Skip to content

WiFi Guide

This guide covers everything you need to get MikroTik WiFi working optimally - from quick setup to advanced configurations.

Quick Start: Get WiFi Working in 5 Minutes

Section titled “Quick Start: Get WiFi Working in 5 Minutes”

Option 1: Quick AP (RouterOS 7.13+ with WiFi package)

Section titled “Option 1: Quick AP (RouterOS 7.13+ with WiFi package)”
Terminal window
# Create security profile
/interface wifi security add name=mywifi authentication-types=wpa2-psk passphrase=YourSecurePassword
# Create channel configuration
/interface wifi channel add name=5ghz frequency=5180,5200,5220,5240 band=5ghz-ax width=20/40/80mhz
# Create configuration profile
/interface wifi configuration add name=myconfig security=mywifi channel=5ghz
# Add WiFi interface and set as AP
/interface wifi add configuration=myconfig name=wifi1 master-interface=none
# Enable the interface
/interface wifi enable wifi1

Verify the setup:

Terminal window
/interface wifi print
/interface wifi security print
/interface wifi channel print
/interface wifi configuration print

Option 2: Quick AP (Legacy wireless package)

Section titled “Option 2: Quick AP (Legacy wireless package)”
Terminal window
/interface wireless set wlan1 mode=ap-bridge ssid=MikroTik frequency=2437 security-profile=default
/interface wireless enable wlan1

These settings work well for typical home networks. Start with these values and adjust only if you have specific requirements.

Single AP (RouterOS 7.13+ with WiFi package)

Section titled “Single AP (RouterOS 7.13+ with WiFi package)”
SettingRecommended ValueWhy
SSIDYourNetworkNameUse 2.4GHz for long-range, 5GHz for speed
Band5ghz-ac or 2ghz-n5GHz is less congested; 2.4GHz has better range
Channel Width40MHz (5GHz) / 20MHz (2.4GHz)40MHz is max non-DFS; 20MHz avoids interference on 2.4GHz
Frequency5180-5240 (5GHz) or 1/6/11 (2.4GHz)Non-DFS channels avoid radar delays; 1/6/11 are non-overlapping
SecurityWPA2-PSKBest compatibility; add WPA3 if all clients support it
TX Power17-20 dBmStart conservative; increase only if needed
Modeap-bridgeRequired for WiFi interface to act as AP

Quick apply these defaults:

Terminal window
# 5GHz - better performance
/interface wifi security add name=home-sec authentication-types=wpa2-psk passphrase=YourSecurePassword
/interface wifi channel add name=home-5ghz band=5ghz-ac frequency=5180,5200,5220,5240 width=20/40/80mhz
/interface wifi configuration add name=home-config security=home-sec channel=home-5ghz ssid=YourNetworkName
/interface wifi add configuration=home-config name=wifi1 master-interface=none
# 2.4GHz - better range
/interface wifi security add name=home-sec-2g authentication-types=wpa2-psk passphrase=YourSecurePassword
/interface wifi channel add name=home-2ghz band=2ghz-n frequency=2412,2437,2462 width=20/40mhz
/interface wifi configuration add name=home-config-2g security=home-sec-2g channel=home-2ghz ssid=YourNetworkName-2G
/interface wifi add configuration=home-config-2g name=wifi2 master-interface=none
SettingRecommended ValueWhy
Modeap-bridgeRequired for AP operation
Frequency2437 (2.4GHz) or 5180 (5GHz)Center of non-DFS range
Band2ghz-n (2.4GHz) or 5ghz-n/ac (5GHz)Best client compatibility
Channel Width20MHz (2.4GHz) / 40MHz (5GHz)Avoids overlap issues
Security Profiledefault or customUse default initially
SSIDYourNetworkNameVisible network name
TX Power17-20 dBmConservative starting point

Quick apply:

Terminal window
/interface wireless set wlan1 mode=ap-bridge ssid=YourNetworkName frequency=2437 band=2ghz-n channel-width=20/40mhz
/interface wireless enable wlan1
SettingRecommended ValueWhy
Provisioningcreate-dynamic-enabledAutomatically provisions CAPs
Channel40MHz (5GHz) / 20MHz (2.4GHz)Same as single AP
SecurityWPA2-PSKConsistent across all APs
ForwardinglocalBetter performance; CAP handles switching
Datapathbridge=your-bridgeAdd clients to your network bridge

Quick CAPsMAN defaults:

Terminal window
/caps-man channel add name=5ghz band=5ghz-n/ac frequency=5180 width=40mhz
/caps-man channel add name=2ghz band=2ghz-n frequency=2437 width=20mhz
/caps-man security add name=home authentication-types=wpa2-psk passphrase=YourPassword
/caps-man configuration add name=cfg-5ghz channel=5ghz security=home ssid=YourNetwork
/caps-man configuration add name=cfg-2ghz channel=2ghz security=home ssid=YourNetwork-2G
/caps-man provisioning add action=create-dynamic-enabled master-configuration=cfg-5ghz

RouterOS offers two WiFi systems:

FeatureLegacy WirelessNew WiFi (7.13+)
Packagewirelesswifi + wifi-qcom-ac/wifi-qcom
Hardware802.11a/b/g/n/ac (MIPS/ARM)Wi-Fi 5 wave2, Wi-Fi 6 (ARM only)
Menu path/interface wireless/interface wifi
ConfigurationDirect interface settingsProfile-based
WPA3NoYes
802.11r/k/vLimitedFull support
  • Legacy wireless: Older devices (MIPS CPU), 802.11n or earlier
  • New WiFi (WifiWave2): ARM devices with Wi-Fi 5/6 (hAP ac², ac³, ax, Audience, etc.)

CAPsMAN (Controlled Access Point Manager) lets you manage multiple APs from one router.

  • 3+ APs needing consistent configuration
  • Multiple floors/buildings
  • Guest/VLAN segmentation
  • Centralized monitoring
Terminal window
# On CAPsMAN router (the controller)
/caps-man manager set enabled=yes
# Create provisioning rules
/caps-man provisioning add action=create-dynamic-enabled master-configuration=default
# Create configuration profiles
/caps-man channel add frequency=5180 name=5ghz-ch band=5ghz-n/ac width=40mhz
/caps-man security add name=mysec authentication-types=wpa2-psk passphrase=YourPassword
/caps-man configuration add name=mycfg channel=5ghz-ch security=mysec ssid=MyNetwork
# On each CAP (the APs)
/system routerboard caps-mode set enabled=yes

Verify the CAPsMAN setup:

Terminal window
/caps-man manager print
/caps-man provisioning print
/caps-man channel print
/caps-man security print
/caps-man configuration print
  1. Configuration Profiles: Channel, Security, Datapath, Configuration
  2. Provisioning: Automatic or manual radio assignment
  3. Forwarding Modes: Local (CAP handles traffic) vs Manager (CAPsMAN handles traffic)
  4. Certificates: For secure CAP-to-CAPsMAN DTLS connections
ProblemSolution
CAP not connectingCheck discovery interface, use bridge not ethernet
SSIDs not broadcastingReset AP to CAP mode, check provisioning rules
Slow performanceEnable local forwarding in datapath
iPhone disconnectsUse 40MHz on 5GHz, 20MHz on 2.4GHz, fix channels not auto

2.4 GHz: Use channels 1, 6, or 11 only (non-overlapping)

Terminal window
# Fixed channels for 2.4GHz
/interface wifi channel add band=2ghz-n frequency=2412 name=ch1
/interface wifi channel add band=2ghz-n frequency=2437 name=ch6
/interface wifi channel add band=2ghz-n frequency=2462 name=ch11

Verify channel configuration:

Terminal window
/interface wifi channel print

5 GHz: More options, avoid DFS if possible

Terminal window
# Common 5GHz channels (non-DFS)
/interface wifi channel add frequency=5180,5200,5220,5240 name=5ghz band=5ghz-n/ac
Terminal window
# Set TX power (in dBm)
/interface wifi set wifi1 tx-power=20

Rule of thumb: Start low and increase only if needed. Too high = more interference, worse performance.

  1. Use 5 GHz whenever possible - more channels, less congestion
  2. 80 MHz channels for max throughput, 20/40 MHz for reliability
  3. Enable local forwarding in CAPsMAN datapath for better performance
  4. Limit signal strength to reduce co-channel interference
  5. Use iperf3 for testing, not RouterOS built-in speed test

Terminal window
# WPA2-PSK (most compatible)
/interface wifi security add authentication-types=wpa2-psk passphrase=password name=wpa2
# WPA3-SAE (latest, most secure)
/interface wifi security add authentication-types=wpa3-psk passphrase=password name=wpa3
# WPA2/WPA3 mixed
/interface wifi security add authentication-types=wpa2-psk,wpa3-psk passphrase=password name=mixed

Verify security profiles:

Terminal window
/interface wifi security print

For seamless roaming between APs:

Terminal window
/interface wifi security add authentication-types=wpa2-psk ft=yes ft-r0-key-lifetime=10000 \
ft-mobility-domain=1234 passphrase=password name=fast-roam

Verify fast roaming is enabled:

Terminal window
/interface wifi security print

Important:

  • All APs must be managed by the same RouterOS instance
  • WPA2-only works best; WPA3 has device compatibility issues
  • Android devices may have problems with WPA3 roaming

See Fast Roaming (802.11r/k/v) for detailed configuration and troubleshooting.

Terminal window
/interface wifi security add authentication-types=wpa2-eap eap-certificate-mode=verify-certificate \
name=enterprise radius-called-format=mac:ssid radius-mac-format=xx:xx:xx:xx:xx:xx

No WiFi interface appears

  • Check RouterOS version and packages (/system package print)
  • New WiFi requires wifi + wifi-qcom-ac or wifi-qcom packages
  • Legacy wireless requires wireless package

Slow speeds

  • Switch to 5 GHz
  • Reduce channel width
  • Lower TX power
  • Check for interference (/interface wifi scan)

Client disconnects

  • WPA2/WPA3 mixed mode issues - try WPA2-only
  • Check DHCP lease times
  • Enable 802.11w management frame protection
  • Update RouterOS (7.3.1 fixed many WPA issues)

CAPsMAN won’t see CAPs

  • Use bridge as discovery interface, not ethernet
  • Check firewall allows CAPsMAN ports
  • Verify CAP is in CAP mode
Terminal window
# Scan for networks
/interface wifi scan wifi1
# View connected clients
/interface wifi registration-table print
# Enable wireless debug logs
/system logging add topics=wireless,debug action=memory
# Check signal levels
/interface wifi registration-table print where interface=wifi1

  1. Choose the right system: Legacy wireless (MIPS) vs New WiFi (ARM with WifiWave2)
  2. Use 5 GHz for performance, 2.4 GHz for range/compatibility
  3. Fixed channels beat auto-select
  4. CAPsMAN for 3+ APs
  5. WPA2 for best compatibility, WPA3 if you need latest security
  6. 802.11r for fast roaming (WPA2-only works best)
  7. Keep RouterOS updated - many WiFi fixes in 7.3.1+