Wifi not working - hap ac3 - detect LAN on wifi-qcom-ac

Hi,
I haw hap ac3 and 2x cap ac. I changed package wireless to wifi-qcom-ac.

I haw problem to wifi on my hap ac3.

My device connect to wifi on ac3 but I don’t have internet and my device reconnects.
If disable wifi on ac3 and device connect to cap ac2 internet works ok (stable).

Where could be the problem?

Logs

2025-02-25 06:57:42 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 06:58:13 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 06:58:16 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -46
2025-02-25 06:58:16 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 06:58:47 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 06:58:51 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -50
2025-02-25 06:58:51 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 06:58:51 dns,error DoH server connection error: remote disconnected while in HTTP exchange
2025-02-25 06:59:21 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 06:59:25 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -49
2025-02-25 06:59:25 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 06:59:56 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 06:59:59 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -47
2025-02-25 06:59:59 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:00:30 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -50
2025-02-25 07:00:34 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -49
2025-02-25 07:00:34 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:01:04 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 07:01:08 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -50
2025-02-25 07:01:08 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:01:39 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -50
2025-02-25 07:01:42 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -41
2025-02-25 07:01:42 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:02:13 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 07:02:17 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -48
2025-02-25 07:02:17 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:02:47 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -49
2025-02-25 07:02:51 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N connected, signal strength -45
2025-02-25 07:02:51 interface,info 2GHz-MikroTik-router-N detect LAN
2025-02-25 07:02:56 dhcp,info dhcp1 deassigned 10.12.15.249 for 08:26:AE:33:66:B9 3rrr-laptop14
2025-02-25 07:02:56 dhcp,info dhcp1 assigned 10.12.15.249 for 08:26:AE:33:66:B9 3rrr-laptop14
2025-02-25 07:03:01 system,info,account user admin logged in from 08:26:AE:33:66:B9 via winbox
2025-02-25 07:03:22 wireless,info B0:4A:39:17:D6:A1@2GHz-MikroTik-router-N disconnected, connection lost, signal strength -47
2025-02-25 07:03:24 system,info device changed by mac-msg(winbox):admin@08:26:AE:33:66:B9 (/interface set “2GHz-MikroTik-router-N” disabled=yes l2mtu=1560 name=2GHz-MikroTik-router-N; /queue interface set “2GHz-MikroTik-router-N”; /interfa
ce wifi set [ find ] arp-timeout=auto configuration=NET_675_2GHz-N configuration.mode=ap disabled=yes l2mtu=1560 mac-address=2C:C8:1B:62:94:75 name=2GHz-MikroTik-router-N)
2025-02-25 07:03:25 system,info device changed by mac-msg(winbox):admin@08:26:AE:33:66:B9 (/interface set “5GHz-MikroTik-router-AC” disabled=yes l2mtu=1560 name=5GHz-MikroTik-router-AC; /queue interface set “5GHz-MikroTik-router-AC”; /inte
rface wifi set [ find ] arp-timeout=auto configuration=NET_675_5GHz-AC configuration.mode=ap disabled=yes l2mtu=1560 mac-address=2C:C8:1B:62:94:76 name=5GHz-MikroTik-router-AC)
2025-02-25 07:03:25 wireless,info B0:4A:39:17:D6:A1@2GHz-cap-ac-1-N connected, signal strength -81
2025-02-25 07:03:27 dhcp,info dhcp1 assigned 10.12.15.7 for B0:4A:39:17:D6:A1
2025-02-25 07:03:29 wireless,info 38:8B:59:20:3A:16@5GHz-cap-ac-1-AC connected, signal strength -78
2025-02-25 07:03:31 dhcp,info dhcp1 assigned 10.12.15.244 for 38:8B:59:20:3A:16 Chromecast
2025-02-25 07:12:09 system,info,account user admin logged in from 08:26:AE:33:66:B9 via winbox
2025-02-25 07:16:40 system,info,account user admin logged out from 08:26:AE:33:66:B9 via winbox

Config

[admin@MikroTik-router] /interface/wifi> print
Flags: M - MASTER; B - BOUND; X - DISABLED, I - INACTIVE
Columns: NAME, CONFIGURATION.MODE, CONFIGURATION.SSID, CHANNEL.WIDTH

NAME CONFIGURATION.MODE CONFIGURATION.SSID CHANNEL.WIDTH

0 MBX 2GHz-MikroTik-router-N ap NET_675 20mhz
;;; operated by CAP C4:AD:34:F6:D1:0A%bridge1, traffic processing on CAP
1 MB 2GHz-cap-ac-1-N ap NET_675 20mhz
;;; operated by CAP 2C:C8:1B:A0:33:64%bridge1, traffic processing on CAP
2 MB 2GHz-cap-ac-2-N ap NET_675 20mhz
3 MBX 5GHz-MikroTik-router-AC ap NET_675 20/40/80mhz
;;; operated by CAP C4:AD:34:F6:D1:0A%bridge1, traffic processing on CAP
4 MB 5GHz-cap-ac-1-AC ap NET_675 20/40/80mhz
;;; operated by CAP 2C:C8:1B:A0:33:64%bridge1, traffic processing on CAP
5 MB 5GHz-cap-ac-2-AC ap NET_675 20/40/80mhz
[admin@MikroTik-router] /interface/wifi> configuration/
[admin@MikroTik-router] /interface/wifi/configuration> print
Flags: X - disabled
0 name=“NET_675_2GHz-N” mode=ap ssid=“NET_675” country=Poland security=dom
security.authentication-types=wpa2-psk .passphrase=“***” .disable-pmkid=yes .management-protection=disabled .ft=no .ft-over-ds=no
channel=2G-N
channel.band=2ghz-n .width=20mhz

1 name=“NET_675_2GHz-G” mode=ap ssid=“NET_675” country=Poland security=dom
security.authentication-types=wpa2-psk .passphrase=“***” .disable-pmkid=yes .management-protection=disabled .ft=no .ft-over-ds=no
channel=2G-G
channel.band=2ghz-g .width=20mhz

2 name=“NET_675_5GHz-AC” mode=ap ssid=“NET_675” country=Poland security=dom
security.authentication-types=wpa2-psk .passphrase=“***” .disable-pmkid=yes .management-protection=disabled .ft=no .ft-over-ds=no
channel=5G-AC
channel.band=5ghz-ac .width=20/40/80mhz .skip-dfs-channels=all

Most likely config issue.

Proper way to show config is by going to terminal and then
/export file=anynameyouwish

Move file to PC, open and remove everything private (serial number, public WAN IP, passwds, …)
Then move that code back here between [__code] [/__code] quotes.

Thanks for response @holvoetn

Config

# model = RBD53iG-5HacD2HnD
/interface bridge
add arp=proxy-arp igmp-snooping=yes name=bridge1 port-cost-mode=short
/interface ethernet
set [ find default-name=ether1 ] arp=proxy-arp comment=NET
set [ find default-name=ether2 ] arp=proxy-arp comment="SWITCH 1 - POE"
set [ find default-name=ether3 ] arp=proxy-arp comment="SWITCH 2 - "
set [ find default-name=ether4 ] arp=proxy-arp comment=GARAZ
set [ find default-name=ether5 ] arp=proxy-arp comment="CAP DOM"
/interface wireguard
add listen-port=13231 mtu=1420 name=wireguard2
/interface list
add comment=Internet name=WAN
add comment="Siec wewnetrzna" name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/interface wifi channel
add band=2ghz-n disabled=no name=2G-N width=20mhz
add band=2ghz-g disabled=no name=2G-G width=20mhz
add band=5ghz-ac disabled=no name=5G-AC skip-dfs-channels=all width=\
    20/40/80mhz
/interface wifi datapath
add bridge=bridge1 disabled=yes name=datapath1
/interface wifi security
add authentication-types=wpa2-psk disable-pmkid=yes disabled=no ft=no \
    ft-over-ds=no management-protection=disabled name=dom
/interface wifi configuration
add channel=2G-N country=Poland disabled=no mode=ap name=NET_675_2GHz-N \
    security=dom ssid=NET_675
add channel=2G-G country=Poland disabled=no mode=ap name=NET_675_2GHz-G \
    security=dom ssid=NET_675
add channel=5G-AC country=Poland disabled=no mode=ap name=NET_675_5GHz-AC \
    security=dom ssid=NET_675
/interface wifi
set [ find default-name=wifi1 ] configuration=NET_675_2GHz-N \
    configuration.mode=ap name=2GHz-MikroTik-router-N
add configuration=NET_675_2GHz-N configuration.mode=ap disabled=no name=\
    2GHz-cap-ac-1-N radio-mac=C4:AD:34:F6:D1:0C
add configuration=NET_675_2GHz-N configuration.mode=ap disabled=no name=\
    2GHz-cap-ac-2-N radio-mac=2C:C8:1B:A0:33:66
set [ find default-name=wifi2 ] configuration=NET_675_5GHz-AC \
    configuration.mode=ap name=5GHz-MikroTik-router-AC
add configuration=NET_675_5GHz-AC configuration.mode=ap disabled=no name=\
    5GHz-cap-ac-1-AC radio-mac=C4:AD:34:F6:D1:0D
add configuration=NET_675_5GHz-AC configuration.mode=ap disabled=no name=\
    5GHz-cap-ac-2-AC radio-mac=2C:C8:1B:A0:33:67
/interface wifi steering
add disabled=no name=steering1 neighbor-group=dynamic-NET_675-f79c79dd rrm=\
    yes wnm=yes
/ip pool
add name=dhcp_pool0 ranges=10.12.15.201-10.12.15.249
add name=dhcp_pool1 ranges=10.12.15.2-10.12.15.254
/ip dhcp-server
add address-pool=dhcp_pool1 interface=bridge1 name=dhcp1
/ip smb users
set [ find default=yes ] disabled=yes
add name=tv
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/interface bridge port
add bridge=bridge1 ingress-filtering=no interface=ether2 internal-path-cost=\
    10 path-cost=10
add bridge=bridge1 ingress-filtering=no interface=ether3 internal-path-cost=\
    10 path-cost=10
add bridge=bridge1 ingress-filtering=no interface=ether4 internal-path-cost=\
    10 path-cost=10
add bridge=bridge1 ingress-filtering=no interface=ether5 internal-path-cost=\
    10 path-cost=10
/ip firewall connection tracking
set enabled=yes udp-timeout=10s
/ipv6 settings
set disable-ipv6=yes max-neighbor-entries=8192
/interface detect-internet
set detect-interface-list=all internet-interface-list=all lan-interface-list=\
    all
/interface l2tp-server server
set authentication=mschap2 default-profile=vpn_l2tp use-ipsec=yes
/interface list member
add interface=ether1 list=WAN
add interface=bridge1 list=LAN
/interface ovpn-server server
add auth=sha1 certificate=WiFi-CAPsMAN-2CC81B629470 cipher=aes256-cbc \
    default-profile=*1 mac-address= name=ovpn-server1 \
    require-client-certificate=yes
/interface wifi cap
set caps-man-addresses=127.0.0.1
/interface wifi capsman
set ca-certificate=auto enabled=yes interfaces=bridge1 package-path="" \
    require-peer-certificate=no upgrade-policy=none
/interface wifi provisioning
add action=create-enabled common-name-regexp="" disabled=no \
    master-configuration=NET_675_2GHz-N name-format=2GHz-%I-N \
    supported-bands=2ghz-n
add action=create-enabled disabled=no master-configuration=NET_675_2GHz-G \
    name-format=2GHz-%I-G supported-bands=2ghz-g
add action=create-enabled disabled=no master-configuration=NET_675_5GHz-AC \
    name-format=5GHz-%I-AC supported-bands=5ghz-ac
/interface wireguard peers
add allowed-address=10.12.16.5/32 comment="Telefon 3R Poco x3" disabled=yes \
    interface=wireguard2 name=peer6 public-key=\
    ""
add allowed-address=10.12.16.6/32 comment="Laptop 3R Dom" disabled=yes \
    interface=wireguard2 name=peer7 public-key=\
    ""
add allowed-address=10.12.16.7/32 comment="Laptop 3R Yoga 14" interface=\
    wireguard2 name=peer8 public-key=\
    ""
add allowed-address=10.12.16.8/32 comment="Telefon 3R Poco x6" disabled=yes \
    interface=wireguard2 name=peer10 public-key=\
    ""
add allowed-address=10.12.16.9/32 comment="Telefon 3R Poco x7" interface=\
    wireguard2 name=peer11 public-key=\
    ""
add allowed-address=10.12.16.10/32 comment="Laptop 3R Praca" interface=\
    wireguard2 name=peer15 public-key=\
    ""
/ip address
add address=10.12.15.1/24 comment="Siec domowa" interface=bridge1 network=\
    10.12.15.0
add address=10.12.16.1/24 comment="VPN WireGuard" interface=wireguard2 \
    network=10.12.16.0
/ip arp
add address=10.12.15.201 interface=bridge1 mac-address=2A:CD:79:0D:66:C8
/ip cloud
set ddns-enabled=yes ddns-update-interval=10m
/ip dhcp-client
add interface=ether1 use-peer-dns=no use-peer-ntp=no
/ip dhcp-server lease
add address=10.12.15.19 client-id= comment=BROTHER \
    mac-address= server=dhcp1
add address=10.12.15.2 client-id= comment="HAP Dom" \
    mac-address= server=dhcp1
add address=10.12.15.3 client-id= comment="HAP Garaz" \
    mac-address= server=dhcp1
add address=10.12.15.61 client-id= comment="Dahua Monitor" \
    mac-address= server=dhcp1
add address=10.12.15.25 comment="Mini PC" mac-address= \
    server=dhcp1
add address=10.12.15.62 comment="Dahua Stacja furtka" disabled=yes \
    mac-address= server=dhcp1
/ip dhcp-server network
add address=10.12.15.0/24 dns-server=10.12.15.1 gateway=10.12.15.1
/ip dns
set allow-remote-requests=yes cache-max-ttl=1d doh-timeout=3s use-doh-server=\
    https://1.1.1.1/dns-query
/ip dns static
add address=149.112.112.112 address-list=dns.quad9.net name=dns.quad9.net \
    type=A
/ip firewall address-list
add address=10.12.15.11-10.12.15.45 list=test
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="defconf: wyjscie na swiat" \
    in-interface-list=LAN
add action=accept chain=input comment="VPN wireguard2- allow connect" \
    dst-port=13231 protocol=udp
add action=drop chain=input comment="drop all else"
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=accept chain=forward comment="allow internet traffic" \
    in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward comment=\
    "VPN wireguard2 -  NAT allow remote wg inbound" dst-address=10.12.15.0/24 \
    in-interface=wireguard2
add action=accept chain=forward comment="VPN wireguard2 -  WAN allow remote us\
    ers access to local WANIP (internet)" in-interface=wireguard2 \
    out-interface-list=WAN
add action=accept chain=forward comment="allow port forwarding" \
    connection-nat-state=dstnat
add action=drop chain=forward comment="drop all else"
/ip firewall nat
add action=masquerade chain=srcnat comment=\
    "NIE RUSZAC - NET defconf: masquerade" out-interface-list=WAN
add action=dst-nat chain=dstnat comment=DNS-pi-hole disabled=yes dst-address=\
    !10.12.15.25 dst-port=53 protocol=udp src-address=!10.12.15.25 \
    to-addresses=10.12.15.25
add action=dst-nat chain=dstnat comment=DNS-pi-hole disabled=yes dst-address=\
    !10.12.15.25 dst-port=53 protocol=tcp src-address=!10.12.15.25 \
    to-addresses=10.12.15.25
add action=masquerade chain=srcnat comment=DNS-pi-hole disabled=yes \
    dst-address=10.12.15.25 dst-port=53 protocol=udp src-address=\
    10.12.15.0/24
add action=masquerade chain=srcnat comment=DNS-pi-hole disabled=yes \
    dst-address=10.12.15.25 dst-port=53 protocol=tcp src-address=\
    10.12.15.0/24
add action=dst-nat chain=dstnat comment=DNS-google disabled=yes dst-address=\
    !8.8.8.8 dst-port=53 protocol=udp src-address=!8.8.8.8 to-addresses=\
    8.8.8.8
add action=dst-nat chain=dstnat comment=DNS-google disabled=yes dst-address=\
    !8.8.8.8 dst-port=53 protocol=tcp src-address=!8.8.8.8 to-addresses=\
    8.8.8.8
add action=masquerade chain=srcnat comment=DNS-google disabled=yes \
    dst-address=8.8.8.8 dst-port=53 protocol=udp src-address=10.12.15.0/24
add action=masquerade chain=srcnat comment=DNS-google disabled=yes \
    dst-address=8.8.8.8 dst-port=53 protocol=tcp src-address=10.12.15.0/24
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ip smb shares
set [ find default=yes ] directory=/pub
add directory=disk2/share disabled=yes name=share
/ppp profile
add change-tcp-mss=yes dns-server=172.30.5.1,8.8.8.8 local-address=172.30.5.1 \
    name=vpn_l2tp remote-address=*3 use-encryption=yes
/ppp secret
add name=rszwedo profile=vpn_l2tp service=l2tp
/system clock
set time-zone-name=Europe/Warsaw
/system identity
set name=MikroTik-router
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=153.19.250.123
/system scheduler
add disabled=yes interval=30s name=DNS-fallback on-event=DNS-fallback policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    start-date=2023-02-21 start-time=18:38:25
add disabled=yes interval=15s name=DNS-fallback-2 on-event=DNS-fallback-2 \
    policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    start-date=2023-02-21 start-time=18:38:25
/system script
add dont-require-permissions=no name=DNS-fallback owner=admin policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":\
    local serverIP \"10.12.15.25\"\r\
    \n:local testDomain \"www.google.com\"\r\
    \n:do {\r\
    \n     :resolve \$testDomain server \$serverIP\r\
    \n      /ip firewall nat;\r\
    \n          enable [find comment=\"DNS-pi-hole\"];\r\
    \n          disable [find comment=\"DNS-google\"];\r\
    \n    } on-error={\r\
    \n                /ip firewall nat;\r\
    \n                    enable [find comment=\"DNS-google\"];\r\
    \n                    disable [find comment=\"DNS-pi-hole\"];\r\
    \n               }\r\
    \n    }"
add dont-require-permissions=no name=DNS-fallback-2 owner=admin policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":\
    local serverIP \"10.12.15.25\"\
    \n:local testDomain \"www.google.com\"\
    \n:do {\
    \n     :resolve \$testDomain server \$serverIP\
    \n      /ip firewall nat;\
    \n     :if ([:len [find disabled comment=\"DNS-pi-hole\"]]>0) do={\
    \n               enable [find comment=\"DNS-pi-hole\"];\
    \n               disable [find comment=\"DNS-google\"];\
    \n         } \
    \n    } on-error={\
    \n      /ip firewall nat;\
    \n     :if ([:len [find disabled comment=\"DNS-google\"]]>0) do={\
    \n               enable [find comment=\"DNS-google\"];\
    \n               disable [find comment=\"DNS-pi-hole\"];\
    \n         } \
    \n               }\
    \n    }"
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server ping
set enabled=no

At first glance it looks to me you did not add those wifi interfaces to bridge.

Also, your definition of the wifi interfaces themselves looks odd. You need to create a master interface for 2GHz and 5GHz. All the rest should be a slave to one of those 2 (you attach them specifying which radio will be master). Only configuration with SSID, security, FT, … , nothing physical related since that has to be taken over from master.

According “detect-internet”: rule #5 of http://forum.mikrotik.com/t/the-twelve-rules-of-mikrotik-club/182164/1

@holvoetn thanks for your suggestions.
This works but I have to do it when the name is given by provisioning…
I change wifi provisioning Name Format then sow ‘Unknown’ and I deleted it …

[admin@MikroTik-router] /interface/bridge/port> print 
Flags: I - INACTIVE
Columns: INTERFACE, BRIDGE, HW, PVID, PRIORITY, PATH-COST, INTERNAL-PATH-COST, HORIZON
#   INTERFACE  BRIDGE   HW   PVID  PRIORITY  PATH-COST  INTERNAL-PATH-COST  HORIZON
0   ether2     bridge1  yes     1  0x80             10                  10  none   
1   ether3     bridge1  yes     1  0x80             10                  10  none   
2   ether4     bridge1  yes     1  0x80             10                  10  none   
3   ether5     bridge1  yes     1  0x80             10                  10  none   
4 I *57        bridge1          1  0x80                                     none   
5 I *58        bridge1          1  0x80                                     none

I will change my config and delete Band :slight_smile:

@bartoszP thanks for your reply
I set “Detect Internet” to none.