Doing “add” then “set” is the same as doing a single “override” command, where it will add a device by copying it from the profile(s) and then modifying it with any of the overridden keys.
But remember you made the same error as before (How to limit network ingress and egress on a running container - #6 by tomp) with the override command and didn’t use “key=value” (and instead used “key value”) for the settings arguments.