Good idea - that will isolate whether it's software or hardware related.Maybe just set channel to 5180
Yes, got me surprised with my first ax(2) device. Quite a wide range in 5GHz, probably not supported by my PC (it has an ax wifi card (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)), or only at low power. Those frequencies are new to me as well. viewtopic.php?t=202544#p1047708Another possibility when device is set to default (wide) frequency range: hAP ax2 chooses to use one of U-NII3 channels which are not supported by not-so-recent wireless devices.
Immediate follow-up, yes this is indeed how it works. Consider this part of the spectrum:I was told you can put 5180 in frequency and that indeed works - but forcing Ceee. I wonder if I put 5200 in there that I'd get eCee?
# 2024-01-29 11:29:04 by RouterOS 7.13.3
# software id = 8SND-BECL
#
# model = C52iG-5HaxD2HaxD
# serial number = HE508WV8MKT
/interface bridge
add admin-mac=48:A9:8A:64:E9:B4 auto-mac=no comment=defconf name=bridge \
port-cost-mode=short
/interface vlan
add interface=bridge name=guest-vlan vlan-id=10
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=VLAN
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=middle-earth
add authentication-types=wpa2-psk,wpa3-psk disabled=no name=shire
add disabled=no name=open
/interface wifi
set [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=\
10min-cac .width=20/40mhz configuration.country="United Kingdom" .mode=ap \
.ssid="Middle Earth" disabled=no name=private-2g security=middle-earth
set [ find default-name=wifi1 ] channel.band=5ghz-ax .frequency=5500 \
.skip-dfs-channels=10min-cac .width=20/40/80mhz configuration.country=\
"United Kingdom" .mode=ap .ssid="Middle Earth 5G" disabled=no name=\
private-5g security=middle-earth
add configuration.mode=ap .ssid="The Shire" datapath.vlan-id=10 disabled=no \
mac-address=4A:A9:8A:64:E9:B9 master-interface=private-2g name=guest-2g \
security=shire
add configuration.mode=ap .ssid="The Shire" datapath.vlan-id=10 disabled=no \
mac-address=4A:A9:8A:64:E9:B8 master-interface=private-5g name=guest-5g \
security=shire
/ip pool
add name=guest ranges=10.0.0.10-10.0.0.254
/ip dhcp-server
add address-pool=guest interface=guest-vlan lease-time=2h name=guest
/system logging action
set 3 remote=192.168.0.7
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether3 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether4 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=ether5 internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=private-5g internal-path-cost=10 \
path-cost=10
add bridge=bridge comment=defconf interface=private-2g internal-path-cost=10 \
path-cost=10
add bridge=bridge interface=guest-2g internal-path-cost=10 path-cost=10
add bridge=bridge interface=guest-5g internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface detect-internet
set detect-interface-list=all
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=guest-vlan list=VLAN
/interface wifi access-list
add action=accept comment="Frodo 5G" disabled=no mac-address=\
00:45:E2:81:E4:61
add action=accept comment="Treebeard 2G" disabled=no mac-address=\
1C:BF:CE:4D:15:52
add action=accept comment=Mobile disabled=no mac-address=56:95:CC:AA:40:9F
add action=accept comment=Mobile disabled=no mac-address=02:53:E4:D5:F1:16
add action=accept comment=Helmsdeep disabled=no mac-address=5C:E0:C5:E3:E1:99
add action=accept comment="Epson printer" disabled=no mac-address=\
38:1A:52:18:30:36
add action=accept comment="Echo Dot" disabled=no mac-address=\
74:E2:0C:AC:E4:4A
add action=accept comment="Heater smart plug" disabled=no mac-address=\
FC:67:1F:B8:B7:88
add action=accept comment=Tablet disabled=no mac-address=02:C5:0B:DD:34:CF
/ip address
add address=192.168.0.1/24 comment=defconf interface=bridge network=\
192.168.0.0
add address=10.0.0.1/24 interface=guest-vlan network=10.0.0.0
/ip dhcp-client
add comment="Virgin Media modem WAN" interface=ether1
/ip dhcp-server network
add address=10.0.0.0/24 dns-server=1.1.1.1,8.8.8.8 gateway=10.0.0.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.0.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="Accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="Drop invalid packets" connection-state=\
invalid
add action=accept chain=input comment="Accept ICMP (ping)" protocol=icmp
add action=accept chain=input comment=\
"Accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input disabled=yes in-interface-list=VLAN
add action=drop chain=input comment="Only allow access to router from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="Accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="Accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=\
"Fasttrack existing connections through firewall (no rules applied)" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"Accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=drop chain=forward comment=\
"Drop all from WAN not DSTNATed (block incoming connections)" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="Default NAT out" ipsec-policy=\
out,none out-interface-list=WAN
add action=dst-nat chain=dstnat comment="Port forward SimpleHelp TCP" \
dst-port=8008 in-interface-list=WAN protocol=tcp to-addresses=192.168.0.7 \
to-ports=8008
add action=dst-nat chain=dstnat comment="Port forward SimpleHelp UDP" \
dst-port=8008 in-interface-list=WAN protocol=udp to-addresses=192.168.0.7 \
to-ports=8008
add action=dst-nat chain=dstnat comment="Port forward HTTP" dst-port=80 \
in-interface-list=WAN protocol=tcp to-addresses=192.168.0.14 to-ports=80
add action=dst-nat chain=dstnat comment="Port forward HTTPS" dst-port=443 \
in-interface-list=WAN protocol=tcp to-addresses=192.168.0.14 to-ports=443
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Europe/London
/system identity
set name=ROUTER001
/system logging
set 0 action=remote
set 1 action=remote
set 2 action=remote
set 3 action=remote
add action=remote topics=debug
add action=remote topics=wireless
/system note
set show-at-login=no
/tool graphing interface
add interface=ether1
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
[admin@ROUTER001] > /system/resource/print
uptime: 2h1m14s
version: 7.13.3 (stable)
build-time: Jan/24/2024 13:16:46
factory-software: 7.5
free-memory: 648.9MiB
total-memory: 960.0MiB
cpu: ARM64
cpu-count: 4
cpu-frequency: 864MHz
cpu-load: 1%
free-hdd-space: 93.8MiB
total-hdd-space: 128.0MiB
write-sect-since-reboot: 728
write-sect-total: 674230
bad-blocks: 0.1%
architecture-name: arm64
board-name: hAP ax^2
platform: MikroTik
Not really. Sooner or later EVERY flash device will have some bad blocks.Bad blocks of 0.1% is a little unexpected?
Everytime I see your avatar I think about the apologists.It's a pretty standard configuration. Only significant additional configuration over basic router configuration is setting up of a guest VLAN and some port forwarding. The 5GHz frequency is set to 5500 to get maximum Tx power.
Logging is going to Kiwi syslog server free running on my Windows server. Might install a Linux syslog server as I can't work out how to filter in the free version of Kiwi.
Wow ..t has to wait for 30 minutes
Look yourself:Non-Occupancy Period 30 minutes
If it is detecting a radar event, then I don't think the coming back online is working - it never comes back even after 30 minutes. I'll do some more tests if it happens again.The most likely explanation is that the "private-5g" interface goes down due to a detected radar signal. Since the frequency is fixed at 5500, ROS cannot switch to a non-DFS channel. It has to wait for 30 minutes, after which it should perform a CAC. If the check is okay, the interface goes back online. There might be an issue with ROS in handling this operation.
I've never seen anything DFS or CAC related in the logs. Do I need to enable some additional logging?But you should see according entries in log and/or interface.
This was set by the default configuration but I've removed them anyway.1) I would not explicitly set ".width=20/40/80mhz" or "20/40mhz". These look like the hardware defaults anyway. Just unset these values, so the driver can choose the "maximum supported by hardware".
Do you add these as additional frequencies under Frequency or use Secondary Frequency?2) you'd probably specify a list of frequencies if you like to use DFS-channels only. So in case of radar signal ROS can switch to another channel.
Just for the record, I've never seen an error like this. If always comes online after the 1 minute radar check. Although the sequence of events that Santi70 describes does sound very similar. Leave the router for a period of time and the 5GHz interface isn't accessible by any device. Until I restart the router or disable/enable the 5GHz interface.I got an error, no channels available
Interesting read that suggests that DFS isn't just about radar detection. I did used to assume that you should leave channel selection on auto and let the device find the best 5GHz channel. Continually monitoring the spectrum and moving if there was a better channel. But on my ax2 that presented four problems:
Frequency.
Do you add these as additional frequencies under Frequency or use Secondary Frequency?
Linking back to an article shared above: https://www.wifi-professionals.com/2023 ... -detectionThat log entries from UBNT are IMHO not related to radar. It is a functionality that AFAIK Mikrotik has not implemented (I am not sure on that).
So UBNT does this:If the CAC reveals the presence of radar signals, DFS facilitates dynamic channel switching. In this scenario, Wi-Fi devices swiftly vacate the affected channel and transition to another deemed clear of radar activity. This automatic adjustment minimizes interference and ensures seamless network operation.
If RouterOS is able to detect radar and move to another channel, it could equally use the same technology to avoid other access points. It clearly does some analysis where the frequency isn't defined - it finds a channel. However, what I'm not sure RouterOS is continually monitor the channel to see if another access point barges in.DFS isn’t exclusive to radar scenarios. It’s equally essential in managing channel selection in the absence of radar signals. This becomes particularly crucial in densely populated areas where multiple Wi-Fi networks operate concurrently. DFS enables networks to dynamically adjust their channels, optimizing performance and minimizing interference.
You set frequency=5500 this is a restriction and not a "maybe if you, beloved ROS, like you maybe can prefer 5500 but can fallback to any other frequency if you like".My experience so far is that if you have 5500 alone (DFS in UK and often chosen as max Tx power) and a radar event is detected, the 5GHz channel shuts down entirely. I would argue that this is a bug in ROS 7 - if a manual frequency has been specified and a radar event is detected later on, it should use DFS to find another channel. Not disable 5GHz entirely?
Well I would say this is a bad design. I regularly specify the channel on UBNT AirMax devices (point-to-point). In fact, recent Nanostation firmware doesn't even have an auto option - you have to pick a channel:Read it as: "5500 and nothing else"
Does it work this way on ROS v6 as well? Might explain why one very busy (congestion wise) client I have regularly reported slow Wi-Fi. CAPsMAN is configured there to assign the access points to specific channels. If the same problem is occurring, it might explain the slow down if the 5GHz channels on the APs using DFS specific channels are randomly shutting down because there is a radar event. Also explains why rebooting the access points each night helped as it's never reported a radar event at start-up. I'm going to watch the logs more carefully.Read it as: "5500 and nothing else"
Yes it does.Does it work this way on ROS v6 as well?Read it as: "5500 and nothing else"
Somebody else mentioned this above but isn't this a bug in ROS then? As far as I can tell, this is the specification:Yes it does.
Does it work this way on ROS v6 as well?
So shouldn't ROS disable the 5GHz interface, wait 30 minutes and then try again? As I've never had a "Channel not available" message when resetting the interface, then radar events are rare around here. Not sure what kind of things using radar?The DFS requirements say that the APs mustn't switch back in 30 minutes after detection (known as NOP or Non-Occupancy Period).
DFS events can cause an Access Point to use a channel, temporarily, even though that channel has been excluded from use in the Dashboard
4. Access Point selects a different channel permitted within the regulatory domain. (DFS events can cause an Access Point to use a channel, temporarily, even though that channel has been excluded from use in the Dashboard. Should this behavior prove problematic, contact Cisco Meraki Support to set a specific channel to switch to, in the case of DFS events.)
Many problems in my setups where wAP ac's are generating false positive radar patterns for SXTsq unintentionally pointing at them.Not sure what kind of things using radar?
I can relate to that but in the UK that effectively means you have one 80MHz range 5170-5250. This means that congestion and Tx power become considerations. In the UK, this range has power of 18db on my test hAP ax2. This is significantly less than 5490-5570 which is 25db. The other non-DFS choices of 5735 and above are even worse with Tx power of 9db plus not usable by some client devices.I avoid DFS ranges. No problems.
BEGIN frequency selection
FOR EACH frequency in list DO
IF frequency currently not in 30 minute CAC block THEN
Carry out CAC check
IF no radar THEN
Select frequency/switch
EXIT FOR
ENDIF
Mark frequency as in 30 minute CAC block
ENDIF
NEXT frequency
Carry out entire spectrum scan for best frequency
END
BEGIN radar event
Mark frequency as in 30 minute CAC block
Perform frequency selection again
END
BEGIN end of 30 minute CAC block
Perform frequency selection again
END
I'm about 15 months ahead with a Hap AX2 and Cap AX, UK based and can relate to a lot of what you are now calling out.I can relate to that but in the UK that effectively means you have one 80MHz range 5170-5250. This means that congestion and Tx power become considerations. In the UK, this range has power of 18db on my test hAP ax2. This is significantly less than 5490-5570 which is 25db. The other non-DFS choices of 5735 and above are even worse with Tx power of 9db plus not usable by some client devices.I avoid DFS ranges. No problems.
Did you ever create a support ticket with Mikrotik regarding this issue? I'm seeing something very similar on my Hap AX2 as well, my Hap AX3 does not have the issue.Bit more supplemental information here. Another radar event occurred tonight at 20:27 on 5500 when I happened to be looking. Frequency currently set to 5500, 5580, 5660 and 5180. Caught it doing a 10 min CAC on 5580 so it does work through the frequencies during a radar event. It then stayed on 5580.
I've currently got a schedule task running every hour which restarts the interface so at 21:00 it switched back to 5500. Bit of a fudge but it works for me for now.