I have tried to disable all firewall rules (default rules created by "Home AP Dual" configuration) and HAP1 started to discover CAPsMAN server and manage its wireless interfaces. The firmware is the latest 6.40.2 on both HAP1 and HAP2.
I have also tried to reset configuration on HAP1 and re-enable CAPsMAN of fresh default configuration - it still cannot find manage its wireless interfaces.
Below are the rules, that i have in my firewall:
# aug/27/2017 10:21:23 by RouterOS 6.40.1
# software id = 2PNJ-7RK4
#
# model = RouterBOARD 952Ui-5ac2nD
# serial number = 1234567890
/ip firewall filter
add action=accept chain=input comment="VPN Traffic" dst-port=1701 protocol=\
udp
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat disabled=yes out-interface=all-ppp
add action=dst-nat chain=dstnat dst-port=9091 log-prefix=OMV_Torrent_ \
protocol=tcp to-addresses=192.168.0.115 to-ports=9091
add action=dst-nat chain=dstnat dst-address=1.1.1.1 dst-port=5001 \
in-interface-list=WAN protocol=tcp to-addresses=\
192.168.0.110 to-ports=5001
Are there any special rules that i need to create for CAPsMAN?