Below is the “/export hide-sensitive file=export-hs”.
The config is not fully configured yet (esp. firewall/security). And there are some unused/disabled/experimental stuff in it, for example the dhcp pool132, pool133, pool134 stuff. This router is not directly connected to the Internet: it just connects to an uplink router here, ie it’s in a safe test environment inside the LAN, so security is not that much concern for the moment.
Let me know if you find something that could explain the problem of wlanX not being pingable from ether2..ether5, whereas ping from etherX to etherY works fine, as well ping from ether1 to wlanX. Btw, adding also LAN (ether2..ether5) to the bridge is NOT a solution, as then other things start stopping to work, like Internet access). Best would be to get rid of the bridge completely, but then wlan does not function as then wlan clients cannot connect to the AP; it seems the use of a bridge is mandatory with wlan interfaces.
.
jun/17/2020 16:53:03 by RouterOS 6.47
software id = I2LK-MU5N
model = RBD52G-5HacD2HnD
serial number = XXXXXXXX
/interface bridge
add name=bridge1
/interface ethernet
set [ find default-name=ether1 ] rx-flow-control=auto tx-flow-control=auto
set [ find default-name=ether2 ] rx-flow-control=auto tx-flow-control=auto
set [ find default-name=ether3 ] rx-flow-control=auto tx-flow-control=auto
set [ find default-name=ether4 ] rx-flow-control=auto tx-flow-control=auto
set [ find default-name=ether5 ] rx-flow-control=auto tx-flow-control=auto
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX
country=germany disabled=no distance=indoors frequency=auto mode=
ap-bridge ssid=MTAP2 wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=
20/40/80mhz-XXXX country=germany disabled=no distance=indoors frequency=
auto mode=ap-bridge ssid=MTAP5 wireless-protocol=802.11
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=
dynamic-keys supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk management-protection=allowed mode=
dynamic-keys name=profile_g2 supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys name=profile
supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=dhcp ranges=192.168.254.10-192.168.254.19
add name=pool132 ranges=192.168.132.10-192.168.132.19
add name=pool133 ranges=192.168.133.10-192.168.133.19
add name=pool134 ranges=192.168.134.10-192.168.134.19
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge1 name=defconf
add address-pool=pool132 interface=wlan1 name=dhcp-wlan1-pool132
add address-pool=pool133 interface=wlan2 name=dhcp-wlan2-pool133
/port
set 0 baud-rate=9600 data-bits=8 flow-control=none name=usb1 parity=none
stop-bits=1
set 1 baud-rate=9600 data-bits=8 flow-control=none name=usb2 parity=none
stop-bits=1
/user group
set full policy=“local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas
sword,web,sniff,sensitive,api,romon,dude,tikapp”
/interface bridge port
add bridge=bridge1 interface=WAN trusted=yes
/interface list member
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=wlan2 list=WAN
add interface=wlan1 list=WAN
/ip address
add address=192.168.254.253/24 interface=ether1 network=192.168.254.0
add address=192.168.127.254/17 interface=ether2 network=192.168.0.0
add address=192.168.128.254/24 interface=ether3 network=192.168.128.0
add address=192.168.129.254/24 interface=ether4 network=192.168.129.0
add address=192.168.131.254/24 interface=ether5 network=192.168.131.0
/ip cloud
set update-time=no
/ip dns
set allow-remote-requests=yes servers=192.168.254.254
/ip dns static
add address=192.168.131.254 name=router.lan type=A
/ip firewall filter
add action=accept chain=forward comment=“defconf: accept in ipsec policy”
ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy”
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid”
connection-state=invalid
add action=drop chain=forward comment=
“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat
connection-state=new disabled=yes in-interface-list=WAN
add action=drop chain=forward disabled=yes icmp-options=8:0 limit=3,10:packet
packet-size=93-65535 protocol=icmp
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” disabled=yes
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-address=192.168.254.253 dst-port=8458
protocol=tcp to-addresses=192.168.20.1 to-ports=8458
/ip route
add distance=1 gateway=192.168.254.254
add distance=1 dst-address=192.168.130.0/24 gateway=192.168.129.253
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www-ssl disabled=no
set api disabled=yes
set winbox disabled=yes
set api-ssl disabled=yes
/ip smb
set allow-guests=no
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=MikroTik-AP
/system ntp client
set enabled=yes primary-ntp=192.168.254.254
>