Problems with connecting Samsung Orsay Smart TV to my WIFI network

Dear community,

I’m relatively new to networking and recently bought a Mikrotik hap ax³ to replace my ISP router.

I have since set it up and so far everything has been working for all my devices. Until yesterday, when I tried to connect my older Samsung Orsay Smart TV to my network.

What’s happening:

  • The network shows up in the network settings of the TV, I can enter the password and it will say it’s connected.
  • It gets an IP and the necessary infos about default gateway and dns servers from my DHCP server.
  • It then proceeds to say that it is not able to connect to the local network, nor the internet and stops being reachable from the local network (ping).
  • I monitored under Firewall → Connections that it was connecting to remote servers.

What I’ve tried in order to fix the issue:

  • “Have you tried turning it off and on again?” (Yes)
  • Resetting the TV (didn’t work)
  • Weirdly enough, during the reset process it will say it’s downloading an EULA or privacy policy, which…works without issues?
  • Connecting the TV using a powerline ethernet adapter
  • Result: Everything works perfectly fine, the TV is able to reach the internet and is also reachable from the local network.
  • Problem: Unfortunately not a permanent solution (adapter is needed elsewhere).
  • Disabling the 5ghz band on the router
  • Result: Still unable to connect

I’m kind of at a loss with this, it used to work fine on the ISP router’s WIFI network. I suspected that it had something to with the older wireless standard it might be using (I don’t know which standards the TV supports), since the old network was WIFI4 and this one is WIFI6. It’s just kind of weird to me that it would connect at first and seemingly be able to access the internet, then suddenly stop working. I have verified the DHCP info the TV gets and everything is correct.

Does anybody with more experience have an idea on how to solve this, or even just what the issue is?
It would be much appreciated, thank you in advance.

Config of WIFI interfaces on the router (I am trying to connect to the DEFAULT network):

# Wireless Channels configuration
/interface wifiwave2 channel
	add name=ch-2ghz band=2ghz-ax width=20mhz skip-dfs-channels=10min-cac
	add name=ch-5ghz band=5ghz-ax width=20/40/80mhz skip-dfs-channels=10min-cac

# Security Profiles
/interface wifiwave2 security
	add name=DEFAULT-auth authentication-types=wpa2-psk,wpa3-psk passphrase="*****" wps=disable ft=yes
	add name=GUEST-auth authentication-types=wpa2-psk,wpa3-psk passphrase="*****" wps=disable ft=yes
	add name=IOT-auth authentication-types=wpa2-psk,wpa3-psk passphrase="*****" wps=disable ft=yes

# Configurations
/interface wifiwave2 configuration
	add name=DEFAULT-conf ssid=YPPK9DQM country=* security=DEFAULT-auth mode=ap
	add name=GUEST-conf ssid=YPPK9DQM-GUEST country=* security=GUEST-auth mode=ap
	add name=IOT-conf ssid=YPPK9DQM-IOT country=* security=IOT-auth mode=ap hide-ssid=yes

# Interfaces
/interface wifiwave2
# 5ghz
	set [ find default-name=wifi1 ] channel=ch-5ghz name=DEFAULT-5ghz configuration=DEFAULT-conf disabled=no
	add name=GUEST-5ghz configuration=GUEST-conf master-interface=DEFAULT-5ghz disabled=no

#2ghz
	set [ find default-name=wifi2 ] channel=ch-2ghz name=DEFAULT-2ghz configuration=DEFAULT-conf disabled=no
	add name=GUEST-2ghz configuration=GUEST-conf master-interface=DEFAULT-2ghz disabled=no
	add name=IOT-2ghz configuration=IOT-conf master-interface=DEFAULT-2ghz disabled=yes

What channel are you using? Try channel 36 and AC mode instead of AX

Also many (older) IoT devices don’t like seeing anything modern being broadcast in their SSID … such as WPA3 or FT or similar.

Thank you very much for your reply, it appears that AC mode for the 5ghz channel and G mode for the 2ghz channel has indeed solved the connection issues.

I believe the way to go to not lose the advantages of newer standards would be creating a new channel and wifi interface for legacy devices, correct me if I’m wrong please.

Thank you for your input, it seems to be working for now but I’ll keep this in mind in case it acts up again.

Hello, I had the same problem, I reconfigured the wi-fi and now everything works, the tablet connects to Wi-Fi 6, the Samsung TV connects to Wi-Fi 5. Here are my settings.

