Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Enterprise Networking Mikrotik Routers (RouterBoard & RouterOS), User and owner discussion group

views
     
XPS
post Mar 17 2018, 06:06 PM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(quadcube @ Mar 17 2018, 02:50 PM)
my Macs would usually connects to the 2.4Ghz SSID rather than the 5Ghz one
*
That is not normal. Macs are very stable on the wifi side and will stay connected to 5Ghz unless your network had dropped. Could be your wifi is not stable or your Mac is too far away (anything more than 15m) probably, easy to check hold onto the option key and click on the wifi icon to look at the signal strength etc.
XPS
post Mar 17 2018, 06:52 PM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(quadcube @ Mar 17 2018, 06:38 PM)
I just re-configured the TX power too as previously the RSSI for both machines are around -23dBm (Total TX should be around 28dBm). Current RSSI range is around -50~-40dBm (Total RX 5dBm), I guess is pretty fine? laugh.gif
*
The new RSSI looks more normal numbers, its a false belief that over-powered Tx power is helpful unless the Rx gain can match. Macs stay connected for days if you leave it in the power source. Check your wifi log to see connect time as you monitor.
XPS
post Mar 18 2018, 12:55 AM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(quadcube @ Mar 17 2018, 09:00 PM)
Yeap,you are right. I purposely dial down the TX power because I’m sleeping directly above the router. The last thing I wanna get is some weird sickness from that.

Hmm, I’ll take note of it, although Ethernet is the primary network interface for both devices. Been uploading/downloading from Google Drive at around 700~800Mbps on average, only Ethernet can sustain near gigabit speed
*
On AirPort routers previously, the power setting was at 25% sufficient without devices dropping off. Plus the nice benefit of not able to snoop on the wifi from outside biggrin.gif Or the thought of scary high Tx power well above the most conservative recommendations.

If you are mostly on an Apple ecosystem, AirPort Extreme abiet not updated for a while are still the better option. Even Asus mesh technology does not support seamless roaming between routers which AirPorts does. Recently moved to Asus (which is decent) and the mis-adventure was not getting an UBNT/Mikrotik and using AirPorts for wireless. On this forum at times get excited not rebooting routers after 30 days, with AirPorts its never until you hit a power failure which could be a year. And firmware is rock solid. Your Macs should get gigabit wireless connectivity on 5Ghz with the Mikrotik router, limited by your broadband.
XPS
post Mar 18 2018, 02:05 AM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(soonwai @ Mar 18 2018, 01:37 AM)
I love the Apple Airports. Had the old N model AirPort Extreme which eventually died on me after 3 years, a current but unused tower AC Extreme and 3 80211G Airport Expresses still running around the house for Airplay.

I eventually moved on from Apple's routers as it just won't work with Unifi's PPPoE even after I've untagged vlan500.

As for WiFi, they don't actually support seamless roaming but they do allow for faster AP transition through 802.11R, K & V which IOS devices also support.
https://support.apple.com/en-us/HT202628

I think a few, maybe the more premium Asus routers also support some or all of the above.
*
Was discussed years back on this forum with the network gurus here (who are not posting much since) that Unifi PPPoE changed one fine day from working and then not supported by AirPorts due to the updated manner the authentication handshake is handled. Therefore you need a Unifi supported router to handle the PPPoE authentication. Airports are now used in bridge mode to a Unifi supported router.

AirPorts uses a proprietary implementation of WDS without the half bandwidth penalty. Roaming or switching AP is unnoticed so maybe you are correct in this aspect from a strict definition.

The 802.11 Working Group standards k, r, and v let clients roam more seamlessly from access point (AP) to AP within the same network.
https://support.apple.com/en-us/HT202628

Asus mesh does not support, at least on the latest firmware released yesterday, seamless roaming since its still bugged in some places. The handover between routers would need some pretty clever algorithms.

Edit
The challenge with Apple is they do not publish much the internals of what they implement. Would be a perfect solution if any vendor including UBNT/Mikrotik can provide seamless wireless mesh. Not keen to wire cat6 cables if can be avoided.

This post has been edited by XPS: Mar 18 2018, 02:23 AM
XPS
post Mar 18 2018, 09:01 AM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
@squall0833
Not all wifi chips are created equal. The new chips from Broadcom has improved gain. High end routers should be able to manage what you described (chip + better antenna).

Not a fan of powerline. Mikrotik plus a good AP is probably more cost effective though if you can manage some technical configuration.
XPS
post Apr 23 2018, 07:29 PM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(soonwai @ Apr 23 2018, 07:14 PM)
Advisory: Vulnerability exploiting the Winbox port

Time to switch to Asus.
*
And lose all your ability to customise on Mikrotik? biggrin.gif

Its all over again RSA then AES if you know the history. Open source in theory is the only safe approach as the codes can be verified, no hidden stuff etc

This post has been edited by XPS: Apr 23 2018, 09:02 PM
XPS
post Apr 23 2018, 07:35 PM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(MX510 @ Apr 23 2018, 07:19 PM)
Actually TM modem and router are alsovulnerable to this new modem comes with different default password with last 4 digit of mac address

There is a lot of attack on port 80

Do secure your router by setting a password on your Mikrotik router

remove admin full access by set with different username and password

In addition you can always

Assign a different port

IP -> Services -> www either disable or set different port
*
The real threat is more than firewall. Its how well protected the vendor firmware is on the download servers, development - test - release software controls, etc. Also how are clients within the internal network protected against an attack originating from an internal client.
XPS
post Apr 23 2018, 08:53 PM

Casual
***
Junior Member
322 posts

Joined: Jan 2008
QUOTE(soonwai @ Apr 23 2018, 08:16 PM)
No lah, kidding of course. Last week flashed Tomato on my old RT-N16. Been meaning to try it out. It looks so pretty.
*
biggrin.gif biggrin.gif biggrin.gif

Tomato not LEDE on RT-N16? Would be awesome to get your experiences with a network with LEDE, PiHole ad-blocker, some intrusion detection device. That's a project on the back burner for now until can find some time.


 

Change to:
| Lo-Fi Version
0.0189sec    0.43    7 queries    GZIP Disabled
Time is now: 19th December 2025 - 02:32 AM