S2 authenticated or unauthenticated for Range Extender

This thread and this post on particular seem relevant to your question:

But to summarize, secure devices can route thorough non-secure nodes and vice versa, so that shouldn't be your problem. Perhaps you have not given it enough time, or maybe your devices judge that other repeaters are better for some reason.