Skip to content

WPA3 Configuration and Compatibility

WPA3 is the current WiFi security standard, providing stronger protection than WPA2 through Simultaneous Authentication of Equals (SAE), Opportunistic Wireless Encryption (OWE), and mandatory Protected Management Frames (PMF). RouterOS 7.x with the wifi package supports WPA3 natively.

:::info RouterOS Requirement WPA3 requires RouterOS 7.x with the wifi (wifiwave2) package. RouterOS 6.x is limited to WPA2. Upgrade to 7.3.1 or later — earlier 7.x versions had WPA2/WPA3 disconnection bugs. :::

VariantUse CaseKey Feature
WPA3-Personal (SAE)Home and small officeReplaces PSK with SAE handshake
WPA3-EnterpriseCorporate/RADIUS environments192-bit security, mandatory PMF
OWEOpen/guest networksEncryption without password
WPA2/WPA3 TransitionMixed device environmentsSupports both old and new clients

SAE (Simultaneous Authentication of Equals) replaces the PSK handshake used in WPA2. It eliminates offline dictionary attacks — an attacker who captures the handshake cannot brute-force the passphrase offline.

/interface wifi security
add name="wpa3-home" \
authentication-types=wpa3-psk \
pmf=required \
passphrase="YourSecurePassphrase"
/interface wifi security
add name="wpa3-tuned" \
authentication-types=wpa3-psk \
pmf=required \
passphrase="YourSecurePassphrase" \
sae-anti-clogging-threshold=5 \
sae-max-failure-rate=40

Tip: If clients report SAE handshake failures, adjusting sae-anti-clogging-threshold (default 5) and sae-max-failure-rate (default 40) can resolve intermittent connection issues.

WPA3-Enterprise requires a RADIUS server and provides 192-bit security with mandatory GCMP-256 encryption.

/interface wifi security
add name="wpa3-corp" \
authentication-types=wpa3-eap \
pmf=required \
eap-methods=eap-tls \
eap-tls-certificate=server-cert \
encryption=gcmp-256

OWE encrypts open network traffic without requiring a password. Clients connect as to an open network but traffic is encrypted end-to-end.

/interface wifi security
add name="owe-guest" \
authentication-types=owe \
pmf=required
Section titled “OWE Transition Mode (Recommended for Guest Networks)”

Transition mode broadcasts both an open SSID (for older devices) and an OWE-encrypted SSID simultaneously. Modern clients automatically use OWE.

# Create the OWE interface
/interface wifi
add name="guest-owe" ssid="GuestNetwork" security=owe-guest
# Create the open fallback (hidden)
/interface wifi
add name="guest-open" ssid="GuestNetwork" security=owe-open disabled=no
# Link them
/interface wifi security
set [find name=owe-guest] owe-transition-interface=guest-open

PMF (802.11w) protects deauthentication and disassociation frames against spoofing attacks. WPA3 requires PMF.

PMF SettingBehaviorUse When
disabledNo PMF — WPA2 onlyLegacy-only networks
optionalClients choose — WPA2 and WPA3 workMixed environments
requiredOnly PMF-capable clients connectWPA3-only networks
# Check current PMF setting
/interface wifi security print
# Set PMF mode
/interface wifi security set [find name=my-profile] pmf=optional

:::warning IoT Device Compatibility Most IoT devices manufactured before 2019 do not support PMF. Setting pmf=required on an SSID shared with older smart home devices, cameras, or industrial sensors will prevent them from connecting. Use a separate SSID with pmf=optional or pmf=disabled for IoT devices. :::

Transition mode is the recommended deployment strategy for most environments. WPA3-capable clients use SAE; legacy clients fall back to WPA2-PSK.

/interface wifi security
add name="wpa2-wpa3-mixed" \
authentication-types=wpa2-psk,wpa3-psk \
pmf=optional \
passphrase="YourPassphrase"
/interface wifi security
add name="wpa2-wpa3-enterprise" \
authentication-types=wpa2-eap,wpa3-eap \
pmf=optional

WPA3 has real-world compatibility issues. Test all device types before production deployment.

Device CategoryReported IssueWorkaround
Samsung (various)Disconnections in transition modeUse WPA3-only or WPA2-only
Apple iPhone (some)Won’t reconnect automatically after roamingDisable WPA3 if using 802.11r
Older AndroidSAE not supported or brokenWPA2/WPA3 transition mode
Most AndroidRoaming failures with WPA3Use WPA2-only if 802.11r required
Pre-2019 IoT devicesNo PMF support — cannot connectSeparate WPA2 SSID
Device CategoryNotes
Linux laptops (ThinkPad, etc.)Generally reliable
Google Pixel 4A, 6A, 7ANo reported issues
Xiaomi Mi 9 SEWorks well
Modern Windows laptopsGenerally good, varies by driver

WPA3 is incompatible with 802.11r fast roaming on most Android devices. If seamless roaming is a requirement, use WPA2-only:

# Roaming-optimized profile — WPA2 only
/interface wifi security
add name="roaming-profile" \
authentication-types=wpa2-psk \
pmf=optional \
ft=yes \
ft-over-ds=yes \
passphrase="YourPassphrase"

See the Fast Roaming guide for full 802.11r configuration.

# WPA2/WPA3 transition — covers everything
/interface wifi security
add name="home" \
authentication-types=wpa2-psk,wpa3-psk \
pmf=optional \
passphrase="HomePassphrase"
# WPA3 only — maximum security
/interface wifi security
add name="office-wpa3" \
authentication-types=wpa3-psk \
pmf=required \
passphrase="OfficePassphrase"
# WPA2 only for IoT SSID
/interface wifi security
add name="iot-ssid" \
authentication-types=wpa2-psk \
pmf=disabled \
passphrase="IoTPassphrase"
# WPA3 for main SSID on separate VLAN
/interface wifi security
add name="main-ssid" \
authentication-types=wpa2-psk,wpa3-psk \
pmf=optional \
passphrase="MainPassphrase"

Use OWE transition mode (see OWE section above) to encrypt guest traffic without requiring a password.

SymptomLikely CauseFix
Client won’t connect to WPA3Device doesn’t support SAE or PMFUse transition mode or WPA2-only
Constant disconnectionsRouterOS < 7.3.1 bugUpgrade RouterOS
No roaming (stays on weak AP)Android + WPA3 incompatibilitySwitch to WPA2-only
IoT device can’t connectPMF required, device doesn’t support itSet pmf=optional or separate SSID
SAE handshake failureAnti-clogging threshold too lowIncrease sae-anti-clogging-threshold
WPA3-Enterprise 192-bit failuresSupplicant lacks GCMP-256 supportUse WPA2/WPA3-Enterprise transition
# View security profiles
/interface wifi security print detail
# Check connected client authentication type
/interface wifi registration-table print
# View WiFi-related log entries
/log print where topics~"wireless"
# Check if client supports WPA3
/interface wifi registration-table print where interface=wlan1
# Look for "auth-type" in the output
VersionWPA3 Status
6.xNot supported — WPA2 only
7.0–7.3.0WPA3 available but has disconnection bugs
7.3.1+Recommended — disconnection issues fixed
7.x latestBest compatibility and stability