=wifi1 name=wifi1-guest \
configuration.ssid=GuestNetwork \
security=guest-sec datapath=guest-dp disabled=no

Then configure firewall rules to restrict guest network access to internet only.

Connect your MikroTik as a client to an existing WiFi network.

WiFi Package:

/interface/wifi/security add name=upstream-sec \
authentication-types=wpa2-psk passphrase="UpstreamPassword"
/interface/wifi set wifi1 \
mode=station \
configuration.ssid=UpstreamNetwork \
security=upstream-sec disabled=no

Legacy Wireless:

/interface/wireless/security-profiles add name=upstream \
mode=dynamic-keys authentication-types=wpa2-psk \
wpa2-pre-shared-key="UpstreamPassword"
/interface/wireless set wlan1 \
mode=station \
ssid=UpstreamNetwork \
security-profile=upstream disabled=no

Hide your network name from broadcast (security through obscurity - not recommended as primary security).

WiFi Package:

/interface/wifi set wifi1 configuration.hide-ssid=yes

Legacy Wireless:

/interface/wireless set wlan1 hide-ssid=yes

Restrict number of connected devices.

WiFi Package:

/interface/wifi/configuration add name=limited-config \
ssid=LimitedNetwork max-clients=10 country=UnitedStates
/interface/wifi set wifi1 configuration=limited-config

Confirm your WiFi setup is working correctly.

WiFi Package:

/interface/wifi/print where running=yes

Legacy Wireless:

/interface/wireless/print where running=yes

Expected: Interface shows with R flag (running).

WiFi Package:

/interface/wifi/registration-table/print

Legacy Wireless:

/interface/wireless/registration-table/print

Expected: Lists MAC addresses, signal strength, and connection info for connected devices.

From another device, scan for WiFi networks and verify your SSID appears.

From the router (WiFi package):

/interface/wifi/scan wifi1 duration=5s

Connect a device to the WiFi network, then verify it received an IP address and can reach the gateway.

SymptomCauseSolution
Interface won’t enablePackage not installedCheck /system/package/print; install appropriate wifi package
Interface won’t enableWrong package for hardwareUse wifi-qcom for Wi-Fi 6, wifi-qcom-ac for Wi-Fi 5 wave2
Clients can’t see networkSSID hidden or wrong countryVerify hide-ssid=no; set correct country code
Clients can’t connectWrong passwordVerify passphrase matches exactly (case-sensitive)
Clients can’t connectWPA3 incompatibilityUse WPA2-only or WPA2/WPA3 mixed mode
Connected but no internetNot in bridgeAdd WiFi interface to bridge port
Clients disconnect every 10-15 minWPA3 SAE anti-cloggingDisable SAE anti-clogging (see Community Tips)
Intel laptops fail with WPA3Intel driver limitationUse CCMP encryption, not GCMP
Poor signal/speedWrong channel widthReduce width in congested environments
Station mode won’t connectSecurity mismatchVerify security type and password match AP

Common Mistakes

  • Don’t forget the country code - Required for regulatory compliance and affects available channels/power
  • Don’t use GCMP encryption with Intel WiFi - Intel drivers only support CCMP for WPA3-Personal
  • Don’t forget to add interface to bridge - Clients won’t reach the network without bridge membership
  • Don’t use WPA3-only for mixed environments - Older devices won’t connect; use WPA2/WPA3 mixed mode
  • Don’t enable WPS in production - WPS has known security vulnerabilities
Environment2.4 GHz5 GHz
Dense urban/many neighbors20 MHz40-80 MHz
Suburban/moderate interference20 MHz80 MHz
Rural/isolated20/40 MHz80-160 MHz
Long distance links20 MHz20-40 MHz

Wider channels = faster speeds but more susceptible to interference.

ScenarioRecommended Security
Home networkWPA2-PSK + WPA3-PSK (mixed mode)
Guest networkWPA2-PSK with client isolation
High securityWPA3-PSK only with MFP required
EnterpriseWPA2-EAP or WPA3-EAP with RADIUS
Legacy devices presentWPA2-PSK only (avoid TKIP)
  • CAPsMAN - centralized wireless management for 3+ access points
  • WiFi Security (WPA2/WPA3) - advanced security configuration
Featurewifi Packagewireless Package
HardwareWi-Fi 5 wave2, Wi-Fi 6All older wireless
RouterOS Version7.13+6.x and 7.x
Configuration ModelProfile-basedDirect properties
WPA3 SupportYesNo
802.11r/k/v RoamingYesLimited
PropertyTypeDefaultDescription
authentication-typeslist-wpa2-psk, wpa3-psk, wpa2-eap, wpa3-eap
passphrasestring-8-63 characters for WPA2
encryptionlistccmpccmp, gcmp, tkip
management-protectionenumalloweddisabled, allowed, required
wpsenumpush-buttonpush-button, disabled
PropertyTypeDefaultDescription
modeenumapap, station, station-bridge
configuration.ssidstring-Network name
configuration.countrystring-Regulatory domain (required)
configuration.hide-ssidboolnoHide SSID in beacons
channel.frequencyMHz list-Operating frequencies
channel.widthenum-20mhz, 20/40mhz, etc.
securityprofile-Security profile reference