Hi all, might have an issue with dhcp server deassigning/assigning IP continuously.

-Lease 30m
-Reassignment happens at the same exact time, client gets the same ip
I might know what’s causing this..
Basically I have a trunk port (vlan 99) on ether4 that injects vlan on ubiquiti for the wifi.
If I do an IP scan on my mikrotik’s bridge, I can see also the IPs that come from the unifi switches(80), not only the IPs native on my Tik(99). I don’t think this is normal.
This is my vlan setup, what could be wrong?
# 2024-11-23 12:51:25 by RouterOS 7.16.1
# software id = PT2A-YBM3
#
# model = RB760iGS
# serial number =
/interface bridge
add admin-mac=48:8F:5A:A6:CB:1D auto-mac=no comment=defconf dhcp-snooping=yes \
name=brLAN vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=e1-WAN
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard1
/interface vlan
add interface=brLAN name=vlan99 vlan-id=99
add interface=e1-WAN name=vlan835 vlan-id=835
/interface pppoe-client
add add-default-route=yes disabled=no interface=vlan835 name=pppoe-WIC user=\
ac17205371781
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=VPNPOOL ranges=172.30.30.30-172.30.30.40
add name=dhcp_pool2 ranges=192.168.9.2-192.168.9.254
add name=dhcp_pool3 ranges=192.168.99.2-192.168.99.240
/ip dhcp-server
add address-pool=dhcp_pool2 disabled=yes interface=brLAN name=dhcp1
add address-pool=dhcp_pool3 interface=vlan99 lease-time=4h name=dhcp2
/ppp profile
set *FFFFFFFE local-address=VPNPOOL remote-address=VPNPOOL
/interface sstp-client
add authentication=mschap1,mschap2 connect-to=mk.estcom.online disabled=no \
name=ppp-triestinaanalytics profile=default-encryption user=\
ppp-triestinaanalytics verify-server-address-from-certificate=no
/snmp community
set [ find default=yes ] name=estcom
/interface bridge port
add bridge=brLAN comment=defconf interface=ether2
add bridge=brLAN comment=defconf interface=ether3 pvid=99
add bridge=brLAN comment=defconf interface=ether5 pvid=99
add bridge=brLAN comment=defconf interface=sfp1
add bridge=brLAN interface=ether4
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=brLAN tagged=brLAN,ether4 untagged=ether5,ether3 vlan-ids=99
/interface l2tp-server server
set authentication=mschap1,mschap2 enabled=yes use-ipsec=yes
/interface list member
add comment=defconf interface=brLAN list=LAN
add comment=defconf interface=e1-WAN list=WAN
add interface=pppoe-WIC list=WAN
add interface=vlan835 list=WAN
/interface pptp-server server
# PPTP connections are considered unsafe, it is suggested to use a more modern VPN protocol instead
set enabled=yes
/interface wireguard peers
add allowed-address=0.0.0.0/0 endpoint-port=13231 interface=wireguard1 name=\
peer1 public-key="78Ehw7OQ9T9KL7BqyEiJT3XEgByKcsbzpdfS5S78mSY="
/ip address
add address=192.168.9.1/24 comment=defconf interface=brLAN network=\
192.168.9.0
add address=192.168.99.1/24 interface=vlan99 network=192.168.99.0
/ip dhcp-server lease
add address=192.168.99.252 client-id=1:b8:a4:4f:3d:eb:21 mac-address=\
B8:A4:4F:3D:EB:21 server=dhcp2
add address=192.168.99.251 client-id=1:b8:a4:4f:3d:eb:1d mac-address=\
B8:A4:4F:3D:EB:1D server=dhcp2
add address=192.168.99.246 client-id=1:5c:e9:1e:7e:b7:b5 mac-address=\
5C:E9:1E:7E:B7:B5 server=dhcp2
add address=192.168.99.247 client-id=1:32:f2:9d:7:84:88 mac-address=\
32:F2:9D:07:84:88 server=dhcp2
add address=192.168.99.245 mac-address=80:69:1A:57:2B:78 server=dhcp2
/ip dhcp-server network
add address=192.168.9.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.9.1
add address=192.168.99.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.99.1
/ip dns
set allow-remote-requests=yes cache-size=20480KiB max-concurrent-queries=300 \
max-concurrent-tcp-sessions=60 servers=\
1.1.1.1,208.67.222.222,208.67.220.220,8.8.8.8,8.8.4.4
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall address-list
add address=5.8.101.240/28 list=ESTCOM
add address=10.99.99.0/24 list=ESTCOM-REMOTE
add address=10.64.1.0/24 list=ESTCOM-REMOTE
add address=access.estcom.online list=ESTCOM
/ip firewall filter
add action=accept chain=input dst-port=13231 protocol=udp
add action=accept chain=input comment=VPN dst-port=8291 in-interface=e1-WAN \
protocol=tcp src-address-list=ESTCOM
add action=accept chain=input dst-port=4500,500,1723,1701 in-interface=e1-WAN \
protocol=tcp
add action=accept chain=input dst-port=4500,500,1723,1701 in-interface=e1-WAN \
protocol=udp
add action=accept chain=input in-interface=e1-WAN protocol=ipsec-esp
add action=accept chain=input in-interface=e1-WAN protocol=ipsec-ah
add action=accept chain=input in-interface=e1-WAN protocol=gre
add action=accept chain=input src-address-list=ESTCOM-REMOTE
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=input src-address-list=ESTCOM-REMOTE
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set h323 disabled=yes
set sip sip-timeout=3m
set pptp disabled=yes
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ip smb shares
set [ find default=yes ] directory=pub
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/snmp
set enabled=yes
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=TriestinaAnalytics
/system logging
add topics=dhcp
/system note
set show-at-login=no
/system scheduler
add interval=4w2d name=AutoBackup on-event=AutoBackup policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=2021-05-03 start-time=02:00:00
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN




