Port Tested and Network Scanners Getting Incorrect Data

Hello all!

We have the below setup of MikroTik Devices (correction, hAP ax2 is actually a hAP ac2):
RoughNet.png
The CCR and both hAPs are running RouterOS. Both CRS devices are running SwOS. The CCR is doing all the routing via IP and interfaces and does not have any bridges. The hAPs are both doing bridges for the Wi-Fi/Ports. I have included the configs of the CCR and both hAPs at the bottom. The switches do some port isolation and have STP enabled. For STP, the CRS328 has a bridge priority of 4000 and the CRS317 is 5000. The CRS317 shows the port connected to the CRS328 (Uplink) as the root in STP. The CRS328 does not have any port labelled as root.

My issue is that network scanning software like Zabbix and Auvik show network trees wrong, and hardware tools like LinkSprinter and Netool show the wrong device for connection. For example, when connecting a Netool directly to Ether7 of the CRS328, the Netool will show it is connected to Ether1/Bridge of the hAP Ac2. Zabbix and Auvik also show similar where it can’t decide the chained order of devices and shows things connected directly to the CRS328 or CRS317 as connected to one of the hAP devices.

I know the devices/software aren’t perfect, but I’m curious if there is something that can be done to correct this on the MikroTik side since multiple different software and devices show the same bad data. I do not know how these tools determine what is connected to what (R/STP, MACs, etc.)

Hoping someone has ran into this before or has an idea to try. Thanks!

Netool example. Device is connected to Ether7 on the CRS328 (10.0.0.2)
Screenshot_20240104_111427_netoolPro2~2 (1).jpg
Configs

CCR2004:

# 2024-01-04 10:57:11 by RouterOS 7.13
#
# model = CCR2004-16G-2S+
/interface ethernet
set [ find default-name=ether1 ] name=ether1-FiberWAN
set [ find default-name=ether2 ] name=ether2-CellWAN
/interface vlan
add interface=sfp-sfpplus2 name=vlan10-Cameras vlan-id=10
add interface=sfp-sfpplus2 name=vlan20-Untrusted vlan-id=20
add interface=sfp-sfpplus2 name=vlan40-PublicIPs vlan-id=40
/disk
set pcie1 type=hardware
set pcie1-usb1 type=hardware
add parent=pcie1-usb1 partition-number=1 partition-offset=512 partition-size="32 080 199 680" type=partition
/interface list
add name=WAN
add name=ACL-ACCESS-WAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=Trusted ranges=10.0.0.100-10.0.0.200
add name=Guest/IOT ranges=10.0.20.100-10.0.20.200
add name=Cameras ranges=10.0.10.0/24
add name=PublicIPs ranges=PublicIPBlock.250-PublicIPBlock.254
/ip dhcp-server
add address-pool=Trusted interface=sfp-sfpplus2 lease-time=10m name=dhcp-Trusted
add address-pool=Guest/IOT interface=vlan20-Untrusted lease-time=10m name=dhcp-Untrusted
add address-pool=Cameras interface=vlan10-Cameras lease-time=10m name=dhcp-Cameras
add address-pool=PublicIPs interface=vlan40-PublicIPs lease-time=10m name=dhcp-PublicIPs
/port
set 0 name=serial0
set 1 name=serial1
/ipv6 settings
set disable-ipv6=yes
/interface detect-internet
set detect-interface-list=all
/interface list member
add interface=ether1-FiberWAN list=WAN
add interface=ether2-CellWAN list=WAN
add interface=sfp-sfpplus2 list=ACL-ACCESS-WAN
add interface=vlan20-Untrusted list=ACL-ACCESS-WAN
add interface=vlan40-PublicIPs list=ACL-ACCESS-WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=ether15 network=192.168.88.0
add address=FiberIP/24 interface=ether1-FiberWAN network=FiberNetwork
add address=10.0.10.1/24 interface=vlan10-Cameras network=10.0.10.0
add address=10.0.20.1/24 interface=vlan20-Untrusted network=10.0.20.0
add address=PublicIPBlock.249/29 interface=vlan40-PublicIPs network=PublicIPBlock.248
add address=10.0.0.1/24 interface=sfp-sfpplus2 network=10.0.0.0
/ip dhcp-client
add add-default-route=no interface=ether2-CellWAN use-peer-dns=no
/ip dhcp-server network
add address=10.0.0.0/24 dns-server=10.0.0.42,10.0.0.62,10.0.0.82 domain=REDACTED gateway=10.0.0.1
add address=10.0.10.0/24 dns-server=1.1.1.1,1.0.0.1 domain=cams gateway=10.0.10.1
add address=10.0.20.0/24 dns-server=1.1.1.1,1.0.0.1 domain=iso gateway=10.0.20.1
add address=PublicIPBlock.248/29 dns-server=1.1.1.1,1.0.0.1 gateway=PublicIPBlock.249
/ip dns
set servers=1.1.1.1,1.0.0.1
/ip firewall address-list
add address=PublicIPBlock.251 list=MattAccess
add address=PublicIPBlock.252 list=MattAccess
add address=10.0.20.10 list=InternalAppAllow
/ip firewall filter
add action=fasttrack-connection chain=forward connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="Accept Established Connections on Forward and Input Chains" connection-state=established,related
add action=accept chain=input connection-state=established,related
add action=drop chain=forward comment="Drop Invalid from WAN" connection-state=invalid
add action=drop chain=input connection-state=invalid
add action=accept chain=forward comment="Accept DSTNAT Packets" connection-nat-state=dstnat in-interface=ether1-FiberWAN
add action=accept chain=forward comment="Allow WAN ACL to WAN" in-interface-list=ACL-ACCESS-WAN out-interface-list=WAN
add action=accept chain=forward comment="Allow Trusted to Everything" in-interface=sfp-sfpplus2 src-address=10.0.0.0/24
add action=accept chain=input in-interface=sfp-sfpplus2 src-address=10.0.0.0/24
add action=accept chain=forward comment="Allow Access to MattAccess from WAN except specific ports" dst-address-list=MattAccess dst-port=!0-5900 in-interface=ether1-FiberWAN protocol=tcp
add action=accept chain=forward dst-address-list=MattAccess dst-port=!0-5900 in-interface=ether1-FiberWAN protocol=udp
add action=accept chain=forward comment="Allow InternalAppAllow Address List to InternalApp Server" dst-address=10.0.0.61 dst-port=32400 protocol=tcp src-address-list=InternalAppAllow
add action=accept chain=output comment="Allow Router Output"
add action=drop chain=forward comment="Drop Not Matched"
add action=drop chain=input
add action=drop chain=output
/ip firewall nat
add action=masquerade chain=srcnat comment="Fiber WAN Masquerade" out-interface=ether1-FiberWAN
add action=masquerade chain=srcnat comment="Cellular WAN Masquerade" out-interface=ether2-CellWAN
add action=dst-nat chain=dstnat comment="DSTNAT Port 25 to PMG" dst-address=FiberIP dst-port=25 in-interface=ether1-FiberWAN protocol=tcp to-addresses=10.0.0.90 to-ports=25
add action=dst-nat chain=dstnat comment="DSTNAT Port 32400 to SM-2U - InternalApp" dst-address=FiberIP dst-port=32400 protocol=tcp to-addresses=10.0.0.61 to-ports=32400
add action=masquerade chain=srcnat comment="Hairpin NAT" disabled=yes dst-address=10.0.0.0/24 out-interface=sfp-sfpplus2 src-address=10.0.0.0/24
/ip firewall service-port
set sip disabled=yes
/ip route
add check-gateway=ping disabled=no distance=5 dst-address=0.0.0.0/0 gateway=FiberISPGateway pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add check-gateway=ping disabled=no distance=10 dst-address=0.0.0.0/0 gateway=192.168.12.1 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=8.8.8.8/32 gateway=FiberISPGateway routing-table=main suppress-hw-offload=no
add disabled=no dst-address=8.8.4.4/32 gateway=192.168.12.1 routing-table=main suppress-hw-offload=no
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=10.0.0.0/24
set ssh address=10.0.0.0/24
set api disabled=yes
set winbox address=10.0.0.0/24
set api-ssl disabled=yes
/ipv6 dhcp-client
add disabled=yes interface=ether2-CellWAN pool-name=Cellv6 request=address
/system clock
set time-zone-name=America/Chicago
/system identity
set name=DH-CoreRouter
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.pool.ntp.org
add address=1.pool.ntp.org
add address=2.pool.ntp.org
add address=3.pool.ntp.org
/tool netwatch
add comment="Fiber WAN Monitor" disabled=no down-script="ip route disable [find dst-address=0.0.0.0/0 gateway=FiberISPGateway]\r\
    \n:log error \"Fiber WAN is Down!\"\r\
    \n/ip firewall connection remove [find]" host=8.8.8.8 http-codes="" interval=10s test-script="" timeout=1s type=simple up-script=\
    "ip route enable [find dst-address=0.0.0.0/0 gateway=FiberISPGateway]\r\
    \n:log error \"Fiber WAN is Up!\"\r\
    \n/ip firewall connection remove [find]"
add comment="Cellular WAN Monitor" disabled=no down-script="ip route disable [find dst-address=0.0.0.0/0 gateway=192.168.12.1]\r\
    \n:log error \"Cell WAN is Down!\"" host=8.8.4.4 http-codes="" interval=10s test-script="" timeout=1s type=simple up-script="ip route enable [find dst-address=0.0.0.0/0 gateway=192.168.12.1]\r\
    \n:log error \"Cell WAN is Up!\""

Will post the additionals in a comment. They were not collapsing into a code block in the main post for some reason.

hAP ac2:

