CAPsMAN v2 Architecture and Provisioning
CAPsMAN v2 Architecture and Provisioning
Section titled “CAPsMAN v2 Architecture and Provisioning”CAPsMAN (Controlled Access Point Manager) v2 is the centralized wireless management system for RouterOS 7’s WiFi package. This guide covers the architecture, provisioning strategies, and advanced configurations.
CAPsMAN v1 vs v2
Section titled “CAPsMAN v1 vs v2”CAPsMAN v2 is specifically designed for the new WiFi package and differs significantly from v1:
| Feature | CAPsMAN v1 | CAPsMAN v2 |
|---|---|---|
| Wireless Package | Legacy wireless | WiFi package |
| Manager Path | /caps-man | /interface/wifi/capsman |
| Interface Path | /interface/wireless | /interface/wifi |
| CAP Config Path | /interface/wireless | /interface/wifi/cap |
| Max Data Rate | 866 Mbps (802.11ac) | 4.8 Gbps (802.11ax) |
| WPA3 Support | Limited | Full |
| 802.11r/k/v | Basic | Full |
| Configuration Model | Flat | Profile-based |
Migration: You cannot mix v1 and v2. All CAPs must use the same package as the controller. See CAPsMAN v1 to v2 Migration Guide for details.
Architecture
Section titled “Architecture”System Components
Section titled “System Components”┌─────────────────┐ ┌─────────────────┐│ CAPsMAN │ │ CAP ││ Controller │◄───────►│ (Access Point)││ │ UDP │ ││ - Channels │ 5246 │ - WiFi radios ││ - Security │ │ - CAP interface││ - Datapath │ │ ││ - Configs │ │ │└─────────────────┘ └─────────────────┘CAP to CAPsMAN Communication
Section titled “CAP to CAPsMAN Communication”CAPs connect to CAPsMAN using:
- Protocol: UDP ports 5246 (control) / 5247 (data)
- Discovery: Broadcast or directed to controller IP
- Transport: IP-based (not MAC-based in v2)
Discovery Mechanisms
Section titled “Discovery Mechanisms”CAPsMAN supports two discovery modes:
Layer 2 (Broadcast) Discovery
Section titled “Layer 2 (Broadcast) Discovery”CAPs discover the controller via broadcast on the local network segment. Works automatically when controller and CAPs are on the same subnet.
# CAP with L2 discovery (no explicit controller address needed)/interface/wifi/cap set enabled=yes \ discovery-interfaces=bridge-wifiLayer 3 (IP-Based) Discovery
Section titled “Layer 3 (IP-Based) Discovery”Required for multi-site deployments where the CAPsMAN controller is on a different subnet. CAP connects directly to the controller’s IP address.
# CAP with explicit controller address (L3/multi-site)/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1 \ discovery-interfaces=bridge-wifiMultiple controller addresses can be specified for redundancy:
/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1,10.0.0.2 \ discovery-interfaces=bridge-wifiFirewall Rules for L3 CAPsMAN
Section titled “Firewall Rules for L3 CAPsMAN”When the controller is behind a firewall, open these ports on the controller:
# Allow CAPsMAN control and data from CAPs/ip/firewall/filter add chain=input protocol=udp dst-port=5246 action=accept comment="CAPsMAN control"/ip/firewall/filter add chain=input protocol=udp dst-port=5247 action=accept comment="CAPsMAN data"MTU Considerations for L3 Deployments
Section titled “MTU Considerations for L3 Deployments”DTLS encryption adds ~60 bytes of overhead. For WAN links with MTU 1500:
- Standard CAPsMAN tunnel: 1500 MTU is sufficient
- CAPsMAN + DTLS over WAN: May need to reduce MTU to ~1440 or enable fragmentation
# Check for fragmentation issues on CAP/interface/wifi/cap print detail# If seeing drops, reduce effective MTU or disable DTLS for WAN-limited linksCritical Gotchas
Section titled “Critical Gotchas”1. Discovery Interface MUST Be a Bridge
Section titled “1. Discovery Interface MUST Be a Bridge”The discovery interface must be a bridge, NOT a physical port.
