How to Extend Wi-Fi Coverage Using MikroTik Mesh

Dead zones. Buffering. That infuriating moment when your video call freezes because you walked from the living room to the kitchen. If you’ve ever struggled with unreliable Wi-Fi coverage across your home, office, or venue, you already know that a single router simply isn’t enough.The solution? Mesh networking — and if you want enterprise-grade control without enterprise-grade pricing, MikroTik is one of the most powerful platforms to build it on.

In this comprehensive guide, you’ll learn exactly how to extend Wi-Fi coverage using MikroTik Mesh. We’ll walk through everything from planning your network and choosing the right hardware, to configuring CAPsMAN v2 step by step, enabling seamless fast roaming, and troubleshooting common issues. Whether you’re a network professional deploying a client site or an advanced home user ready to take full control of your wireless network, this post is your definitive reference.

Let’s eliminate those dead zones — permanently.



1. What Is MikroTik Mesh Networking and How Does It Work?

Before we dive into configuration, let’s make sure we’re on the same page about what mesh networking actually means — and how MikroTik implements it differently from consumer mesh systems.

Mesh Networking vs. Traditional Access Point Setups

In a traditional Wi-Fi setup, you either have a single router trying to cover your entire space, or you add range extenders (repeaters) that rebroadcast the signal. The problem with repeaters is significant: they cut your throughput in half because they use the same radio to receive and retransmit data. They also create separate network segments, leading to connectivity hiccups as devices struggle to switch between the main router and the extender.

A mesh network takes a fundamentally different approach. Multiple access points (called nodes) work together as a single, unified system. They share the same SSID (network name), coordinate with each other to hand off clients seamlessly, and can be centrally managed from one controller. The result is a single, blanket-like Wi-Fi network that follows you everywhere.

How MikroTik Implements Mesh: CAPsMAN

MikroTik’s approach to mesh networking is built around a system called CAPsMAN — the Controlled Access Point System Manager. Here’s how the architecture works:

  • CAPsMAN Manager (Controller): This is the central brain of your mesh network. It runs on one MikroTik router (it can be a dedicated device or your main gateway router). The manager holds all the wireless configuration — SSIDs, security settings, channel assignments, and provisioning rules — and pushes them out to the access points.
  • CAP (Controlled Access Point): These are your mesh nodes — the individual access points deployed around your space. When a CAP boots up, it discovers the CAPsMAN manager, receives its configuration, and begins serving wireless clients. The CAPs themselves hold minimal local configuration; they’re essentially “dumb” radios controlled by the manager.
  • Data Path: CAPsMAN offers two data forwarding modes. In local forwarding, client traffic is bridged directly at the CAP — this is the most common and performant option. In manager forwarding, all traffic is tunneled back to the CAPsMAN controller, which is useful for centralized firewalling but adds overhead.

With RouterOS v7, MikroTik introduced CAPsMAN v2 (also referred to as the “wifi” package replacing the legacy “wireless” package). CAPsMAN v2 brings support for Wi-Fi 6 (802.11ax) devices, WPA3, and improved fast roaming capabilities with 802.11r/k/v support. RouterOS v7 with CAPsMAN v2 is the way to go.

Why Mesh Is Superior to Repeaters and Range Extenders

To be crystal clear on why mesh is the right approach:

  • No throughput halving: With wired backhaul (or a dedicated wireless backhaul radio), your mesh nodes deliver full-speed connectivity.
  • Single SSID: Clients see one network name, and the mesh infrastructure handles roaming transparently.
  • Centralized management: Change your Wi-Fi password once on the controller, and every node updates instantly.
  • Intelligent roaming: With 802.11r/k/v, clients are actively guided to the best access point rather than clinging to a weak, distant signal.
  • Scalability: Need more coverage? Add another CAP. The controller provisions it automatically.

2. Planning Your MikroTik Mesh Wi-Fi Network

A successful mesh deployment starts long before you open WinBox. Proper planning saves you hours of troubleshooting and ensures optimal performance from day one.

2.1 Assessing Your Coverage Area

Start by understanding the physical space you need to cover. Walk through the premises and note:

  • Dead zones: Areas where your current Wi-Fi signal is weak or nonexistent. Basements, far bedrooms, outdoor patios, and rooms on the opposite side of the building from your router are typical culprits.
  • Building materials: Concrete walls, brick, metal studs, and double-pane low-E glass are notorious Wi-Fi killers. A signal passing through two concrete walls might lose 20-30 dBm — enough to make a usable signal completely unusable.
  • Interference sources: Microwave ovens, Bluetooth devices, baby monitors, neighboring Wi-Fi networks, and cordless phones (especially on 2.4 GHz) all contribute to interference.
  • Client density: A home with 10 devices has very different requirements than an office with 50 simultaneous users or a hotel lobby during check-in hour.

Tools for site surveys:

  • MikroTik’s built-in frequency scanner: Available in WinBox under the wireless interface, the Freq. Usage tool shows you which channels are congested in your environment.
  • WiFi Analyzer (Android): A free app that visualizes nearby networks, their channels, and signal strengths.
  • Ekahau HeatMapper or NetSpot: More advanced tools for creating visual heatmaps of your coverage area (free tiers available).

Rule of thumb: For typical indoor environments, plan for one access point every 15-20 meters (50-65 feet), adjusting for wall density. In open-plan spaces, you can stretch to 25 meters. In environments with thick walls, you may need APs every 10-12 meters.

2.2 Choosing the Right MikroTik Hardware for Mesh

MikroTik offers a wide range of wireless devices. Here are the best options for mesh deployments in 2025:

Indoor Access Points (CAP Nodes)

Device Wi-Fi Standard Bands Best For Approx. Price
cAP ax Wi-Fi 6 (802.11ax) Dual-band (2.4 + 5 GHz) Ceiling-mount office/home deployments ~$99
hAP ax³ Wi-Fi 6 (802.11ax) Dual-band (2.4 + 5 GHz) Desktop router + AP (can also serve as controller) ~$129
cAP ac Wi-Fi 5 (802.11ac) Dual-band (2.4 + 5 GHz) Budget ceiling-mount deployments ~$55
hAP ac³ Wi-Fi 5 (802.11ac) Dual-band (2.4 + 5 GHz) Budget desktop router + AP ~$79

Outdoor Access Points

Device Wi-Fi Standard Best For Approx. Price
wAP ac Wi-Fi 5 (802.11ac) Weatherproof outdoor coverage ~$69
OmniTIK 5 ac Wi-Fi 5 (802.11ac) 360° outdoor coverage for large areas ~$119

Router / Controller Devices

Any MikroTik device running RouterOS v7 can act as a CAPsMAN controller, but for networks with more than a handful of CAPs, you want something with adequate processing power:

  • RB5009UG+S+IN: Excellent all-around router for small-to-medium deployments. 9 ports, 1 SFP+, plenty of CPU headroom. (~$199)
  • RB4011iGS+5HacQ2HnD: Includes built-in Wi-Fi, so it can serve as both controller and access point. (~$179)
  • CCR2004-1G-12S+2XS or CCR2116-12G-4S+: For large-scale deployments with dozens of CAPs. Overkill for most small networks, but future-proof. (~$399-$599)
  • hAP ax³: For small home networks (3-5 CAPs), the hAP ax³ can serve triple duty as your router, CAPsMAN controller, and one of your mesh nodes.

Pro tip: For a typical home mesh network, a hAP ax³ as the controller/main AP plus 2-3 cAP ax units as satellite nodes delivers outstanding performance at a total cost of approximately $330-$430 — significantly less than comparable Ubiquiti or premium consumer mesh systems.

2.3 Wired vs. Wireless Backhaul

The backhaul is the connection between your mesh nodes and the controller/router. This is often the most critical decision in your mesh design.

Wired (Ethernet) Backhaul — Always Preferred

If you can run Ethernet cables to each access point location, do it. Wired backhaul delivers:

  • Full gigabit (or more) bandwidth between nodes with zero wireless overhead
  • Lowest possible latency
  • No interference or signal degradation concerns
  • Power delivery via PoE (Power over Ethernet) — most MikroTik CAPs support 802.3af/at PoE, meaning one cable delivers both data and power

For ceiling-mount deployments, plan your Ethernet runs to terminate at ceiling locations. A simple MikroTik PoE switch like the CRS328-24P-4S+RM or a more affordable CSS610-8P-2S+IN can power multiple CAPs from a central location.

Wireless Backhaul — When You Have No Other Choice

Sometimes running cable isn’t practical — rental properties, historical buildings, or outdoor deployments. In these cases, wireless backhaul is viable but comes with trade-offs:

  • Each hop typically reduces available throughput by 40-50%
  • Added latency per hop
  • Subject to interference and signal quality variations

If you must use wireless backhaul, consider MikroTik’s Wireless Wire product family — 60 GHz point-to-point links that deliver up to 2 Gbps over short distances (up to 200m). These dedicated backhaul links operate on a completely different frequency band from your client-serving Wi-Fi, eliminating the throughput penalty of same-band repeating.

Hybrid approach: In many real-world deployments, you’ll use a mix — wired backhaul where cables exist, and wireless backhaul for the one or two locations where cabling is impractical.


3. Setting Up CAPsMAN v2: The Heart of MikroTik Mesh (Step-by-Step)

Now for the part you’ve been waiting for. Let’s build this mesh network step by step. We’ll use RouterOS v7.x with the wifi package (CAPsMAN v2) throughout. All commands shown are for the terminal (CLI), but we’ll note where to find equivalent options in WinBox.

3.1 Prerequisites and Initial Configuration

Before configuring CAPsMAN, make sure you have the following in place:

  1. All devices running RouterOS v7.x (latest stable). Check your version with /system resource print. Update if needed with /system package update install.
  2. The “wifi” package must be installed on all devices (controller and CAPs). In RouterOS v7, this replaces the legacy “wireless” package. Check with /system package print.
  3. Basic network connectivity between the controller and all CAPs. If using wired backhaul, the CAPs should be plugged into your network and receiving IP addresses via DHCP.
  4. A bridge configured on the controller for your LAN. Typically called “bridge1” or “bridge-lan”.

Baseline network assumptions for this guide:

  • Controller IP: 192.168.88.1
  • LAN subnet: 192.168.88.0/24
  • DHCP pool: 192.168.88.10-192.168.88.254
  • Bridge name: bridge1

3.2 Configuring the CAPsMAN Controller (Manager)

On your controller device (the router that will manage all CAPs), follow these steps:

Step 1: Enable CAPsMAN Manager

First, enable the CAPsMAN manager so it can accept connections from CAP devices:

/interface wifi capsman
set enabled=yes interfaces=bridge1 package-requirement=wifi

In WinBox: Go to WiFi > CAPsMAN, click the Manager tab, check Enabled, and select your bridge interface.

Step 2: Create a Security Configuration

Define the wireless security settings that all your CAPs will use:

/interface wifi security
add name=sec-main authentication-types=wpa2-psk,wpa3-psk passphrase="YourStrongPasswordHere" ft=yes ft-over-ds=yes

Key parameters:

  • authentication-types=wpa2-psk,wpa3-psk — Enables WPA2/WPA3 transition mode for maximum compatibility
  • passphrase — Your Wi-Fi password (use something strong — at least 16 characters)
  • ft=yes — Enables 802.11r Fast Transition (critical for seamless roaming)
  • ft-over-ds=yes — Enables Fast Transition over the Distribution System (wired backbone), which is faster than over-the-air FT

Step 3: Create Channel Configurations

Define separate channel configurations for your 2.4 GHz and 5 GHz radios:

# 2.4 GHz channel configuration
/interface wifi channel
add name=ch-2ghz frequency=2412,2437,2462 width=20mhz band=2ghz-ax

# 5 GHz channel configuration
/interface wifi channel
add name=ch-5ghz frequency=5180,5220,5745,5805 width=20/40/80mhz band=5ghz-ax

Key considerations:

  • 2.4 GHz: Stick to channels 1, 6, and 11 (frequencies 2412, 2437, 2462) — these are the only non-overlapping channels
  • 5 GHz: Choose from the many available non-overlapping channels. Avoid DFS channels (5260-5720 MHz) in environments prone to radar interference unless you need them
  • Channel width: Use 20 MHz on 2.4 GHz (wider channels cause excessive overlap). On 5 GHz, 80 MHz is the sweet spot for throughput vs. available channels
  • Listing multiple frequencies allows CAPsMAN to assign different channels to different CAPs, reducing co-channel interference

Step 4: Create a Datapath Configuration

The datapath defines how client traffic is handled:

/interface wifi datapath
add name=dp-main bridge=bridge1 client-isolation=no

Key parameter:

  • bridge=bridge1 — Client traffic will be bridged locally at each CAP into your main LAN bridge. This is local forwarding and provides the best performance.
  • client-isolation=no — Allows wireless clients to communicate with each other. Set to yes for guest networks where you want to prevent client-to-client traffic.

Step 5: Create Configuration Profiles

Now combine the security, channel, and datapath settings into configuration profiles — one for each band:

# Main 2.4 GHz configuration
/interface wifi configuration
add name=cfg-2ghz ssid="MyMeshNetwork" country="United States" security=sec-main channel=ch-2ghz datapath=dp-main

# Main 5 GHz configuration
/interface wifi configuration
add name=cfg-5ghz ssid="MyMeshNetwork" country="United States" security=sec-main channel=ch-5ghz datapath=dp-main

Important: Use the same SSID on both the 2.4 GHz and 5 GHz profiles. This is what creates the unified mesh experience — clients see one network name and connect to whichever band is optimal for them.

Step 6: Set Up Provisioning Rules

Provisioning rules tell CAPsMAN how to automatically configure CAPs when they connect:

# Provision 2.4 GHz radios
/interface wifi provisioning
add action=create-enabled master-configuration=cfg-2ghz supported-bands=2ghz-ax,2ghz-n comment="Provision 2.4GHz radios"

# Provision 5 GHz radios
/interface wifi provisioning
add action=create-enabled master-configuration=cfg-5ghz supported-bands=5ghz-ax,5ghz-ac,5ghz-n comment="Provision 5GHz radios"

These rules match incoming CAP radios by their supported bands and apply the correct configuration profile. When a new CAP connects, it’s automatically configured with the right SSID, security, and channel settings — no manual per-device configuration needed.

In WinBox: Navigate to WiFi > CAPsMAN > Provisioning to create these rules graphically.

3.3 Configuring CAP Devices (Mesh Nodes)

Now let’s configure each access point to connect to the CAPsMAN controller. On each CAP device:

Step 1: Reset or Prepare the Device

If the CAP is a new or repurposed device, start with a clean configuration:

/system reset-configuration no-defaults=yes skip-backup=yes

After reset, connect to the device and give it a basic configuration:

# Set an identity so you can identify this CAP in the controller
/system identity set name="CAP-LivingRoom"

# Configure the device to get an IP via DHCP on ether1
/ip dhcp-client add interface=ether1 disabled=no

Step 2: Enable CAP Mode

Tell this device to act as a CAP and connect to the CAPsMAN controller:

/interface wifi cap
set enabled=yes discovery-interfaces=ether1 slaves-datapath=bridge1 slaves-static=no

Key parameters:

  • enabled=yes — Activates CAP mode
  • discovery-interfaces=ether1 — The CAP will use this interface to discover the CAPsMAN controller via Layer 2 broadcast. If the controller is on a different subnet, you can specify its IP with caps-man-addresses=192.168.88.1 instead
  • slaves-datapath=bridge1 — Specifies the local bridge for data forwarding

Alternatively, you can specify the controller’s IP address directly for Layer 3 discovery (useful when CAPs are on a different subnet):

/interface wifi cap
set enabled=yes caps-man-addresses=192.168.88.1 slaves-datapath=bridge1

Step 3: Verify the Connection

Back on the controller, verify that the CAP has connected and received its configuration:

/interface wifi cap print

In WinBox, go to WiFi > CAPsMAN > Remote CAP. You should see your CAP listed with its identity, IP address, and radio information. The Interfaces tab will show the provisioned wireless interfaces (one for 2.4 GHz, one for 5 GHz per CAP).

Repeat Steps 1-3 for each additional CAP device. Thanks to your provisioning rules, each new CAP is configured automatically when it connects to the controller.

3.4 Creating a Unified SSID for Seamless Roaming

If you’ve followed the steps above, you already have a unified SSID — the same network name (MyMeshNetwork) is broadcast by every CAP on both bands. But let’s verify and understand why this matters:

  • From a client’s perspective, there’s only one Wi-Fi network. Whether they’re in the living room, the upstairs bedroom, or the backyard, their device sees “MyMeshNetwork” and connects.
  • Behind the scenes, as the client moves, the mesh infrastructure (using 802.11r/k/v, which we’ll configure next) guides the client to hand off from one CAP to another — ideally without the user ever noticing.
  • Consistency is critical: The SSID, security type, passphrase, and encryption must be identical across all CAPs. Since CAPsMAN pushes the same configuration profile to every node, this is handled automatically.

Test the basic setup now: connect a phone or laptop to your mesh network, walk around the premises, and verify you have connectivity near each CAP location. The handoff may not be perfectly seamless yet (we’ll fix that next), but you should have coverage everywhere.


4. Enabling Fast Roaming for Seamless Wi-Fi Handoff

Having mesh coverage is one thing. Having seamless coverage — where you can walk through your entire space during a video call without a single dropout — requires proper roaming configuration. This is where MikroTik truly shines for those willing to tune the settings.

4.1 Understanding Wi-Fi Roaming Protocols

When a wireless client moves away from one access point and closer to another, it needs to “roam” — disconnect from the old AP and reconnect to the new one. Without any special protocols, this process can take 500ms to several seconds, which is enough to drop a VoIP call or cause a noticeable glitch in video streaming.

Three IEEE standards address this problem:

  • 802.11r (Fast BSS Transition / FT): Pre-authenticates the client with the target AP before it roams, reducing handoff time from hundreds of milliseconds to under 50ms. This is the most important roaming protocol.
  • 802.11k (Radio Resource Management): The AP provides the client with a neighbor report — a list of nearby APs, their channels, and signal strengths. This helps the client make smarter roaming decisions and scan fewer channels, speeding up the process.
  • 802.11v (BSS Transition Management): Allows the AP to suggest (or firmly nudge) a client to roam to a better AP. This is particularly useful for “sticky” clients that refuse to let go of a weak signal.

Together, these three protocols are often called “fast roaming” or “802.11r/k/v.”

4.2 Configuring 802.11r/k/v on MikroTik CAPsMAN

If you followed our security configuration above with ft=yes and ft-over-ds=yes, you’ve already enabled 802.11r. Let’s make sure all three protocols are properly configured:

# Update the security profile to ensure FT is enabled
/interface wifi security
set [find name=sec-main] ft=yes ft-over-ds=yes ft-mobility-domain=0xa1b2

Key parameters:

  • ft=yes — Enables 802.11r Fast BSS Transition
  • ft-over-ds=yes — Enables FT over the Distribution System (wired backbone), which is faster and more reliable than over-the-air FT
  • ft-mobility-domain=0xa1b2 — A 2-byte identifier that groups APs into a roaming domain. All APs that clients should roam between must share the same mobility domain. Use any hex value you like.

To enable 802.11k and 802.11v, update your configuration profiles:

/interface wifi configuration
set [find name=cfg-2ghz] rrm=neighbor-report,steering
set [find name=cfg-5ghz] rrm=neighbor-report,steering

The rrm parameter controls Radio Resource Management features:

  • neighbor-report — Enables 802.11k neighbor reports
  • steering — Enables 802.11v BSS Transition Management (client steering)

Important caveat: Not all client devices support all three protocols. Most modern smartphones (iPhone 6s+, Samsung Galaxy S8+, Google Pixel 2+) and laptops (Windows 10+, macOS 10.13+) support 802.11r. Some older or budget devices don’t. Enabling these protocols won’t break compatibility — devices that don’t support them will simply fall back to standard roaming — but they won’t get the fast handoff benefit.

4.3 Tuning Access Point Signal and Client Steering

Protocols alone won’t guarantee great roaming if your AP signal coverage is poorly designed. Here are the critical tuning steps:

Adjust Transmit Power

A common mistake is running all APs at maximum transmit power. This creates massive overlapping coverage zones where clients can “hear” multiple APs with strong signals and have no reason to roam. Ironically, reducing transmit power improves roaming:

/interface wifi configuration
set [find name=cfg-2ghz] tx-power=15
set [find name=cfg-5ghz] tx-power=18

Start with these values and adjust based on your environment. The goal is to have each AP cover its designated area with enough overlap for seamless handoff (around 15-20% coverage overlap between adjacent APs) but not so much that clients see multiple strong signals everywhere.

Configure Access List Rules for Signal-Based Disconnection

You can configure CAPsMAN to disconnect clients whose signal drops below a threshold, forcing them to roam to a closer AP:

/interface wifi access-list
add signal-range=-75..120 action=accept
add signal-range=-120..-76 action=reject

This configuration accepts clients with a signal stronger than -75 dBm and rejects (disconnects) clients weaker than -76 dBm. The disconnected client will immediately scan for a better AP and reconnect to the closest one.

Be conservative with this setting. Setting the threshold too aggressively (e.g., -65 dBm) can cause clients in borderline areas to bounce between APs repeatedly. Start with -75 dBm and adjust based on observation.

Channel Planning

Assign specific channels to each AP to minimize co-channel interference. Adjacent APs should never share the same channel:

# Example: Manually assigning channels per CAP
# In CAPsMAN, you can override channel settings per provisioned interface

# On the controller, find the provisioned interfaces:
/interface wifi print

# Set specific channels for each interface:
/interface wifi set [find name="cap-livingroom-5ghz"] channel.frequency=5180
/interface wifi set [find name="cap-bedroom-5ghz"] channel.frequency=5220
/interface wifi set [find name="cap-office-5ghz"] channel.frequency=5745

For 2.4 GHz, you only have three non-overlapping channels (1, 6, 11). In a deployment with more than three APs on 2.4 GHz, you’ll inevitably reuse channels — just make sure APs with the same channel are as physically far apart as possible.

For 5 GHz, you typically have 9-25 non-overlapping channels (depending on your country’s regulations and whether you use DFS channels), making channel planning much easier.


5. Advanced MikroTik Mesh Configuration Tips

Once your basic mesh is up and running with seamless roaming, here are the advanced configurations that separate a good network from a great one.

5.1 VLANs and Multiple SSIDs

Most real-world deployments need more than one network. A typical setup might include:

  • Corporate/Home network (VLAN 10) — Full access to all resources
  • Guest network (VLAN 20) — Internet access only, isolated from internal resources
  • IoT network (VLAN 30) — Smart home devices, isolated for security

Here’s how to set this up in CAPsMAN v2:

# Create VLAN-aware datapaths
/interface wifi datapath
add name=dp-main bridge=bridge1 vlan-id=10
add name=dp-guest bridge=bridge1 vlan-id=20 client-isolation=yes
add name=dp-iot bridge=bridge1 vlan-id=30 client-isolation=yes

# Create separate security profiles
/interface wifi security
add name=sec-main authentication-types=wpa2-psk,wpa3-psk passphrase="MainNetworkPass123!" ft=yes ft-over-ds=yes ft-mobility-domain=0xa1b2
add name=sec-guest authentication-types=wpa2-psk passphrase="GuestAccess2025" ft=yes ft-over-ds=yes ft-mobility-domain=0xa1b2
add name=sec-iot authentication-types=wpa2-psk passphrase="IoTDevices2025!" ft=no

# Create configuration profiles for each network
/interface wifi configuration
add name=cfg-main-5ghz ssid="MyNetwork" security=sec-main channel=ch-5ghz datapath=dp-main
add name=cfg-guest-5ghz ssid="MyNetwork-Guest" security=sec-guest channel=ch-5ghz datapath=dp-guest
add name=cfg-iot-2ghz ssid="MyNetwork-IoT" security=sec-iot channel=ch-2ghz datapath=dp-iot

# Update provisioning to include secondary (slave) configurations
/interface wifi provisioning
set [find comment="Provision 5GHz radios"] master-configuration=cfg-main-5ghz slave-configurations=cfg-guest-5ghz
set [find comment="Provision 2.4GHz radios"] master-configuration=cfg-2ghz slave-configurations=cfg-iot-2ghz

Each secondary configuration creates a virtual AP on the same physical radio. The VLAN tags ensure traffic from each SSID is properly segregated.

Don’t forget to configure your bridge for VLAN filtering and set up firewall rules between VLANs on the controller:

# Enable VLAN filtering on the bridge
/interface bridge set [find name=bridge1] vlan-filtering=yes

# Add VLAN entries
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=10
add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=20
add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=30

# Create VLAN interfaces for routing
/interface vlan
add interface=bridge1 name=vlan10-main vlan-id=10
add interface=bridge1 name=vlan20-guest vlan-id=20
add interface=bridge1 name=vlan30-iot vlan-id=30

# Assign IPs and DHCP servers to each VLAN
/ip address
add address=192.168.10.1/24 interface=vlan10-main
add address=192.168.20.1/24 interface=vlan20-guest
add address=192.168.30.1/24 interface=vlan30-iot

5.2 Load Balancing Across Access Points

In high-density environments, some APs may attract more clients than others. CAPsMAN can help distribute the load:

# Set a maximum number of clients per interface
/interface wifi access-list
add action=accept signal-range=-75..120 allow-signal-out-of-range=10s

You can also use access list rules to steer clients based on signal strength, effectively distributing them across the available APs. In environments with very high client density (conference rooms, auditoriums), consider deploying more APs with lower transmit power rather than fewer APs at higher power.

5.3 Using MikroTik with WPA3 for Enhanced Security

WPA3 is the latest Wi-Fi security standard, offering several improvements over WPA2:

  • SAE (Simultaneous Authentication of Equals): Replaces the PSK 4-way handshake, making offline dictionary attacks virtually impossible
  • Forward secrecy: Even if your password is later compromised, previously captured traffic cannot be decrypted
  • Protected Management Frames (PMF): Prevents deauthentication attacks

Our security profile above already enables WPA2/WPA3 transition mode (authentication-types=wpa2-psk,wpa3-psk). This allows WPA3-capable devices to use the stronger protocol while maintaining backward compatibility with WPA2-only devices.

For maximum security on networks where all clients support WPA3:

/interface wifi security
set [find name=sec-main] authentication-types=wpa3-psk disable-pmkid=yes

5.4 Quality of Service (QoS) for Mesh Wi-Fi

Not all traffic is created equal. VoIP calls and video conferencing need low latency, while large file downloads can tolerate some delay. Here’s a basic QoS setup for your mesh network:

# Mark VoIP traffic (SIP and RTP)
/ip firewall mangle
add chain=forward protocol=udp dst-port=5060-5061 action=mark-packet new-packet-mark=voip passthrough=no comment="Mark SIP traffic"
add chain=forward protocol=udp dst-port=10000-20000 action=mark-packet new-packet-mark=voip passthrough=no comment="Mark RTP traffic"

# Mark video conferencing (Zoom, Teams, etc.)
add chain=forward protocol=udp dst-port=8801-8810 action=mark-packet new-packet-mark=video passthrough=no comment="Mark Zoom traffic"
add chain=forward protocol=udp dst-port=3478-3481 action=mark-packet new-packet-mark=video passthrough=no comment="Mark Teams/WebRTC traffic"

# Create queue tree for prioritization
/queue tree
add name=voip-priority parent=global packet-mark=voip priority=1 max-limit=10M
add name=video-priority parent=global packet-mark=video priority=3 max-limit=50M
add name=general-traffic parent=global packet-mark=no-mark priority=5 max-limit=100M

Adjust the max-limit values based on your internet connection speed. The key principle is giving latency-sensitive traffic higher priority (lower number = higher priority).


6. Monitoring and Managing Your MikroTik Mesh Network

A mesh network isn’t a “set it and forget it” system. Regular monitoring helps you identify issues before users complain and optimize performance over time.

CAPsMAN Registration Table

The registration table is your primary tool for seeing what’s happening on your mesh network:

/interface wifi registration-table print

This shows all connected wireless clients across all CAPs, including:

  • Client MAC address
  • Which CAP/interface they’re connected to
  • Signal strength (rx-signal)
  • TX/RX data rates
  • Uptime
  • Packets transmitted and received

In WinBox: Navigate to WiFi > Registration for a graphical view.

Remote CAP Monitoring

Check the status of all your CAPs from the controller:

/interface wifi cap remote-cap print

This shows each CAP’s identity, IP address, model, RouterOS version, uptime, and state. If a CAP shows “Disconnected,” you have a connectivity issue to investigate.

The Dude — Network Monitoring Tool

MikroTik’s free The Dude network monitoring software can auto-discover your entire network and create a visual map. It monitors device uptime, bandwidth, CPU usage, and can send alerts via email or push notification when an AP goes offline. It’s particularly useful for larger deployments where you can’t manually check each device daily.

SNMP and Grafana Dashboards

For long-term performance tracking, enable SNMP on your MikroTik devices and connect them to a monitoring stack like Prometheus + Grafana or Zabbix:

/snmp
set enabled=yes contact="admin@yournetwork.com" location="Main Office"

/snmp community
set [find name=public] read-access=yes write-access=no addresses=192.168.88.0/24

With Grafana, you can build dashboards showing client counts per AP over time, bandwidth usage patterns, roaming events, and channel utilization — invaluable data for optimizing your mesh network.

Built-in Diagnostic Tools

MikroTik includes several powerful diagnostic tools:

  • Torch: Real-time traffic analyzer per interface — see exactly what traffic is flowing through each CAP (/tool torch interface=wlan1)
  • Packet Sniffer: Capture packets for analysis in Wireshark (/tool sniffer)
  • Wireless Snooper: Scan the RF environment to detect interference and neighboring networks
  • Bandwidth Test: Test throughput between MikroTik devices on your network (/tool bandwidth-test)

7. Troubleshooting Common MikroTik Mesh Wi-Fi Issues

Even with careful planning, issues arise. Here’s a comprehensive troubleshooting guide for the most common MikroTik mesh problems:

Problem Likely Cause Solution
CAP not connecting to CAPsMAN Discovery or firewall issue Ensure L2 connectivity between CAP and controller. Check that UDP ports 5246 and 5247 are not blocked. Try specifying caps-man-addresses explicitly. Verify both devices run the same RouterOS branch (v7).
Clients not roaming between APs 802.11r not enabled, sticky clients, or excessive AP signal overlap Verify ft=yes in security profile. Reduce TX power to create distinct coverage zones. Add access-list rules to reject weak clients. Ensure all APs share the same mobility domain.
Slow speeds on mesh nodes Wireless backhaul bottleneck, interference, or poor channel planning Switch to wired backhaul if possible. Check for co-channel interference using frequency scanner. Verify 80 MHz channel width on 5 GHz. Check for clients stuck on 2.4 GHz.
Intermittent client disconnections DFS radar events, interference, or aggressive access-list rules Move away from DFS channels. Relax signal-range thresholds in access lists. Check for microwave or Bluetooth interference on 2.4 GHz. Review system logs: /log print where topics~"wifi"
VLAN traffic not working through CAPs Datapath or bridge VLAN misconfiguration Verify VLAN IDs in datapath match bridge VLAN table entries. Ensure trunk ports (between switch and CAPs) carry the required VLANs. Check bridge VLAN filtering is enabled.
Clients stuck on 2.4 GHz despite 5 GHz availability No band steering configured Many devices prefer 2.4 GHz by default. Consider reducing 2.4 GHz TX power, or disable 2.4 GHz on some CAPs in areas where 5 GHz coverage is sufficient. Use access-list rules to push dual-band clients to 5 GHz.
CAP loses configuration after reboot Provisioning rule mismatch or CAP not finding controller Ensure provisioning rules match the CAP’s radio bands. Verify DHCP is providing IP addresses to CAPs. Check that the controller is reachable after CAP reboots.
Some websites/apps slow but speed test is fine DNS issues or MTU problems Verify DNS is working correctly on each VLAN. Check for MTU/MSS issues, especially with VLANs: /ip firewall mangle add chain=forward action=change-mss new-mss=clamp-to-pmtu passthrough=yes protocol=tcp tcp-flags=syn

Essential Troubleshooting Commands

# View all connected clients across mesh
/interface wifi registration-table print detail

# Check CAPsMAN provisioned interfaces
/interface wifi print where configuration.manager=capsman

# View remote CAP status
/interface wifi cap remote-cap print

# Monitor wireless logs in real-time
/log print follow where topics~"wifi"

# Check for interface errors
/interface print stats where type=wifi

# Scan for interference on a specific interface
/interface wifi scan [find name=wifi1] duration=30

8. MikroTik Mesh vs. the Competition: Is It Worth the Effort?

Let’s address the elephant in the room. MikroTik mesh requires more configuration effort than consumer mesh systems. Is it worth it? Let’s compare.

Feature MikroTik CAPsMAN Ubiquiti UniFi TP-Link Omada Consumer Mesh (Eero, Nest)
Approx. cost (3-AP system) $280-$430 $450-$600 $300-$450 $250-$500
Setup complexity High (CLI/WinBox) Medium (Web UI/App) Medium (Web UI) Low (App-based)
Configuration granularity Extremely high High Medium-High Low
VLAN support Full, unlimited Full Full None or very limited
802.11r/k/v support Yes (v7) Yes Yes Varies
Cloud dependency None (fully local) Optional (local or cloud) Optional (local or cloud) Required (cloud-managed)
Recurring fees None None None Some require subscriptions
Firewall/routing capabilities Enterprise-grade, built-in Moderate (USG/UDM) Moderate Basic
Hardware longevity Excellent (10+ years of updates) Good (5-7 years) Good Moderate (3-5 years)
Mobile management app Limited (tik-app, third-party) Excellent Good Excellent
Best for Network pros, advanced users, SMBs IT teams, prosumers SMBs, IT teams Non-technical home users

The Verdict

Choose MikroTik if:

  • You want maximum control over every aspect of your network
  • You need enterprise-grade firewall, routing, VPN, and QoS alongside your mesh Wi-Fi
  • You value zero cloud dependency and no recurring fees
  • You’re comfortable with (or willing to learn) CLI and WinBox configuration
  • You want hardware that will last a decade with continued software support
  • Budget matters — MikroTik consistently delivers more features per dollar than any competitor

Choose a competitor if:

  • You want a polished mobile app and setup wizard (Ubiquiti UniFi or consumer mesh)
  • You’re setting up the network for a non-technical client who needs simple management
  • You need to deploy quickly without deep configuration (though TP-Link Omada is a solid middle ground)

For network professionals and serious enthusiasts, MikroTik’s depth of control is unmatched. The learning curve is real, but it’s an investment that pays dividends across every deployment.


9. Real-World MikroTik Mesh Deployment Examples

Theory is great, but let’s look at how these configurations come together in real deployments.

Deployment 1: 3-Bedroom Home

Space ~180 m² (1,940 sq ft), two floors, wood frame construction
Hardware 1× hAP ax³ (ground floor, controller + AP) + 2× cAP ax (upstairs hallway, basement)
Backhaul Wired Ethernet (Cat6 run during renovation)
SSIDs “HomeNetwork” (main), “HomeNetwork-Guest” (guest VLAN)
Client count ~35 devices (phones, laptops, smart TVs, IoT sensors)
Results Full coverage on both floors + basement. Roaming handoff under 80ms during VoIP calls. Speed tests showing 400+ Mbps on 5 GHz throughout the house.
Total cost ~$330

Key lesson: In a home this size, three APs with wired backhaul provides luxurious coverage. The hAP ax³ pulls triple duty beautifully. Running Ethernet during a renovation is infinitely easier than retrofitting later — if you’re remodeling, run cables to ceiling locations in every room, even if you don’t need them yet.

Deployment 2: Small Office (15 Employees)

Space ~350 m² (3,770 sq ft), open plan with 3 meeting rooms, concrete/drywall construction
Hardware 1× RB5009UG+S+IN (controller/router) + 4× cAP ax (ceiling-mounted) + 1× CSS610-8P-2S+IN (PoE switch)
Backhaul Wired Ethernet via PoE switch
SSIDs “CompanyNet” (VLAN 10, corporate), “CompanyGuest” (VLAN 20, guest with captive portal), “CompanyIoT” (VLAN 30, printers/sensors)
Client count ~60 devices simultaneously
Results Seamless roaming across the entire office. Video conferencing on Teams/Zoom works flawlessly when walking between meeting rooms. Guest network provides internet-only access with bandwidth limits. Total deployment time: ~4 hours.
Total cost ~$700 (router + 4 APs + PoE switch)

Key lesson: The RB5009 handles CAPsMAN controller duties, routing, firewall, VLAN inter-routing, and DHCP without breaking a sweat. Ceiling-mount cAP devices look professional and provide better coverage than desk-level APs because the signal radiates downward without desk/body obstruction. PoE dramatically simplifies installation — one cable per AP.

Deployment 3: Outdoor Café/Hospitality Venue

Space ~500 m² indoor + 200 m² outdoor patio, brick building
Hardware 1× CCR2004-1G-12S+2XS (controller/router) + 3× cAP ax (indoor) + 2× wAP ac (outdoor, weatherproof) + 1× CRS328-24P-4S+RM (PoE switch)
Backhaul Wired Ethernet to all APs
SSIDs “CafeWiFi” (guest hotspot with time-limited access via MikroTik Hotspot/User Manager)
Client count Up to 100+ simultaneous during peak hours
Special features Captive portal with social media login, bandwidth limits per user (5 Mbps down / 2 Mbps up), automatic session expiry after 2 hours
Total cost ~$1,100

Key lesson: MikroTik’s integrated Hotspot and User Manager features are a killer advantage for hospitality deployments. No third-party captive portal service needed — everything runs locally on the router. The weatherproof wAP devices handle outdoor conditions (rain, heat, cold) without issues. For high client density, setting client-isolation=yes on the guest datapath is essential to prevent broadcast storms and client-to-client attacks.


10. Conclusion: Build a Rock-Solid Mesh Network with MikroTik

Let’s recap what we’ve covered in this guide:

  1. Understanding mesh architecture: CAPsMAN provides centralized, controller-based management of all your mesh nodes, far superior to repeaters or standalone APs.
  2. Planning matters: Assess your space, choose appropriate hardware, and always prefer wired backhaul for maximum performance.
  3. CAPsMAN v2 configuration: Security profiles, channel configurations, datapaths, configuration profiles, and provisioning rules work together to create a unified mesh network that auto-configures new nodes.
  4. Fast roaming: 802.11r/k/v, transmit power tuning, access-list rules, and proper channel planning ensure clients move seamlessly between APs.
  5. Advanced features: VLANs, multiple SSIDs, WPA3, and QoS take your mesh from functional to professional-grade.
  6. Monitoring and troubleshooting: CAPsMAN’s registration table, diagnostic tools, and integration with monitoring platforms keep your network healthy.

MikroTik mesh networking delivers enterprise-grade wireless coverage at a fraction of the cost of competing solutions. Yes, it requires more configuration effort than plugging in a consumer mesh system — but the result is a network you fully control, with no cloud dependencies, no subscription fees, and capabilities that rival systems costing 5-10 times more.

Our recommendation: Start small. Deploy a controller and two or three CAPs. Get comfortable with CAPsMAN, test roaming, and refine your configuration. Then scale with confidence, knowing that MikroTik’s architecture can grow from a 3-AP home network to a 100+ AP campus deployment using the exact same tools and knowledge.

The dead zones don’t stand a chance.


Check our list of MikroTik guides

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *