privacy ( read-only: yes | no ) - whether all data is encrypted or not
signal-strength ( read-only: integer ) - signal strength in dBm
ssid ( read-only: text ) - service set identifier of the AP
Example
Scan the 5GHz band:
[admin@MikroTik] interface wireless> scan wlan1
Flags: A - active, B - bss, P - privacy, R - routeros-network, N - nstreme
ADDRESS
SSID
BAND
FREQ SIG RADIO-NAME
AB R
00:0C:42:05:00:28 test
5ghz
5180 -77 000C42050028
AB R
00:02:6F:20:34:82 aap1
5ghz
5180 -73 00026F203482
AB
00:0B:6B:30:80:0F www
5ghz
5180 -84
AB R
00:0B:6B:31:B6:D7 www
5ghz
5180 -81 000B6B31B6D7
AB R
00:0B:6B:33:1A:D5 R52_test_new
5ghz
5180 -79 000B6B331AD5
AB R
00:0B:6B:33:0D:EA short5
5ghz
5180 -70 000B6B330DEA
AB R
00:0B:6B:31:52:69 MikroTik
5ghz
5220 -69 000B6B315269
AB R
00:0B:6B:33:12:BF long2
5ghz
5260 -55 000B6B3312BF
-- [Q quit|D dump|C-z pause]
[admin@MikroTik] interface wireless>
Security Profiles
Home menu level: /interface wireless security-profiles
Description
This section provides WEP (Wired Equivalent Privacy) and WPA/WPA2 (Wi-Fi Protected Access)
functions to wireless interfaces.
WPA
The Wi-Fi Protected Access is a combination of 802.1X, EAP, MIC, TKIP and AES. This is a easy
to configure and secure wireless mechanism. It has been later updated to version 2, to provide
greater security.
WEP
The Wired Equivalent Privacy encrypts data only between 802.11 devices, using static keys. It is
not considered a very secure wireless data encryption mechanism, though it is better than no
encryption at all.
The configuration of WEP is quite simple, using MikroTik RouterOS security profiles.
Property Description
authentication-types ( multiple choice: wpa-psk | wpa2-psk | wpa-eap | wpa2-eap ; default: "" ) -
the list of accepted authentication types. APs will advertise the listed types. Stations will choose the
AP, which supports the "best" type from the list (WPA2 is always preferred to WPA1; EAP is
preferred to PSK)
eap-methods ( multiple choice: eap-tls | passthrough ) - the ordered list of EAP methods. APs will
to propose to the stations one by one (if first method listed is rejected, the next one is tried). Stations
Page 271 of 695
Copyright 1999-2007, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA.
Other trademarks and registred trademarks mentioned herein are properties of their respective owners.