Other possibly relevant details:
- I don't have any problems with devices connected directly to the 960PGS via ethernet
- I have a second 960PGS connected to the first in bridge mode
Any ideas about what might be wrong would be greatly appreciated.
[admin@MikroTik] > export compact
# apr/18/2022 09:57:09 by RouterOS 6.49
# software id = FTTW-2WN5
#
# model = RB960PGS
# serial number = D5300E07BD64
/caps-man channel
add band=2ghz-g/n control-channel-width=20mhz name=2.4
add band=5ghz-a/n/ac control-channel-width=20mhz name=5
/interface bridge
add admin-mac=2C:C8:1B:D9:52:CC auto-mac=no comment=defconf name=bridge protocol-mode=none
/caps-man security
add authentication-types=wpa2-psk encryption=aes-ccm name=security1 passphrase=***REDACTED***
/caps-man configuration
add channel=2.4 country="united states3" datapath.bridge=bridge distance=indoors hw-retries=4 name=2.4-cfg security=security1 ssid=***REDACTED***
add channel=5 country="united states3" datapath.bridge=bridge distance=indoors hw-retries=4 name=5-cfg security=security1 ssid=***REDACTED***
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/caps-man manager
set enabled=yes upgrade-policy=suggest-same-version
/caps-man provisioning
add action=create-dynamic-enabled hw-supported-modes=gn master-configuration=2.4-cfg name-format=prefix-identity
add action=create-dynamic-enabled hw-supported-modes=ac master-configuration=5-cfg name-format=prefix-identity
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server lease
add address=192.168.88.229 client-id=1:90:9c:4a:b6:43:b2 mac-address=90:9C:4A:B6:43:B2 server=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/system clock
set time-zone-name=America/Chicago
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN