I’m sure, yes.
That’s how I have it setup already quite a while since I use VLANs on Wifi with AX3 and AX2 (and before AC3).
Never touched that datapath setting except for capsman experiments (it’s only when capsman config for wifiwave2 came available, that datapath setting came available too).
For me it is like this (AX3, only wifi itf shown):
Looks like you have a mix of VLAN and no-VLAN.
Your bridge is not set to only accept VLAN-tags but your non-IoT wifi interfaces are not VLAN aware.
My guess is that if you change this
/interface bridge
add admin-mac=48:A9:8A:0F:05:23 auto-mac=no comment=defconf
ingress-filtering=no name=bridge vlan-filtering=yes
To this
/interface bridge
add admin-mac=48:A9:8A:0F:05:23 auto-mac=no ingress-filtering=no name=bridge vlan-filtering=yes frame-types=admit-all
That it should work for IoT channels.
But it’s not a clean config.
Either go VLAN all the way, or don’t use it at all.
Now, for only 1 AP and only 1 (or 2) Guest networks, you do not need VLAN (it can be used but it is not required).
Simple DHCP server on interface and proper firewall rules will accomplish the same.
PS since you do not have any firewall right now on your device (unless your config is incomplete ?), it doesn’t make any sense either to use VLAN.
Everything can reach everything as it is now (from what you show as config …).
Errm … unless you REALLY know what you’re doing, don’t use 2 bridges.
If you do not know why it should or should not be done, you definitely don’t need it.
THAT I can fully agree with.
But if one has ever used capsman in the past (with legacy wifi), it’s not that different from what was used there.
So depending on your previous experience, wifiwave2 can be a real shock