no, the reject are
/caps-man access-list
add action=reject disabled=no interface=cap-office
without any mac address
do not confuse mac-address with mac-mask
The issue is that interfaces are dynamically created. I connect my CAP-s using CAP mode of the AP and interfaces are dynamically created.
That's because I plan to connect a batch of 30+ CAP-s in the future. If I use Create dynamic, then I just switch the CAP-s to CAP mode, plug them and done.
So, rather than specifying interface, I need to specify SSID or something different. But there aren't that many options when it comes to MAC filtering.
I can do it with the DHCP and firewall.
1. The client receives IP from the DHCP.
2. I assign static lease and add him to list, that allows him to use internet. Having IP bound to MAC...
3. Allow internet access from this IP to the Internet by creating firewall rule, which bypasses the general DROP for all IP-s from the mentioned DHCP.
4. Unless he is allowed via firewall rule, the client gets IP, but nothing more.
But...
This is much more tedious to manage. Although using MAC filter means that nobody, whose MAC was not specified will be able to connect to the network at all.
But
Manually setting up all CAP interfaces, while I run two virtual APs on one physical AP and etc is also tedious task.
Also, bounding MAC-s to IP-s means that I no longer can use these IP-s even if the device is no longer present, unless I manually remove the static lease.
There is also an option, where my DHCP uses static leases only. And unless the device is previously added, no IP will be received. But this again means two lists, because if one manually specifies IP and there isn't firewall rule to block all, except allowed, then he will be able to access internet.
My idea is not to impede people from using internet on their devices, but because the network will grow up significantly in size, I need to control what devices are connected. So, even if someone has the password, he can't just connect random device to the network. So, even if someone from the staff gives the password to their friend or whatever, this person won't be able to use internet or poke around unnoticed.
I know that MAC can be spoofed, but two devices with identical MAC-s...Because no device with MAC different than specified list will be able to connect to the internet...will be noticed.
And having two networks running on the same IP-s creates other sort of issues. I need to specify SSID or interface. Interfaces are dynamically created in this case. And wildcard blocking means that clients won't be able to connect to the hotspot.
My config is not simple one.
One port from the mikrotik router is reserved for WLANs. It is a part of a bridge.. There are two VLANS on this bridge One is assigned to the master config, other to slave config of the CAP-s, so I can have two SSIDs on a single CAP. And if I consider that one port is no more adequate, I will just add another port to the bridge and connect more CAP-s.
-------
Where I can find info about SSID REGEXP and will this work at all? Having MAC filter with SSID REGEXP, so the filter works on the specified SSID but on all dynamically added CAP-s?