Skip to content

CAPsMAN Common Gotchas

This guide addresses common issues encountered when deploying and managing MikroTik CAPsMAN (Centralized Access Point Manager). These pitfalls frequently trip up administrators, particularly those new to RouterOS 7’s CAPsMAN implementation.

CAPsMAN provides powerful centralized wireless management, but several configuration details can cause unexpected behavior. This guide covers the most common issues and their solutions.

1. WiFi vs Wireless Interface Incompatibility

Section titled “1. WiFi vs Wireless Interface Incompatibility”

CAPs using different interface types cannot be managed by the same CAPsMAN controller.

  • CAP appears in CAPsMAN remote-cap list with “Ok” state
  • Provisioning never applies; SSID not set
  • CAP connects but wireless interface remains disabled

RouterOS 7 split wireless into two packages:

  • wifi - Wave2/QCA chipsets (newer hardware)
  • wireless - Legacy Atheros/MediaTek chipsets

A CAPsMAN controller using wifi interfaces cannot manage CAPs using wireless interfaces, and vice versa.

Ensure CAPsMAN controller and all CAPs use the same interface type:

# Check interface types on controller
/interface/print
/interface/wifi/print
/interface/wireless/print

For legacy devices (mAP-lite, cAP ac, etc.), install the wireless package on the controller.

CAPs connect to CAPsMAN but configuration doesn’t get provisioned.

Incorrect radio-mac setting in provisioning rules. Using 00:00:00:00:00:00 explicitly causes provisioning to fail.

Leave radio-mac blank and use supported-bands instead of matching specific MACs:

Correct provisioning config:

/interface/wifi/provisioning
add action=create-dynamic-enabled master-configuration=5ghz-cfg supported-bands=5ghz-ax
add action=create-dynamic-enabled master-configuration=2ghz-cfg supported-bands=2ghz-ax

Wrong (legacy format that doesn’t work in RouterOS 7):

add action=create-dynamic-enabled master-configuration=5ghz-cfg radio-mac=00:00:00:00:00:00

CAPs cannot discover or connect to CAPsMAN controller.

Use a bridge interface for discovery, not physical ethernet ports. This is critical when CAPs are behind network infrastructure like powerline adapters.

CAP configuration:

/interface/wifi/cap
set discovery-interfaces=bridgeLocal enabled=yes

CAPsMAN controller:

/interface/wifi/capsman
set enabled=yes interfaces=bridgeLocal

4. VLAN Filtering Breaks CAPsMAN Communication

Section titled “4. VLAN Filtering Breaks CAPsMAN Communication”

When VLAN filtering is enabled on the bridge, CAPsMAN communication fails or CAPs lose connectivity.

  • CAP was working, then stops after enabling VLAN filtering
  • Management VLAN doesn’t work properly

Add the management VLAN and bridge itself to the allowed VLANs:

/interface/bridge/vlan
add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=100

Important: Reboot CAP after enabling VLAN filtering - this is required for proper operation.

5. AC Devices Don’t Auto-Propagate VLAN IDs

Section titled “5. AC Devices Don’t Auto-Propagate VLAN IDs”

AX devices can set VLAN ID in datapath and it propagates automatically; AC devices cannot.

Manually create VLAN interfaces on each CAP and configure datapath on CAP pointing to local bridge:

CAP side:

/interface/wifi/cap
set slaves-static=yes
/interface vlan
add interface=bridge1 name=vlan100-mgmt vlan-id=100
/interface/wifi/datapath
add bridge=bridge1 name=capdp
/interface/wifi
set [find] datapath=capdp

6. Bridge Required in Datapath Configuration

Section titled “6. Bridge Required in Datapath Configuration”

CAPs connect but traffic doesn’t forward; clients can’t get IP.

Datapath configured to use physical interface instead of bridge.

In datapath configuration, reference the bridge, not physical interfaces:

Correct:

/interface/wifi/datapath
add bridge=bridge1 name=datapath-cfg

Wrong (common mistake):

add bridge=ether1 name=datapath-cfg

Using the bridge ensures all VLANs carried by the bridge are available to wireless clients.

7. Performance: Local Forwarding vs CAPsMAN Forwarding

Section titled “7. Performance: Local Forwarding vs CAPsMAN Forwarding”

CAPsMAN-managed WiFi is significantly slower than autonomous AP configuration.

All wireless traffic must pass through the CAPsMAN controller in CAPsMAN forwarding mode, creating a central bottleneck.

Enable local forwarding in datapath for better performance:

/interface/wifi/datapath
add bridge=bridge1 local-forwarding=yes name=datapath-cfg
ModePerformanceCentral Control
Local forwardingBetterLess
CAPsMAN forwardingCPU bottleneckFull

For high-throughput deployments, consider using CAPsMAN only for configuration management while enabling local forwarding.

CAPs have residual local WiFi configurations that interfere with provisioned settings.

  • After provisioning, CAP interfaces show “SSID not set”
  • Manual provisioning works but automatic doesn’t

Reset CAP to factory defaults, then configure only CAP mode:

On CAP device:

/system/reset-configuration no-defaults=yes skip-backup=yes

Then configure only:

/interface/wifi/cap
set enabled=yes discovery-interfaces=bridgeLocal

Remove any local /interface/wifi/configuration, /interface/wifi/security on the CAP - let CAPsMAN push all configuration.

Clients can’t roam properly between hAP ax2/hAP ax3 access points; constant connect/disconnect cycles.

Enable RSTP on the CAP bridge:

/interface/bridge
set bridge1 protocol-mode=rstp

Note: This is specifically required for hAP ax devices (wifi-qcom chipset).

10. Certificate Issues When Reassigning CAPs

Section titled “10. Certificate Issues When Reassigning CAPs”

CAP won’t connect to new CAPsMAN controller or after controller change.

Delete existing certificates on the CAP before reassigning:

On CAP:

/system/certificate/print
/system/certificate/remove [find]

Then reconnect to new CAPsMAN.

IssueFirst Check
CAP not appearingDiscovery interface set to bridge?
Provisioning not applyingradio-mac blank? Using supported-bands?
No WiFi SSIDReset CAP to CAPs mode?
Clients can’t get IPDatapath uses bridge (not ether)?
Slow performanceTry local-forwarding=yes
Roaming failsRSTP enabled on hAP ax?
VLAN issuesAC devices need manual VLAN config?
Can’t reassign CAPDelete certificates first?