[sailren@Mikrotik AX3] > interface/wifi/print          
Flags: M - MASTER; B - BOUND; R - RUNNING
Columns: NAME, CONFIGURATION.MODE, CONFIGURATION.SSID, CHANNEL.FREQUENCY, CHANNEL.WIDTH
#     NAME       CONFIGURATION.MODE  CONFIGURATION.SSID  CHANNEL.FREQUENCY  CHANNEL.WIDTH
0 MB  cap-wifi2  ap                  SkyNet              2402-2482          20/40mhz     
1 MB  cap-wifi5  ap                  SkyNet              5180-5300          20/40/80mhz  
2 MB  wifi 5     ap                  SkyNet              5180-5300          20/40/80mhz  
3 MBR wifi2.4    ap                  SkyNet              2402-2482          20/40mhz

[sailren@Mikrotik AX3] > interface/wifi/configuration/print 
Flags: X - disabled 
 0   name="wifi-conf-2.4" mode=ap ssid="SkyNet" country=United States multicast-enhance=enabled security=ax6 
     security.authentication-types=wpa2-psk,wpa3-psk .passphrase="******" .ft=yes .ft-over-ds=yes 
     datapath=data-main 
     datapath.bridge=bridge1 
     channel=channel2 
     channel.frequency=2402-2482 .width=20/40mhz .skip-dfs-channels=10min-cac 

 1   name="wifi-conf-5" mode=ap ssid="SkyNet" country=United States multicast-enhance=enabled security=ax6 
     security.authentication-types=wpa2-psk,wpa3-psk .passphrase="******" .ft=yes .ft-over-ds=yes 
     datapath=data-main 
     datapath.bridge=bridge1 
     channel=channel5 
     channel.frequency=5180-5300 .width=20/40/80mhz .skip-dfs-channels=all

Hi,

I have an hAP ax³ router and I’m trying to connect my new Samsung tv to the network. So far unsuccessful and my intense googling to fix the problem made me understand I have to configure my wifi to allow “AC” instead of just “AX” (whatever that is). Exporting from the terminal returns this:

[admin@MikroTik] > /export 
# 2025-03-08 02:04:34 by RouterOS 7.18.1
# software id = 4EI5-7FHT
#
# model = C53UiG+5HPaxD2HPaxD
# serial number = *******
/interface bridge
add admin-mac=F4:1E:57:2C:EE:22 auto-mac=no comment=defconf name=bridge
/interface wifi
set [ find default-name=wifi1 ] channel.skip-dfs-channels=10min-cac configuration.country=Sweden .mode=ap .ssid=TellusN1 disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
set [ find default-name=wifi2 ] channel.skip-dfs-channels=10min-cac configuration.country=Sweden .mode=ap .ssid=TellusN1-2G disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes
add configuration.ssid=TellusN1-Guest disabled=no mac-address=F6:1E:57:2C:EE:26 master-interface=wifi1 name=wifi3
add configuration.ssid=TellusN1-Guest disabled=no mac-address=F6:1E:57:2C:EE:27 master-interface=wifi2 name=wifi4
add channel.band=5ghz-ac .secondary-frequency=disabled .skip-dfs-channels=disabled .width=20/40mhz configuration.mode=ap .ssid=TellusN1-TV disabled=no mac-address=F6:1E:57:2C:EE:28 master-interface=wifi1 name=wifi5 security.authentication-types=wpa-psk,wpa2-psk \
    .encryption=""
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge filter
add action=drop chain=forward in-interface=wifi3
add action=drop chain=forward out-interface=wifi3
add action=drop chain=forward in-interface=wifi4
add action=drop chain=forward out-interface=wifi4
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wifi1
add bridge=bridge comment=defconf interface=wifi2
add bridge=bridge interface=wifi3
add bridge=bridge interface=wifi4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system clock
set time-zone-name=Europe/Stockholm
/system note
set show-at-login=no
/system routerboard mode-button
set enabled=yes on-event=dark-mode
/system routerboard wps-button
set enabled=yes on-event=wps-accept
/system script
add comment=defconf dont-require-permissions=no name=dark-mode owner=*sys policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\
    "\r\
    \n   :if ([system leds settings get all-leds-off] = \"never\") do={\r\
    \n     /system leds settings set all-leds-off=immediate \r\
    \n   } else={\r\
    \n     /system leds settings set all-leds-off=never \r\
    \n   }\r\
    \n "
add comment=defconf dont-require-permissions=no name=wps-accept owner=*sys policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\
    "\r\
    \n   :foreach iface in=[/interface/wifi find where (configuration.mode=\"ap\" && disabled=no)] do={\r\
    \n     /interface/wifi wps-push-button \$iface;}\r\
    \n "
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN

What do I need to do to make it work? I am totally incompetent here. Any help is appreciated. Many thanks in advance.