Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 23620

Wireless Networking • F**G WiFi6 from C52iG-5HaxD2HaxD

$
0
0
Good day to you all !
I have a problem that lasts since the purchase of C52iG-5HaxD2HaxD, which is more than 1 year !
It all started with the fact that WiFi 6 on RouterOS version above ~7. 15+ works unstable - at random times can happen a complete disconnect
I would have stayed on the factory version of RouterOS but there is a very low speed Wifi ~200mbs
I made a ticket - SUP- 164448 and after ~month of communication with the support team and searching forums I came to the conclusion that this is the problem of my wifi card in my laptop - Intel ax211 and I forced in the properties of my card to use only Wifi AC


. Time passed - new hardware appeared - with Intel BE201 and I also started to get the same problems.


I get disconnections with Windows Eventid errors - 7021, 6062
And in Mikrotik - "disconnected, connection lost, signal strength"


I've been using Mikrotik products for years, my IT infrastructure is built on CHR in offices configured CapsMan - but I can't beat this crap.

I don't want to lower frequencies below 80 I don't want to switch to AC, that's not why I bought this device - although if you tell me that the situation is not fixable and it's a hardware problem - I'll go and buy just an Asus....
Code:
# 2025-04-10 22:27:34 by RouterOS 7.18.2# software id = 82YJ-5SNB## model = C52iG-5HaxD2HaxD# serial number = HFM09FNGJ0V/interface bridgeadd admin-mac=78:9A:18:FE:E9:B8 auto-mac=no comment=defconf name=bridge/interface ethernetset [ find default-name=ether2 ] mac-address=F0:2F:74:EA:3E:98/interface wifiset [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=\    disabled .width=20/40/80mhz configuration.country=Ukraine .dtim-period=3 \    .mode=ap .ssid=1H1W15G disabled=no security.authentication-types=\    wpa3-psk .ft=no .ft-over-ds=no .wps=disable steering.rrm=yes .wnm=yesset [ find default-name=wifi2 ] channel.band=2ghz-n .skip-dfs-channels=disabled \    configuration.mode=ap .ssid=1H1W1 .tx-chains=0,1 disabled=no mtu=1500 \    security.authentication-types=wpa2-psk,wpa3-psk .disable-pmkid=no .ft=yes \    .ft-over-ds=yes .wps=disable/interface l2tp-clientadd allow=mschap2 allow-fast-path=yes connect-to= name=\    1S1GW1 use-ipsec=yes user=1GW1/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/ip pooladd name=default-dhcp ranges=192.168.201.10-192.168.201.254/ip dhcp-serveradd address-pool=default-dhcp interface=bridge name=defconf/snmp communityset [ find default=yes ] disabled=yesadd addresses=0.0.0.0/0 encryption-protocol=AES name=cns1zbx1/disk settingsset auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes/interface bridge portadd bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5add bridge=bridge comment=defconf interface=wifi1add bridge=bridge comment=defconf interface=wifi2add bridge=bridge interface=ether1/ip neighbor discovery-settingsset discover-interface-list=LAN/ipv6 settingsset disable-ipv6=yes/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether2 list=WAN/interface ovpn-server serveradd mac-address=FE:DC:B4:E6:3C:62 name=ovpn-server1/ip addressadd address=192.168.201.1/24 comment=defconf interface=bridge network=\    192.168.201.0/ip dhcp-clientadd interface=ether2/ip dhcp-server leaseadd address=192.168.201.131 client-id=1:ea:8d:c5:a0:98:8 mac-address=\    EA:8D:C5:A0:98:08 server=defconfadd address=192.168.201.118 client-id=1:28:c5:d2:85:90:80 mac-address=\    28:C5:D2:85:90:80 server=defconf/ip dhcp-server networkadd address=192.168.201.0/24 comment=defconf dns-server=192.168.201.1 gateway=\    192.168.201.1/ip dnsset allow-remote-requests=yes servers=8.8.8.8,1.1.1.1/ip dns staticadd address=192.168.88.1 comment=defconf name=router.lan type=A/ip firewall address-list/ip firewall filteradd action=accept chain=input comment=\    "defconf: accept established,related,untracked" connection-state=\    established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\    invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmp# 1S1GW1 not ready# 1S1GW1 not readyadd action=accept chain=input comment=1ZBX1-SNMP dst-port=161 in-interface=\   1S1GW1 protocol=udp src-address=add action=accept chain=input comment=1GW1-WinBox dst-port=8291 protocol=tcp \    src-address-list=1ACCESS1add action=accept chain=input comment=\    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" \    in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" \    ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" \    ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" \    connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\    "defconf: accept established,related, untracked" connection-state=\    established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=\    invalidadd action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" \    connection-nat-state=!dstnat connection-state=new in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=\    out,none out-interface-list=WAN/ip ipsec profileset [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5/ip routeadd disabled=yes distance=1 dst-address= gateway= \    routing-table=main scope=30 suppress-hw-offload=no target-scope=10/ip service/ip upnpset enabled=yes/ipv6 firewall address-listadd address=::/128 comment="defconf: unspecified address" list=bad_ipv6add address=::1/128 comment="defconf: lo" list=bad_ipv6add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6add address=100::/64 comment="defconf: discard only " list=bad_ipv6add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6/ipv6 firewall filteradd action=accept chain=input comment=\    "defconf: accept established,related,untracked" connection-state=\    established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\    invalidadd action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6add action=accept chain=input comment="defconf: accept UDP traceroute" \    dst-port=33434-33534 protocol=udpadd action=accept chain=input comment=\    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\    udp src-address=fe80::/10add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \    protocol=udpadd action=accept chain=input comment="defconf: accept ipsec AH" protocol=\    ipsec-ahadd action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\    ipsec-espadd action=accept chain=input comment=\    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=input comment=\    "defconf: drop everything else not coming from LAN" in-interface-list=!LANadd action=accept chain=forward comment=\    "defconf: accept established,related,untracked" connection-state=\    established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=\    invalidadd action=drop chain=forward comment="defconf: drop packets with bad src ipv6" \    src-address-list=bad_ipv6add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" \    dst-address-list=bad_ipv6add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \    hop-limit=equal:1 protocol=icmpv6add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\    icmpv6add action=accept chain=forward comment="defconf: accept HIP" protocol=139add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 \    protocol=udpadd action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\    ipsec-ahadd action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\    ipsec-espadd action=accept chain=forward comment=\    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=forward comment=\    "defconf: drop everything else not coming from LAN" in-interface-list=!LAN/snmpset contact= enabled=yes location= trap-community= \    trap-version=3/system clockset time-zone-name=Europe/Kyiv/system identityset name=/system noteset show-at-login=no/system ntp clientset enabled=yes/system ntp client serversadd address=0.ua.pool.ntp.org/system scheduleradd disabled=yes name=schedule1 on-event=\    ":delay 20s; /system/script/run script1" policy=\    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \    start-time=startup/system scriptadd dont-require-permissions=no name=script1 owner=admin policy=\    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":lo\    cal DateTime ([ / system clock get date ] . \"-\" . [ / system\r\    \n clock get time ]);\r\    \ninterface wifi scan duration=30 wifi2 save-file=(\"wifi-scan-\" . \$DateTi\    me)"/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN

Statistics: Posted by CrazYViruS — Thu Apr 10, 2025 10:36 pm



Viewing all articles
Browse latest Browse all 23620

Trending Articles