Проблема появилась на этапе когда я решил отдать собственные влан интерфейсы на управление capsman. Когда добавляю по бриджу либо айпи, контроллер его (интерфейс) не видит. Когда укзываю и бриджи и ip контроллера тогда видит, подтягивает, но не может развернуть. Постоянно дергается этот (добавляемый) интерфейс. На вкладке интерфейса видно что capsman перебирает частоты по-кругу как будто не может определится. Такая же история и 2.4 и с 5 Ггц. Пробовал менять настройки частоты и т.д. Результата не добился. Ткните пожалуйста носом, что я делаю не так ? Слепок настроек и схему прикрепляю.
Код: Выделить всё
# feb/25/2021 15:35:51 by RouterOS 6.45.9
# software id = 082B-DJE0
#
# model = RBcAPGi-5acD2nD
# serial number = CBE40DA5615E
/caps-man channel
add band=2ghz-b/g/n name=channel2 tx-power=20
add band=5ghz-a/n name=channel5
/interface bridge
add admin-mac=08:55:31:02:54:D4 auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \
country="united states" disabled=no distance=indoors frequency=auto \
installation=indoor mode=ap-bridge ssid="TEST - 65" wireless-protocol=\
802.11
# managed by CAPsMAN
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX \
country="united states" distance=indoors frequency=auto frequency-mode=\
manual-txpower installation=indoor ssid="TEST 5 - 65" wireless-protocol=\
802.11
/interface ethernet
set [ find default-name=ether2 ] poe-out=off
/caps-man datapath
add bridge=bridge client-to-client-forwarding=yes local-forwarding=no name=\
datapath1
add bridge=bridge client-to-client-forwarding=yes local-forwarding=no name=\
datapath5
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm,tkip group-encryption=\
aes-ccm name=security1
/caps-man configuration
add channel=channel2 country="united states" datapath=datapath1 mode=ap name=\
cfg2 rx-chains=0,1,2,3 security=security1 ssid="MikroTik - 65" tx-chains=\
0,1,2,3
add channel=channel5 country="united states" datapath=datapath5 mode=ap name=\
cfg5 rx-chains=0,1,2,3 security=security1 ssid="MikroTik5 - 65" tx-chains=\
0,1,2,3
/caps-man interface
add configuration=cfg2 disabled=no l2mtu=1600 mac-address=08:55:31:46:AC:10 \
master-interface=none name=Hap-ac2-1 radio-mac=08:55:31:46:AC:10 \
radio-name=08553146AC10
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk eap-methods="" mode=\
dynamic-keys supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/caps-man manager
set enabled=yes
/caps-man provisioning
add action=create-enabled hw-supported-modes=gn master-configuration=cfg2 \
name-format=prefix-identity
add action=create-dynamic-enabled hw-supported-modes=an master-configuration=\
cfg5 name-format=prefix-identity
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/interface wireless cap
#
set bridge=bridge caps-man-addresses=192.168.88.1 discovery-interfaces=bridge \
enabled=yes interfaces=wlan2
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=ether1
/ip dhcp-server lease
add address=192.168.88.254 client-id=1:8:55:31:46:ac:b mac-address=\
08:55:31:46:AC:0B server=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input dst-port=8291 protocol=tcp
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=\
out,none out-interface-list=WAN
/system clock
set time-zone-name=Europe/Zaporozhye
/system identity
set name="Cap - Ac"
/system routerboard mode-button
set enabled=yes on-event=dark-mode
/system script
add comment=defconf dont-require-permissions=no name=dark-mode owner=*sys \
policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
source="\r\
\n :if ([system leds settings get all-leds-off] = \"never\") do={\r\
\n /system leds settings set all-leds-off=immediate \r\
\n } else={\r\
\n /system leds settings set all-leds-off=never \r\
\n }\r\
\n "
/tool graphing interface
add interface=bridge
add interface=ether1
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool romon
set enabled=yes
