- Intended For:
- Customer IT/Admin
- Difficulty:
- Moderate
- Estimated Time to Complete:
- 10 minutes
- Applies to Software/Firmware Version(s):
- n/a
Question
What are the required settings for connecting MikroTik Grooves to any access point?
Answer
This covers the authentication, encryption, and channel/frequency settings that are deployed on MikroTik Grooves.
- Groove Firmware: 6.42.1 or higher - This is for security reasons
- Winbox: 3.17 or higher - This is for security reasons
- Authentication: WPA2-PSK
- Encryption: AES
- Band: 5GHz 802.11n
- Channel width: 20/40 MHz
- Supported frequencies/channels (using country code "united states3"):
- 5180 - 36
- 5200 - 40
- 5220 - 44
- 5745 - 149
- 5765 - 153
- 5785 - 157
- 5805 - 161
Special characters in configuration files:
- To minimize problems, ensure that the SSID and PSK are inside double quotes (“) in the configuration file
- "\" is used as a line break and for escape sequences. Do not use unless there is a special need to
- Do not use the characters "$", "?", "_", or [space] in the SSID or PSK of the configuration file
Additional Notes:
- Not supported: 802.11ac and 80MHz channel width RouterOS version must be 6.39.3 or higher to prevent WPA2 vulnerabilities
- Grooves with firmware higher than 6.39.3 will not connect to an SXT access point running a lower firmware version
- "united States3" mode is required to comply with FCC regulations
- Note for Aruba/Cisco APs: Some models require 802.11 roaming protocols to be turned on while some require it to be turned off
- New Cisco / Meraki access points have an intrusion protection (called Air Marshal) that affects other wireless networks in the area, not necessarily on the same network. The symptoms are wireless uploading will not work and the Groove radios will connect and drop connection repeatedly. If you look at the log files on the Groove, you will see repeating connect / deauth messages. The only solution is to have the offending access points turn off that feature
source: WKB-000669