I gave it a try using a mikrotik AP. There it works without any problems at all. If I use the TP-Link AP I end up with problems again.
The Groove connects to the original wifi without any problems. The clients connecting to the groove have severe connection problems. After connecting they try to get an IP which fails. Then after some time they get disconnected. See the log below for details.
Is there a known issue concerning TP-Link AP's? I'm trying to get access to a different vendor's AP for testing.
Flags: X - disabled, R - running
0 R name="wlan1" mtu=1500 l2mtu=1600 mac-address=YY:YY:YY:YY:YY:YY arp=enabled interface-type=Atheros AR9300
mode=station-pseudobridge ssid="theopenwifi" frequency=auto band=2ghz-b/g/n channel-width=20mhz
secondary-channel="" scan-list=default wireless-protocol=any vlan-mode=no-tag vlan-id=1 wds-mode=disabled
wds-default-bridge=none wds-ignore-ssid=no bridge-mode=enabled default-authentication=yes default-forwarding=yes
default-ap-tx-limit=0 default-client-tx-limit=0 hide-ssid=no security-profile=open-wifi compression=no
1 R name="wlan2" mtu=1500 l2mtu=1600 mac-address=YY:YY:YY:YY:YY:YY arp=enabled interface-type=virtual master-interface=wlan1
mode=ap-bridge ssid="test" vlan-mode=no-tag vlan-id=1 wds-mode=disabled wds-default-bridge=none wds-ignore-ssid=no
bridge-mode=enabled default-authentication=yes default-forwarding=yes default-ap-tx-limit=0 default-client-tx-limit=0
hide-ssid=no security-profile=open-wifi
3 name="open-wifi" mode=none authentication-types=wpa-psk,wpa2-psk unicast-ciphers=aes-ccm group-ciphers=aes-ccm
wpa-pre-shared-key="" wpa2-pre-shared-key="" supplicant-identity="" eap-methods="" tls-mode=no-certificates
tls-certificate=none mschapv2-username="" mschapv2-password="" static-algo-0=none static-key-0="" static-algo-1=none
static-key-1="" static-algo-2=none static-key-2="" static-algo-3=none static-key-3="" static-transmit-key=key-0
static-sta-private-algo=none static-sta-private-key="" radius-mac-authentication=no radius-mac-accounting=no
radius-eap-accounting=no interim-update=0s radius-mac-format=XX:XX:XX:XX:XX:XX radius-mac-mode=as-username
radius-mac-caching=disabled group-key-update=5m management-protection=allowed management-protection-key=""
19:53:26 wireless,debug wlan2: XX:XX:XX:XX:XX:XX attempts to associate
19:53:26 wireless,debug wlan2: XX:XX:XX:XX:XX:XX not in local ACL, by default accept
19:53:26 wireless,info XX:XX:XX:XX:XX:XX@wlan2: connected, signal strength -46
19:53:37 wireless,info XX:XX:XX:XX:XX:XX@wlan2: disconnected, received deauth: sending station leaving (3)
19:53:39 wireless,debug wlan2: XX:XX:XX:XX:XX:XX attempts to associate
19:53:39 wireless,debug wlan2: XX:XX:XX:XX:XX:XX not in local ACL, by default accept
19:53:39 wireless,info XX:XX:XX:XX:XX:XX@wlan2: connected, signal strength -45
19:53:54 wireless,info XX:XX:XX:XX:XX:XX@wlan2: disconnected, received deauth: sending station leaving (3)
19:53:56 wireless,debug wlan2: XX:XX:XX:XX:XX:XX attempts to associate
19:53:56 wireless,debug wlan2: XX:XX:XX:XX:XX:XX not in local ACL, by default accept
19:53:56 wireless,info XX:XX:XX:XX:XX:XX@wlan2: connected, signal strength -44
19:54:16 wireless,info XX:XX:XX:XX:XX:XX@wlan2: disconnected, received deauth: sending station leaving (3)