Files
infrastructure/docs/07-WIFI-CAPSMAN-CONFIG.md
Kaloyan Danchev 2a522d56d2
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
docs: update configs after CAP recovery and roms share setup
- 07-WIFI-CAPSMAN: CAP both radios working, access list no VLAN assignment
- 01-NETWORK-MAP: fix CAP IP .6→.2, add Nobara and SMB shares section
- 04-HARDWARE-INVENTORY: CAP SSH/version details, add Recalbox device
- 06-VLAN-DEVICE-ASSIGNMENT: add Nobara (VLAN 10), Recalbox (VLAN 25)
- 03-SERVICES-OTHER: add Roms SMB share section with mount details
- CHANGELOG: add 2026-02-14 entries

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-14 16:50:01 +02:00

5.5 KiB

WiFi and CAPsMAN Configuration

Last Updated: 2026-02-14 Purpose: Document WiFi network settings, CAPsMAN configuration, and device compatibility requirements


Network Overview

SSID Band Purpose Password
XTRM 5GHz Primary network (fast devices) M0stW4nt3d@home
XTRM2 2.4GHz IoT/Legacy devices M0stW4nt3d@IoT

XTRM (5GHz) - wifi1

Target: Modern devices (phones, laptops, tablets)

Setting Value
SSID XTRM
Band 5GHz
Mode 802.11ax (WiFi 6)
Channel Auto (DFS enabled)
Width 80MHz
Security WPA2-PSK + WPA3-PSK
Cipher CCMP (AES)
802.11r (FT) Enabled
Password M0stW4nt3d@home

XTRM2 (2.4GHz) - wifi2

Target: IoT devices, legacy devices, smartwatches

CRITICAL COMPATIBILITY REQUIREMENTS

Some devices (Tuya JMWZG1 gateway, Amazfit TREX3, iPad 2) require legacy settings:

Setting Value Reason
SSID XTRM2
Band 2.4GHz IoT compatibility
Mode 802.11g Legacy device support
Channel 1 (2412 MHz) Most compatible
Width 20MHz Required for old devices
Security WPA-PSK + WPA2-PSK WPA needed for legacy
Cipher TKIP + CCMP TKIP required for old devices
802.11r (FT) Disabled Causes issues with IoT
Password M0stW4nt3d@IoT

Devices Requiring WPA + TKIP

Device MAC Address Model Notes
Roborock S7 Vacuum B0:4A:39:3F:9A:14 S7 Requires WPA+TKIP
Amazfit TREX3 TBD Smartwatch Requires WPA+TKIP
Tuya Smart Gateway 38:1F:8D:04:6F:E4 JMWZG1 Requires WPA+TKIP
iPad 2 TBD A1395/A1396 Legacy device

RouterOS Commands for XTRM2

# Working configuration for legacy devices
/interface wifi set wifi2 \
    channel.frequency=2412 \
    channel.band=2ghz-g \
    channel.width=20mhz \
    security.authentication-types=wpa-psk,wpa2-psk \
    security.encryption=tkip,ccmp \
    security.ft=no \
    security.ft-over-ds=no \
    security.passphrase="M0stW4nt3d@IoT"

Fallback (Maximum Compatibility)

If devices still can't connect, use WPA-only with TKIP-only:

/interface wifi set wifi2 \
    security.authentication-types=wpa-psk \
    security.encryption=tkip

CAPsMAN Configuration

Manager (HAP ax³ - 192.168.10.1)

Setting Value
Enabled Yes
Interfaces bridge, vlan10-mgmt
Certificate Auto-generated

CAP Device (CAP XL ac - 192.168.10.2)

Setting Value
caps-man-addresses 192.168.10.1
certificate request
RouterOS 7.21.1
SSH Port 2222
SSH ssh -i ~/.ssh/mikrotik_key -p 2222 xtrm@192.168.10.2

Note: CAP was factory reset on 2026-02-13. CAPsMAN certificate was regenerated and CAP re-enrolled with certificate=request.

CAP Interfaces

Interface Radio Band SSID Security Status
cap-wifi1 wifi1 2.4GHz XTRM2 WPA2-PSK, CCMP Working
cap-wifi2 wifi2 5GHz XTRM WPA2/WPA3-PSK Working (Ch 5220, 20/40MHz)

Note: cap-wifi1 uses cfg-xtrm2 but with WPA2+CCMP only (not WPA+TKIP like the local wifi2). Legacy IoT devices requiring TKIP will only work on HAP1's local wifi2.


WiFi Access List

Status: VLAN assignment via access list is not active (rolled back 2026-01-27). All entries use action=accept without VLAN ID. Devices get their VLAN via DHCP static leases on the bridge.

29 entries configured (MAC-based accept rules + 1 default catch-all):

# MAC Device Notes
0 AA:ED:8B:2A:40:F1 Samsung S25 Ultra - Kaloyan
1 82:6D:FB:D9:E0:47 MacBook Air - Nora
12 CE:B8:11:EA:8D:55 MacBook - Kaloyan
13 BE:A7:95:87:19:4A MacBook 5GHz - Kaloyan
27 B8:27:EB:32:B2:13 RecalBox RPi3 VLAN 25 (Kids)
28 CC:5E:F8:D3:37:D3 ASUS ROG Ally - Kaloyan
29 (any) Default - VLAN40 Catch-all

Show Full Access List

/interface wifi access-list print

Troubleshooting

Device can see XTRM2 but can't connect

  1. Check security settings - device may need WPA (not WPA2)
  2. Check cipher - device may need TKIP (not CCMP/AES)
  3. Try 802.11g mode instead of 802.11n
  4. Use channel 1, 6, or 11

Device connects but disconnects immediately

  1. Check if 802.11r (Fast Transition) is disabled
  2. Check VLAN assignment - CAP clients need special rule
  3. Check channel width - use 20MHz for stability

CAP not connecting to CAPsMAN

  1. Check certificate - remove old cert and re-request
  2. Check firewall - ports 5246-5247 UDP must be open
  3. Check interface binding - CAPsMAN must listen on correct interface

Backup Files

File Location Purpose
wifi-backup-working.rsc Router files WiFi config export
config-backup-working.backup Router files Full system backup

Quick Reference

Show WiFi status

/interface wifi print
/interface wifi monitor wifi2 once
/interface wifi registration-table print

Show security settings

/interface wifi security print detail
:put [/interface wifi get wifi2 security.authentication-types]
:put [/interface wifi get wifi2 security.encryption]

Check CAPsMAN

/interface wifi capsman print
/interface wifi capsman remote-cap print