Hyper-V, Chr, wrong mac in neighbor list

Source:
Windows Server 2016 standard, Hyper-V
Chr 6.48.6
Two interface: ethernet and bridge with it.
Mac address on interface and bridge (admin-mac) the same from Hyper-V virtual machine (00:15:xx:xx:xx:xx)

In neighbor list in other MT i can see chr with two mac addresses:
mac from chr (00:15:xx:xx:xx:xx) and mac from Hyper-V server interface.

Why is the host machine mac visible?

Has no one face with this problem?

On this CHR router, there are only two interfaces connected from the HV. Their “native” mac addresses start with “00:15:5D”.

There are no other interfaces (bridge etc).

Where the “E4:11:5B” addresses come from is unknown. There is no mention of these macs in the configuration.

Where do wrong mac addresses come from? How do I get rid of them???

interface/export verbose terse

/interface ethernet set [ find default-name=ether2 ] advertise="" arp=enabled arp-timeout=auto auto-negotiation=yes cable-settings=default disable-runnin
g-check=no disabled=no full-duplex=yes loop-protect=default loop-protect-disable-time=5m loop-protect-send-interval=5s mac-address=00:15:5D:05:16:20 mtu=
1500 name=ether-mgmt orig-mac-address=00:15:5D:05:16:20 speed=100Mbps
/interface ethernet set [ find default-name=ether1 ] advertise="" arp=enabled arp-timeout=auto auto-negotiation=yes cable-settings=default disable-runnin
g-check=no disabled=no full-duplex=yes loop-protect=default loop-protect-disable-time=5m loop-protect-send-interval=5s mac-address=00:15:5D:05:16:0F mtu=
1500 name=ether1 orig-mac-address=00:15:5D:05:16:0F speed=100Mbps
/interface list set [ find name=all ] comment="contains all interfaces" exclude="" include="" name=all
/interface list set [ find name=none ] comment="contains no interfaces" exclude="" include="" name=none
/interface list set [ find name=dynamic ] comment="contains dynamic interfaces" exclude="" include="" name=dynamic
/interface list set [ find name=static ] comment="contains static interfaces" exclude="" include="" name=static
/interface lte apn set [ find default=yes ] add-default-route=yes apn=internet authentication=none default-route-distance=2 ip-type=auto name=default use
-network-apn=yes use-peer-dns=yes
/interface macsec profile set [ find default-name=default ] name=default server-priority=10
/interface wireless security-profiles set [ find default=yes ] authentication-types="" disable-pmkid=no eap-methods=passthrough group-ciphers=aes-ccm gro
up-key-update=5m interim-update=0s management-protection=disabled mode=none mschapv2-username="" name=default radius-called-format=mac:ssid radius-eap-ac
counting=no radius-mac-accounting=no radius-mac-authentication=no radius-mac-caching=disabled radius-mac-format=XX:XX:XX:XX:XX:XX radius-mac-mode=as-user
name static-algo-0=none static-algo-1=none static-algo-2=none static-algo-3=none static-sta-private-algo=none static-transmit-key=key-0 supplicant-identi
ty=MikroTik tls-certificate=none tls-mode=no-certificates unicast-ciphers=aes-ccm
/interface bridge port-controller
# disabled
set bridge=none cascade-ports="" switch=none
/interface bridge port-extender
# disabled
set control-ports="" excluded-ports="" switch=none
/interface bridge settings set allow-fast-path=yes use-ip-firewall=no use-ip-firewall-for-pppoe=no use-ip-firewall-for-vlan=no
/interface detect-internet set detect-interface-list=none internet-interface-list=none lan-interface-list=none wan-interface-list=none
/interface l2tp-server server set accept-proto-version=all accept-pseudowire-type=all allow-fast-path=no authentication=pap,chap,mschap1,mschap2 caller-i
d-type=ip-address default-profile=default-encryption enabled=no keepalive-timeout=30 l2tpv3-circuit-id="" l2tpv3-cookie-length=0 l2tpv3-digest-hash=md5 !
l2tpv3-ether-interface-list max-mru=1450 max-mtu=1450 max-sessions=unlimited mrru=disabled one-session-per-host=no use-ipsec=no
/interface lte settings set firmware-path=firmware mode=auto
/interface ovpn-server server set auth=sha1,md5 certificate=*0 cipher=blowfish128,aes128-cbc default-profile=default enable-tun-ipv6=no enabled=no ipv6-p
refix-len=64 keepalive-timeout=60 mac-address=FE:A2:B0:FD:0C:18 max-mtu=1500 mode=ip netmask=24 port=1194 protocol=tcp redirect-gateway=disabled reneg-se
c=3600 require-client-certificate=no tls-version=any tun-server-ipv6=::
/interface pptp-server server
# PPTP connections are considered unsafe, it is suggested to use a more modern VPN protocol instead
set authentication=mschap1,mschap2 default-profile=default-encryption enabled=no keepalive-timeout=30 max-mru=1450 max-mtu=1450 mrru=disabled
/interface sstp-server server set authentication=pap,chap,mschap1,mschap2 certificate=none default-profile=default enabled=no keepalive-timeout=60 max-mr
u=1500 max-mtu=1500 mrru=disabled pfs=no port=443 tls-version=any verify-client-certificate=no
/interface wireless align set active-mode=yes audio-max=-20 audio-min=-100 audio-monitor=00:00:00:00:00:00 filter-mac=00:00:00:00:00:00 frame-size=300 fr
ames-per-second=25 receive-all=no ssid-all=no
/interface wireless cap set bridge=none caps-man-addresses="" caps-man-certificate-common-names="" caps-man-names="" certificate=none discovery-interface
s="" enabled=no interfaces="" lock-to-caps-man=no static-virtual=no
/interface wireless sniffer set channel-time=200ms file-limit=10 file-name="" memory-limit=10 multiple-channels=no only-headers=no receive-errors=no stre
aming-enabled=no streaming-max-rate=0 streaming-server=0.0.0.0
/interface wireless snooper set channel-time=200ms multiple-channels=yes receive-errors=no

thesame.png