ccr1036: bridge port probably loop - not able to solve

Hello,


I have a ccr1036 with latest sw 6.42.6 and I am in setup & test phase not connected subscribers yet. There are appearing disquieting log here:

jul/20 00:13:24 interface,warning ether9-VOIP2: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:14:24 interface,warning ether9-VOIP2: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:15:24 interface,warning ether3-IPTV: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:16:24 interface,warning ether3-IPTV: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:17:24 interface,warning ether3-IPTV: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:18:24 interface,warning ether9-VOIP2: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop

A curious fact is that loop occurs every minute exact.
The bridge config is as follow:

/interface bridge
add admin-mac=56:DD:41:34:94:520 auto-mac=no igmp-snooping=yes name=
bridge1-maine vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=ether1-RADIUS
set [ find default-name=ether2 ] loop-protect=on name=ether2-VOIP
set [ find default-name=ether3 ] loop-protect=off name=ether3-IPTV
set [ find default-name=ether4 ] loop-protect=on
set [ find default-name=ether9 ] loop-protect=off name=ether9-VOIP2
set [ find default-name=sfp4 ] loop-protect=on name=sfp4-OLT
/interface vlan
add interface=bridge1-maine loop-protect=on name=vlan-PPPOE510 vlan-id=510
add interface=bridge1-maine loop-protect=on name=vlan-PPPOE530 vlan-id=530
add interface=bridge1-maine loop-protect=on name=vlan-WAN540 vlan-id=540
add interface=bridge1-maine loop-protect=on name=vlan500-MANAGE vlan-id=
500
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge filter
add action=drop chain=forward in-interface=ether9-VOIP2 log=yes log-prefix=e9
src-mac-address=56:DD:41:34:94:520/FF:FF:FF:FF:FF:FF
add action=drop chain=forward in-interface=ether3-IPTV log=yes log-prefix=e3
src-mac-address=56:DD:41:34:94:520/FF:FF:FF:FF:FF:FF

/interface bridge port
add bridge=bridge1-maine broadcast-flood=no interface=sfp1
unknown-multicast-flood=no unknown-unicast-flood=no
add bridge=bridge1-maine hw=no interface=sfp2
add auto-isolate=yes bridge=bridge1-maine horizon=2 hw=no interface=
sfp4-OLT
add auto-isolate=yes bridge=bridge1-maine horizon=1 hw=no interface=
ether2-VOIP unknown-unicast-flood=no
add auto-isolate=yes bridge=bridge1-maine horizon=2 hw=no interface=sfp3
add bridge=bridge1-maine hw=no interface=ether11 pvid=540
add auto-isolate=yes bridge=bridge1-maine horizon=1 hw=no interface=
ether3-IPTV
add auto-isolate=yes bridge=bridge1-maine horizon=2 hw=no interface=ether4
pvid=550
add auto-isolate=yes bridge=bridge1-maine horizon=1 hw=no interface=
ether9-VOIP2
/interface bridge vlan
add bridge=bridge1-maine tagged=
sfp4-OLT,ether2-VOIP,sfp1,ether9-VOIP2 vlan-ids=520
add bridge=bridge1-maine tagged=sfp1,bridge1-maine untagged=ether11
vlan-ids=540
add bridge=bridge1-maine tagged=
sfp2,sfp4-OLT,ether3-IPTV,bridge1-maine untagged=ether4
vlan-ids=550
add bridge=bridge1-maine tagged=bridge1-maine,sfp4-OLT
vlan-ids=510
add bridge=bridge1-maine tagged=bridge1-maine,sfp3,sfp4-OLT
vlan-ids=530
add bridge=bridge1-maine tagged=sfp4-OLT,bridge1-maine
vlan-ids=500
/interface pppoe-server server
add default-profile=main disabled=no interface=vlan-PPPOE510 max-mru=1480
max-mtu=1480 service-name=PPPOE510
add default-profile=main disabled=no interface=vlan-PPPOE530 max-mru=1480
max-mtu=1480 service-name=PPPOE530



I tried to catch & drop those packets, see bolded commands, something is identified a little before loop and it is dropped, but loop occurs again:
jul/20 00:58:23 firewall,info e3 forward: in:ether3-IPTV out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac 01:00:0c:cc:cc:cc, eth-proto 0053
jul/20 00:58:23 firewall,info e9 forward: in:ether9-VOIP2 out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac ff:ff:ff:ff:ff:ff, eth-proto 0800, UDP, 0.0.0.0:5678->255.
255.255.255:5678, len 149
jul/20 00:58:23 firewall,info e9 forward: in:ether9-VOIP2 out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac 01:00:0c:cc:cc:cc, eth-proto 0053
jul/20 00:58:23 firewall,info e3 forward: in:ether3-IPTV out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac ff:ff:ff:ff:ff:ff, eth-proto 0800, UDP, 0.0.0.0:5678->255.2
55.255.255:5678, len 149
jul/20 00:58:24 interface,warning ether9-VOIP2: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop
jul/20 00:59:23 firewall,info e3 forward: in:ether3-IPTV out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac 01:00:0c:cc:cc:cc, eth-proto 0053
jul/20 00:59:23 firewall,info e9 forward: in:ether9-VOIP2 out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac ff:ff:ff:ff:ff:ff, eth-proto 0800, UDP, 0.0.0.0:5678->255.
255.255.255:5678, len 149
jul/20 00:59:23 firewall,info e9 forward: in:ether9-VOIP2 out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac 01:00:0c:cc:cc:cc, eth-proto 0053
jul/20 00:59:23 firewall,info e3 forward: in:ether3-IPTV out:sfp4-OLT, src-mac 56:dd:41:34:94:27, dst-mac ff:ff:ff:ff:ff:ff, eth-proto 0800, UDP, 0.0.0.0:5678->255.2
55.255.255:5678, len 149
jul/20 00:59:24 interface,warning ether9-VOIP2: bridge port received packet with own address as source address (56:dd:41:34:94:27), probably loop



All my needed services work ok, the only problem is the warning, the idea that this can be aggravated when many clients are connected.

Can anybody help me ?
is someone that experienced a similiar problem ?

thanks in advance