Hardening Wireless Networks Guide

RouterOS wireless security: WPA3-SAE, management frame protection, access list filtering.

Prerequisite: Ensure you have completed Firewall Best Practices before applying wireless-specific rules.

Prerequisites

Configuration Flow

WPA3-SAE Authentication

Use WPA3-SAE (Simultaneous Authentication of Equals) where supported. Fallback to WPA2-PSK for legacy clients. Disable WPA and WEP.

/interface wireless security-profiles set [ find default=yes ] authentication-types=wpa3-psk,wpa2-psk mode=dynamic-keys
/interface wireless security-profiles set [ find default=yes ] passphrase="<strong-passphrase>"

Management Frame Protection

Enable management frame protection (MFP) to mitigate deauth attacks. Requires client support. Use required when all clients support it.

/interface wireless security-profiles set [ find default=yes ] management-protection=required

Access List Filter

Restrict association by MAC address or use dynamic allow/deny. Whitelist mode requires explicit permit for each client.

/interface wireless access-list add interface=wlan1 mac-address=AA:BB:CC:DD:EE:FF authentication=yes
/interface wireless set wlan1 access-list=default-allow

Related

Firewall Best Practices — Input and Forward chain rules for wireless bridge or routed traffic.

Common Pitfalls