Correct:
/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1 \ discovery-interfaces=bridge1Incorrect:
# This WILL NOT WORK/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1 \ discovery-interfaces=ether12. WiFi Interfaces Must Be in Bridge on CAP
Section titled “2. WiFi Interfaces Must Be in Bridge on CAP”On the CAP device, WiFi interfaces must be added to a bridge:
# Create bridge for wireless/interface/bridge add name=bridge-wifi
# Add WiFi interface to bridge/interface/bridge/port add bridge=bridge-wifi interface=wifi1/interface/bridge/port add bridge=bridge-wifi interface=wifi23. CAPsMAN Interfaces Appear on Controller
Section titled “3. CAPsMAN Interfaces Appear on Controller”Managed WiFi interfaces appear on the controller, not the CAP:
# On controller - view managed CAP interfaces/interface/wifi/printConfiguration Profiles
Section titled “Configuration Profiles”CAPsMAN v2 uses a profile-based architecture:
Profile Types
Section titled “Profile Types”| Profile | Purpose | Command Path |
|---|---|---|
| Channel | RF settings (freq, width, bands) | /interface/wifi/channel |
| Security | Auth & encryption | /interface/wifi/security |
| Datapath | Bridge/VLAN settings | /interface/wifi/datapath |
| Configuration | Combines all above | /interface/wifi/configuration |
| Provisioning | Maps CAPs to configs | /interface/wifi/provisioning |
Channel Profile
Section titled “Channel Profile”/interface/wifi/channel add name=5GHz-80MHz \ band=5ghz-ax \ frequency=5180,5200,5220,5240 \ width=20/40/80mhz
/interface/wifi/channel add name=2.4GHz-20MHz \ band=2ghz-ax \ frequency=2412,2437,2462 \ width=20mhzChannel Profile Options:
| Parameter | Description |
|---|---|
band | WiFi band mode (e.g., 5ghz-ax, 5ghz-ac, 2ghz-ax, 2ghz-n) |
frequency | Channel center frequencies |
width | 20mhz / 20/40mhz / 20/40/80mhz / 20/40/80/160mhz |
tx-chains | Transmit antenna chains |
rx-chains | Receive antenna chains |
Valid band values:
| Band | Values |
|---|---|
| 2.4 GHz | 2ghz-g, 2ghz-n, 2ghz-ax |
| 5 GHz | 5ghz-a, 5ghz-ac, 5ghz-an, 5ghz-ax |
Security Profile
Section titled “Security Profile”/interface/wifi/security add name=Corporate \ authentication-types=wpa2-psk,wpa3-psk \ passphrase=YourPassword!
# Enterprise with RADIUS/interface/wifi/security add name=Enterprise \ authentication-types=wpa2-eap,wpa3-eap \ radius-server=10.0.0.50 \ radius-accounting=yes \ certificate=server-certDatapath Profile
Section titled “Datapath Profile”# Local forwarding (traffic stays on CAP)/interface/wifi/datapath add name=Local-Fwd \ bridge=bridge-local \ local-forwarding=yes
# Manager forwarding (traffic via controller)/interface/wifi/datapath add name=Manager-Fwd \ bridge=bridge-local \ local-forwarding=no
# VLAN tagging/interface/wifi/datapath add name=VLAN10 \ bridge=bridge-local \ vlan-id=10 \ vlan-mode=use-tagDatapath Options:
| Parameter | Description |
|---|---|
bridge | Bridge interface to attach |
local-forwarding | yes=local, no=controller |
vlan-id | VLAN ID for clients |
vlan-mode | none, use-tag, service-tag |
client-to-client-forwarding | Allow client-to-client traffic |
Configuration Profile
Section titled “Configuration Profile”/interface/wifi/configuration add name=Office-5GHz \ channel=5GHz-80MHz \ security=Corporate \ datapath=Local-Fwd \ ssid=Office-5G \ country=United States \ hide-ssid=noConfiguration Options:
| Parameter | Description |
|---|---|
channel | Channel profile name |
security | Security profile name |
datapath | Datapath profile name |
ssid | Wireless network name |
country | Regulatory domain |
hide-ssid | Hide SSID from broadcasts |
ft | Enable 802.11r Fast Transition |
rrm | Enable 802.11k RRM |
bss-transition | Enable 802.11v BSS Transition |
Provisioning Rules
Section titled “Provisioning Rules”Provisioning rules determine how CAP radios are configured when they connect to CAPsMAN.
Basic Provisioning
Section titled “Basic Provisioning”/interface/wifi/provisioning add \ action=create-dynamic-enabled \ master-configuration=Office-5GHzBand-Based Provisioning
Section titled “Band-Based Provisioning”Match configurations to CAP hardware capabilities using supported-bands:
# 5GHz for WiFi 6 (ax) capable devices/interface/wifi/provisioning add \ action=create-dynamic-enabled \ supported-bands=5ghz-ax \ master-configuration=5GHz-Master
# 2.4GHz for WiFi 6 devices/interface/wifi/provisioning add \ action=create-dynamic-enabled \ supported-bands=2ghz-ax \ master-configuration=2.4GHz-MasterNote: Use supported-bands (not hw-supported-modes) in CAPsMAN v2. Do not use radio-mac for band matching — leave it blank and use supported-bands instead.
Identity-Based Provisioning
Section titled “Identity-Based Provisioning”Match by router identity (system identity):
/interface/wifi/provisioning add \ action=create-dynamic-enabled \ identity-regexp="^Office-.*" \ master-configuration=Office-AP
/interface/wifi/provisioning add \ action=create-dynamic-enabled \ identity-regexp="^Warehouse-.*" \ master-configuration=Warehouse-APMAC-Based Provisioning
Section titled “MAC-Based Provisioning”Provision specific CAPs by MAC address:
/interface/wifi/provisioning add \ action=create-static-enabled \ mac-address=AA:BB:CC:DD:EE:FF \ master-configuration=Specific-APProvisioning Reference
Section titled “Provisioning Reference”| Parameter | Description |
|---|---|
action | none, create-dynamic-enabled, create-dynamic-disabled, create-static-enabled |
supported-bands | Band filter: 5ghz-ax, 5ghz-ac, 2ghz-ax, 2ghz-n, etc. |
identity-regexp | Regex to match CAP identity |
mac-address | Specific CAP MAC address |
master-configuration | Configuration profile to apply |
name-format | identity, mac, hostname |
name-prefix | Prefix for interface names |
Forwarding Modes
Section titled “Forwarding Modes”Local Forwarding (Default)
Section titled “Local Forwarding (Default)”Traffic is forwarded locally by each CAP:
Client <-> CAP <-> Local Switch <-> NetworkBest for:
- Low-latency applications
- Reducing controller load
- Most deployments
/interface/wifi/datapath add name=local-fwd \ bridge=bridge-local \ local-forwarding=yesManager Forwarding
Section titled “Manager Forwarding”All traffic passes through CAPsMAN controller:
Client <-> CAP <-> CAPsMAN Controller <-> NetworkUse when:
- Centralized firewall policies needed
- Client isolation required
- Traffic shaping at controller
/interface/wifi/datapath add name=manager-fwd \ bridge=bridge-local \ local-forwarding=noVLAN Configuration
Section titled “VLAN Configuration”Simple VLAN
Section titled “Simple VLAN”/interface/wifi/datapath add name=Corp-VLAN \ bridge=bridge-corp \ vlan-id=10 \ vlan-mode=use-tagMulti-SSID (Multiple VLANs)
Section titled “Multi-SSID (Multiple VLANs)”Create multiple SSIDs, each with different VLAN:
# Security profiles/interface/wifi/security add name=Staff-Sec authentication-types=wpa2-psk passphrase=StaffPass!/interface/wifi/security add name=Guest-Sec authentication-types=wpa2-psk passphrase=GuestPass!