# 2024-01-04 11:15:40 by RouterOS 7.13
#
# model = RBD52G-5HacD2HnD
/interface bridge
add admin-mac=18:FD:74:DD:07:63 auto-mac=no name=MainBridge port-cost-mode=short
add name=VLAN20Bridge port-cost-mode=short
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MikroTik-DD0767 wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=MikroTik-DD0768 wireless-protocol=802.11
/interface vlan
add interface=ether1 name=vlan20 vlan-id=20
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/snmp community
add addresses=::/0 authentication-protocol=SHA1 encryption-protocol=AES name=Auvik security=private write-access=yes
/system logging action
set 3 remote=10.0.0.101 src-address=10.0.0.4
/interface bridge port
add bridge=MainBridge interface=ether2 internal-path-cost=10 path-cost=10
add bridge=MainBridge interface=ether1 internal-path-cost=10 path-cost=10
add bridge=VLAN20Bridge interface=vlan20 internal-path-cost=10 path-cost=10
add bridge=VLAN20Bridge interface=ether3 internal-path-cost=10 path-cost=10
add bridge=MainBridge interface=ether4 internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=MainBridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip dhcp-client
add comment=defconf interface=MainBridge
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked disabled=yes
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid disabled=yes
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" disabled=yes dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related disabled=yes hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked disabled=yes
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid disabled=yes
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new disabled=yes in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip traffic-flow
set active-flow-timeout=1m
/ip traffic-flow target
add dst-address=10.0.0.101
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/snmp
set enabled=yes
/system clock
set time-zone-name=America/Chicago
/system identity
set name=DH-WorkDesk
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

hAP ax3:

# 2024-01-04 11:17:39 by RouterOS 7.13
#
# model = C53UiG+5HPaxD2HPaxD
/interface bridge
add admin-mac=48:A9:8A:BA:F5:3A auto-mac=no comment=defconf name=bridge \
    port-cost-mode=short
/interface wifi
set [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=10min-cac \
    .width=20/40/80mhz comment="The LAN Before Time 5" configuration.mode=ap \
    .ssid="The LAN Before Time" disabled=no security.authentication-types=\
    wpa2-eap,wpa3-eap
set [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=10min-cac \
    .width=20/40mhz comment="The LAN Before Time 2.4" configuration.mode=ap \
    .ssid="The LAN Before Time" disabled=no security.authentication-types=\
    wpa2-eap,wpa3-eap
add comment="Guest 5" configuration.hide-ssid=no .mode=ap .ssid=\
    "Guest" datapath.client-isolation=yes .vlan-id=20 disabled=no \
    mac-address=4A:A9:8A:BA:F5:3E master-interface=wifi1 name=wifi3 \
    security.authentication-types=wpa2-psk,wpa3-psk
add comment="Guest 2.4" configuration.hide-ssid=no .mode=ap .ssid=\
    "Guest" datapath.client-isolation=yes .vlan-id=20 disabled=no \
    mac-address=4A:A9:8A:BA:F5:3F master-interface=wifi2 name=wifi4 \
    security.authentication-types=wpa2-psk,wpa3-psk
add comment=DH24IOT configuration.hide-ssid=yes .mode=ap .ssid=DH24IOT \
    datapath.client-isolation=yes .vlan-id=20 disabled=no mac-address=\
    4A:A9:8A:BA:F5:40 master-interface=wifi2 name=wifi5 \
    security.authentication-types=wpa2-psk
add comment=DH24CAM configuration.hide-ssid=yes .mode=ap .ssid=DH24CAM \
    datapath.client-isolation=yes .vlan-id=10 disabled=no mac-address=\
    4A:A9:8A:BA:F5:41 master-interface=wifi2 name=wifi6 \
    security.authentication-types=wpa2-psk
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/snmp community
add addresses=::/0 authentication-protocol=SHA1 encryption-protocol=AES name=\
    Auvik security=private write-access=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether3 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether4 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether5 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=wifi1 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=wifi2 internal-path-cost=10 \
    path-cost=10
add bridge=bridge interface=ether1 internal-path-cost=10 path-cost=10
add bridge=bridge interface=wifi3 internal-path-cost=10 path-cost=10
add bridge=bridge interface=wifi4 internal-path-cost=10 path-cost=10
add bridge=bridge interface=wifi5 internal-path-cost=10 path-cost=10
add bridge=bridge interface=wifi6 internal-path-cost=10 path-cost=10
add bridge=bridge interface=*D internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip dhcp-client
add comment=defconf interface=bridge
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
    192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
/ip traffic-flow
set enabled=yes
/ip traffic-flow target
add dst-address=10.0.0.101
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
    33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp \
    src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
    invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" \
    src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" \
    dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/radius
add address=10.0.0.82 service=wireless,dot1x
/snmp
set enabled=yes
/system clock
set time-zone-name=America/Chicago
/system identity
set name=DH-WAP
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

https://www.zabbix.com/forum/

Searched there and engaged Auvik support before posting here. Couldn’t get anything figured out either side, other than seems to be something with the config of the MTik equipment and network. Posted here since seeing it across multiple different applications and a hardware test tool.

For anyone who finds this in the future, this was indeed a MikroTik issue and not an issue with Zabbix, Auvik, or Netool.

SwOS does not support LLDP, so the tools were passing LLDP from other connected devices on. 99% of the time, it was the hAP, but very rarely, it would see the CoreRouter.

Since the switches support RouterOS, I switched them over and setup the switching via bridges. Everything now works exactly as intended.