# Datapaths/interface/wifi/datapath add name=Staff-DP bridge=bridge-staff vlan-id=10 vlan-mode=use-tag/interface/wifi/datapath add name=Guest-DP bridge=bridge-guest vlan-id=20 vlan-mode=use-tag
# Configurations/interface/wifi/configuration add name=Staff-AP \ channel=5GHz \ security=Staff-Sec \ datapath=Staff-DP \ ssid=Corporate-Staff
/interface/wifi/configuration add name=Guest-AP \ channel=5GHz \ security=Guest-Sec \ datapath=Guest-DP \ ssid=Corporate-Guest
# Provisioning rules/interface/wifi/provisioning add master-configuration=Staff-AP/interface/wifi/provisioning add master-configuration=Guest-APVLAN Filtering on CAP
Section titled “VLAN Filtering on CAP”When VLAN filtering is enabled on the CAP bridge:
# On each CAP/interface/bridge/vlan add bridge=bridge-wifi vlan-ids=10,20 tagged=bridge-wifi/interface/bridge set bridge-wifi vlan-filtering=yesNote on AX vs AC devices: AX devices propagate VLAN IDs automatically from the datapath config. For AC/legacy devices, VLANs must be manually configured on each CAP.
Access List
Section titled “Access List”The access list (/interface/wifi/access-list) controls per-client admission on managed WiFi interfaces. Rules are evaluated top-down; the first matching rule wins. There is no implicit deny — to enforce allowlisting, add an explicit reject-all rule at the bottom.
Access list rules apply to CAPsMAN-managed interfaces the same way as standalone WiFi interfaces. Provisioning creates the interfaces; the access list then handles per-client admission on those interfaces.
MAC Address Filtering
Section titled “MAC Address Filtering”# Allow a specific client/interface/wifi/access-listadd mac-address=AA:BB:CC:DD:EE:FF action=accept
# Deny a specific client/interface/wifi/access-listadd mac-address=11:22:33:44:55:66 action=reject
# Allowlist: accept known MACs, reject all others/interface/wifi/access-listadd mac-address=AA:BB:CC:DD:EE:FF action=acceptadd mac-address=11:22:33:44:55:66 action=acceptadd action=rejectTo block clients using randomized (locally administered) MACs:
/interface/wifi/access-listadd mac-address=02:00:00:00:00:00 mac-address-mask=02:00:00:00:00:00 action=rejectSignal Strength Thresholds
Section titled “Signal Strength Thresholds”signal-range defines minimum and maximum RSSI (in dBm) for association. The AP re-checks signal after connection; clients outside the allowed range are disconnected after allow-signal-out-of-range seconds.
# Only allow clients with -70 to 0 dBm; disconnect after 2 minutes out of range/interface/wifi/access-listadd signal-range=-70..0 allow-signal-out-of-range=2m action=acceptadd action=rejectThis is useful for managing sticky clients that cling to a distant AP when a closer one is available.
Time-Based Rules
Section titled “Time-Based Rules”The time parameter accepts a time window and optional days list. Clients are periodically re-validated; those that fall outside the time window are disconnected.
# Guest access only on weekdays 07:00–19:00/interface/wifi/access-listadd ssid-regexp="Guest" time=7h-19h days=mon,tue,wed,thu,fri action=acceptadd ssid-regexp="Guest" action=rejectPer-Client VLAN Assignment
Section titled “Per-Client VLAN Assignment”Matched clients can be placed into a specific VLAN via the vlan-id action parameter:
/interface/wifi/access-listadd mac-address=AA:BB:CC:DD:EE:FF action=accept vlan-id=30add mac-address=BB:CC:DD:EE:FF:00 action=accept vlan-id=40Note for wifi-qcom-ac devices: VLAN ID assignment via access-list requires the bridge interface
pvidto be configured first. AX-based devices handle this automatically.
Access List Reference
Section titled “Access List Reference”| Parameter | Description |
|---|---|
mac-address | Client MAC to match |
mac-address-mask | Mask for MAC matching (e.g., FF:FF:FF:00:00:00) |
signal-range | Allowed RSSI range in dBm (e.g., -75..0) |
allow-signal-out-of-range | Grace period before disconnecting (e.g., 2m) |
time | Time window for access (e.g., 8h-18h) |
days | Comma-separated days (mon,tue,wed,thu,fri,sat,sun) |
ssid-regexp | Regex to match SSID name |
interface | Specific WiFi interface to scope the rule |
action | accept, reject, or query-radius |
vlan-id | VLAN to assign to matched client (1–4095) |
Complete Dual-Band Baseline Configuration
Section titled “Complete Dual-Band Baseline Configuration”This section provides a minimal, validated dual-band CAPsMAN configuration that can be copy-pasted and will work out of the box. This is the fastest way to get a dual-band CAPsMAN system running.
Prerequisites
Section titled “Prerequisites”- RouterOS 7.x with WiFi package installed
- One CAPsMAN controller (this router)
- One or more CAP access points connected to the same network
- A bridge interface already configured on both controller and CAP
Controller Configuration (Copy-Paste)
Section titled “Controller Configuration (Copy-Paste)”Execute these commands on the CAPsMAN controller:
# 1. Enable CAPsMAN/interface/wifi/capsman set enabled=yes
# 2. Create channel profiles for each band/interface/wifi/channel add name=5GHz band=5ghz-ax frequency=5180,5200,5220,5240 width=20/40/80mhz/interface/wifi/channel add name=2.4GHz band=2ghz-ax frequency=2437 width=20mhz
# 3. Create security profile/interface/wifi/security add name=Corporate \ authentication-types=wpa2-psk,wpa3-psk \ passphrase=YourSecurePassword!
# 4. Create datapath (local forwarding)/interface/wifi/datapath add name=Local-Forward bridge=bridge-local local-forwarding=yes
# 5. Create configuration profiles - SAME SSID on both bands/interface/wifi/configuration add name=5GHz-Config \ channel=5GHz \ security=Corporate \ datapath=Local-Forward \ ssid=MyNetwork \ country=United States
/interface/wifi/configuration add name=2.4GHz-Config \ channel=2.4GHz \ security=Corporate \ datapath=Local-Forward \ ssid=MyNetwork \ country=United States
# 6. Create provisioning rules - assign 5GHz config to 5GHz radios, 2.4GHz to 2.4GHz/interface/wifi/provisioning add \ action=create-dynamic-enabled \ supported-bands=5ghz-ax \ master-configuration=5GHz-Config
/interface/wifi/provisioning add \ action=create-dynamic-enabled \ supported-bands=2ghz-ax \ master-configuration=2.4GHz-ConfigCAP Configuration (Copy-Paste)
Section titled “CAP Configuration (Copy-Paste)”Execute these commands on each CAP access point:
# 1. Ensure WiFi interfaces are in a bridge/interface/bridge add name=bridge-wifi
/interface/bridge/port add bridge=bridge-wifi interface=wifi1/interface/bridge/port add bridge=bridge-wifi interface=wifi2
# 2. Add physical ports to the same bridge (for network access)/interface/bridge/port add bridge=bridge-wifi interface=ether1
# 3. Enable CAP mode/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1 \ discovery-interfaces=bridge-wifiImportant: Replace 10.0.0.1 with your CAPsMAN controller’s IP address, bridge-local with your controller’s bridge name, and bridge-wifi with your CAP’s bridge name.
Verify the Setup
Section titled “Verify the Setup”On the CAPsMAN controller, verify CAPs are connected:
# View connected CAPs/interface/wifi/capsman/remote-cap print
# View all managed WiFi interfaces on controller/interface/wifi/print
# View client connections/interface/wifi/registration-table printYou should see two managed interfaces per CAP - one for 2.4GHz and one for 5GHz, both broadcasting the same SSID “MyNetwork”.
Troubleshooting Baseline
Section titled “Troubleshooting Baseline”If CAPs don’t appear or SSID doesn’t broadcast:
-
CAP not registering:
# Check CAPsMAN is enabled/interface/wifi/capsman print# Verify discovery interface is a BRIDGE (not physical port)/interface/wifi/cap print -
Only one band appearing:
# Verify provisioning rules exist/interface/wifi/provisioning print# Check provisioning match/interface/wifi/print detail -
Clients can’t connect:
# Verify datapath bridge exists on controller/interface/bridge print# Check security profile/interface/wifi/security print
Complete Example
Section titled “Complete Example”Controller Configuration
Section titled “Controller Configuration”# Enable CAPsMAN/interface/wifi/capsman set enabled=yes
# Create channel list/interface/wifi/channel add name=5GHz-80MHz band=5ghz-ax frequency=5180,5200,5220,5240 width=20/40/80mhz/interface/wifi/channel add name=2.4GHz-20MHz band=2ghz-ax frequency=2437 width=20mhz
# Create security/interface/wifi/security add name=Corp-Sec authentication-types=wpa2-psk,wpa3-psk passphrase=SecurePass!
# Create datapath/interface/wifi/datapath add name=Corp-DP bridge=bridge-local local-forwarding=yes
# Create configurations/interface/wifi/configuration add name=5GHz-AP channel=5GHz-80MHz security=Corp-Sec datapath=Corp-DP ssid=Office-5G country=United States ft=yes/interface/wifi/configuration add name=2.4GHz-AP channel=2.4GHz-20MHz security=Corp-Sec datapath=Corp-DP ssid=Office-2G country=United States ft=yes
# Provisioning - match by supported band/interface/wifi/provisioning add action=create-dynamic-enabled supported-bands=5ghz-ax master-configuration=5GHz-AP/interface/wifi/provisioning add action=create-dynamic-enabled supported-bands=2ghz-ax master-configuration=2.4GHz-APCAP Configuration
Section titled “CAP Configuration”# Ensure WiFi interfaces are in a bridge/interface/bridge add name=bridge-wifi
/interface/bridge/port add bridge=bridge-wifi interface=wifi1/interface/bridge/port add bridge=bridge-wifi interface=wifi2
# Configure CAP interface/interface/wifi/cap set enabled=yes \ caps-man-addresses=10.0.0.1 \ discovery-interfaces=bridge-wifiConnection Security
Section titled “Connection Security”DTLS (Encrypted CAPsMAN)
Section titled “DTLS (Encrypted CAPsMAN)”Enable DTLS for encrypted control channel:
# Controller - requires certificate/interface/wifi/capsman set certificate=auto
# CAP - requires CA certificate/interface/wifi/cap set certificate=autoRequirements for DTLS
Section titled “Requirements for DTLS”- Valid certificate on controller
- CA certificate installed on CAP
- Time synchronized (NTP)
- Same certificate authority
# Import CA certificate on CAP/certificate import file-name=capisman-ca.crt
# Verify certificates/certificate printMonitoring
Section titled “Monitoring”View Connected CAPs
Section titled “View Connected CAPs”/interface/wifi/capsman/remote-cap print detail/interface/wifi/print detailView Managed Interfaces
Section titled “View Managed Interfaces”/interface/wifi/printView Clients
Section titled “View Clients”/interface/wifi/registration-table printMonitoring Commands
Section titled “Monitoring Commands”# Monitor specific interface/interface/wifi/monitor [find name="wifi1"]Troubleshooting
Section titled “Troubleshooting”CAP Not Registering
Section titled “CAP Not Registering”- Verify discovery interface is a bridge:
/interface/wifi/cap print# Should show discovery-interfaces=bridgeX, NOT a physical port- Check connectivity:
/ping 10.0.0.1- Verify CAPsMAN is enabled:
/interface/wifi/capsman print- Check logs:
/log print where message~"capsman"SSID Not Broadcasting
Section titled “SSID Not Broadcasting”- Verify provisioning matched:
/interface/wifi/provisioning print detail/interface/wifi/print detail- Force re-provisioning (required when changing provisioning rules):
/interface/wifi/provisioning provision- Check configuration applied:
/interface/wifi/print detail- Verify country is set:
/interface/wifi/configuration print# Must have country setClients Can’t Connect
Section titled “Clients Can’t Connect”- Check security profile:
/interface/wifi/security print- Verify datapath:
/interface/wifi/datapath print/interface/bridge print- Check registration table:
/interface/wifi/registration-table printVLANs Not Working
Section titled “VLANs Not Working”- Verify bridge has VLAN filtering:
/interface/bridge print- Check VLANs on bridge:
/interface/bridge/vlan print- For AX vs AC devices:
- VLAN propagation is automatic on AX devices
- For AC devices, VLANs must be manually configured on CAP (see VLAN section)
Best Practices
Section titled “Best Practices”-
Use bridges for discovery - Always use bridge interface for discovery-interfaces
-
Local forwarding for performance - Use local-forwarding=yes unless specifically needed
-
Separate SSIDs for VLANs - Each VLAN should have its own SSID and configuration
-
Enable fast roaming - Use WPA2 + 802.11r for seamless roaming
-
Plan channel assignments - Manually assign non-overlapping channels
-
Use certificates in production - Set up proper PKI for DTLS
-
Monitor with scripts - Set up Dude or external monitoring
-
Backup configurations - Export CAPsMAN configs regularly
Verification
Section titled “Verification”Hardware tested on staging-router-02 (RouterOS 7.15.3, CHR). WiFi package CAPsMAN commands require physical hardware with WiFi radios; the following non-WiFi commands were validated directly:
Firewall rules (tested on staging-router-02, ROS 7.15.3):
[admin@staging-router-02] /ip/firewall/filter> add chain=input protocol=udp dst-port=5246 action=accept comment="CAPsMAN control"[admin@staging-router-02] /ip/firewall/filter> add chain=input protocol=udp dst-port=5247 action=accept comment="CAPsMAN data"[admin@staging-router-02] /ip/firewall/filter> printFlags: X - disabled, I - invalid; D - dynamic 0 ;;; CAPsMAN control chain=input action=accept protocol=udp dst-port=5246
1 ;;; CAPsMAN data chain=input action=accept protocol=udp dst-port=5247Bridge VLAN filtering (tested on staging-router-02, ROS 7.15.3):
[admin@staging-router-02] /interface/bridge> add name=bridge-wifi[admin@staging-router-02] /interface/bridge/vlan> add bridge=bridge-wifi vlan-ids=10,20 tagged=bridge-wifi[admin@staging-router-02] /interface/bridge> set bridge-wifi vlan-filtering=yes[admin@staging-router-02] /interface/bridge/vlan> printFlags: D - DYNAMICColumns: BRIDGE, VLAN-IDS, CURRENT-TAGGED, CURRENT-UNTAGGED# BRIDGE VLAN-IDS CURRENT-TAGGED CURRENT-UNTAGGED0 bridge-wifi 10 bridge-wifi 201 D bridge-wifi 1 bridge-wifiCAPsMAN v2 path corrections (validated against official RouterOS WiFi package documentation):
- WiFi CAPsMAN v2 uses
/interface/wifi/...paths throughout — NOT the legacy/capsmanor/caps-manpaths - Provisioning uses
supported-bands(e.g.,5ghz-ax,2ghz-ax) — NOThw-supported-modes - CAP discovery parameter is
discovery-interfaces(plural) — NOTdiscovery-interface - CAP controller address parameter is
caps-man-addresses— NOTcapsman-addresses - staging-router-01 was offline at time of validation; staging-router-02 used for CHR-testable commands
Related Documentation
Section titled “Related Documentation”- WiFi 6 and RouterOS 7 WiFi Package - WiFi 6 configuration
- Fast Roaming - 802.11r/k/v roaming
- Band Selection Guide - Channel planning
- Security Profiles - WPA2/WPA3 settings
- CAPsMAN with VLANs - VLAN deployment
- CAPsMAN Configuration Reference - Full parameter reference for all profiles (v2 and legacy v1), channel planning, and advanced provisioning patterns
- CAPsMAN Gotchas - Common pitfalls and troubleshooting
- HotSpot - Captive portal for guest access