I really need help on what is wrong with this configuration. I can ping websites but cannot access them. Here is the configuration below. All help will be greatly appreciated. Thank you
PS : I have 3 ISP at home.
/interface bridge
add admin-mac=6C:3B:6B:42:85:33 auto-mac=no comment=defconf name=bridge
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/routing table
add disabled=no fib name=toISP1
add disabled=no fib name=toISP2
add disabled=no fib name=toISP3
/disk settings
set auto-media-interface=bridge auto-media-sharing=yes auto-smb-sharing=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add comment=defconf interface=ether2 list=WAN
add comment=defconf interface=ether3 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
/ip dhcp-client
add add-default-route=no interface=ether1 script=dhcp1 use-peer-ntp=no
add add-default-route=no interface=ether2 script=dhcp2 use-peer-ntp=no
add add-default-route=no interface=ether3 script=dhcp3 use-peer-ntp=no
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
192.168.88.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall address-list
add address=192.168.88.0/24 list=1LAN
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=mark-connection chain=prerouting dst-port=\
7000,8913,10003,30000-30150,5001-5059,5101-5105,9001,5501-5559,5601-5700 \
new-connection-mark=ml-conn passthrough=yes protocol=tcp \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=\
7000,8913,10003,30000-30150,5001-5059,5101-5105,9001,5501-5559,5601-5700 \
new-connection-mark=ml-conn passthrough=yes protocol=udp \
src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=ml-conn \
new-packet-mark=ml-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment=\
"Route Mobile Legends to ISP1" connection-mark=ml-conn new-routing-mark=\
toISP1 passthrough=yes src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=3013,18082,65010,65050 \
new-connection-mark=cod-conn passthrough=yes protocol=tcp \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=7500-7999,20000-20002 \
new-connection-mark=cod-conn passthrough=yes protocol=udp \
src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=cod-conn \
new-packet-mark=cod-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment=\
"Route Call of Duty Mobile to ISP1" connection-mark=cod-conn \
new-routing-mark=toISP1 passthrough=yes src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=10000-10030 \
new-connection-mark=roo-conn passthrough=yes protocol=tcp \
src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=roo-conn \
new-packet-mark=roo-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route ROO to ISP1" \
connection-mark=roo-conn new-routing-mark=toISP1 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-address-list=YouTube \
new-connection-mark=youtube-conn passthrough=yes src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=youtube-conn \
new-packet-mark=youtube-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route YouTube to ISP2" \
connection-mark=youtube-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-address-list=Facebook \
new-connection-mark=fb-conn passthrough=yes src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=fb-conn \
new-packet-mark=fb-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Facebook to ISP2" \
connection-mark=fb-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-address-list=Instagram \
new-connection-mark=insta-conn passthrough=yes src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=insta-conn \
new-packet-mark=insta-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Instagram to ISP2" \
connection-mark=insta-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-address-list=Twitter \
new-connection-mark=twitter-conn passthrough=yes src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=twitter-conn \
new-packet-mark=twitter-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Twitter to ISP2" \
connection-mark=twitter-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-address-list=TikTok \
new-connection-mark=tiktok-conn passthrough=yes src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=tiktok-conn \
new-packet-mark=tikok-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route TikTok to ISP2" \
connection-mark=tiktok-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=80,443 \
new-connection-mark=surf-conn passthrough=yes protocol=tcp \
src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=surf-conn \
new-packet-mark=surf-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Browsing to ISP3" \
connection-mark=surf-conn new-routing-mark=toISP3 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=443 new-connection-mark=\
downloads-conn passthrough=yes protocol=udp src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=downloads-conn \
new-packet-mark=downloads-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Downloads to ISP2" \
connection-mark=downloads-conn new-routing-mark=toISP2 passthrough=yes \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=!80,443 \
new-connection-mark=other-conn passthrough=yes protocol=tcp \
src-address-list=1LAN
add action=mark-connection chain=prerouting dst-port=!443 \
new-connection-mark=other-conn passthrough=yes protocol=udp \
src-address-list=1LAN
add action=mark-packet chain=prerouting connection-mark=other-conn \
new-packet-mark=nonmarked-pkt passthrough=yes src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route Others to ISP1" \
connection-mark=other-conn new-routing-mark=toISP1 passthrough=yes \
src-address-list=1LAN
add action=mark-routing chain=prerouting comment="Route No-Mark to ISP1" \
connection-mark=no-mark new-routing-mark=toISP1 passthrough=yes \
src-address-list=1LAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip firewall raw
add action=add-dst-to-address-list address-list=YouTube address-list-timeout=\
1m chain=prerouting comment=YouTube content=.youtube.com \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=YouTube address-list-timeout=\
1m chain=prerouting content=.googlevideo.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=YouTube address-list-timeout=\
1m chain=prerouting content=youtu.be dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=YouTube address-list-timeout=\
1m chain=prerouting content=.ytimg.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=YouTube address-list-timeout=\
1m chain=prerouting content=youtube dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting comment=Facebook content=\
.facebook.com dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting content=facebook \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting content=.fbcdn.net \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting content=.fbsbx.com \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting content=fb.com dst-address-list=\
!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Facebook \
address-list-timeout=1m chain=prerouting content=messenger.com \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Instagram \
address-list-timeout=1m chain=prerouting comment=Instagram content=\
.instagram.com dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Instagram \
address-list-timeout=1m chain=prerouting content=.cdninstagram.com \
dst-address-list=!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Twitter address-list-timeout=\
1m chain=prerouting comment=Twitter content=twitter.com dst-address-list=\
!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=Twitter address-list-timeout=\
1m chain=prerouting content=.twitter.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=Twitter address-list-timeout=\
1m chain=prerouting content=.twimg.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting comment=TikTok content=.tiktok.com dst-address-list=\
!1LAN src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.tiktokv.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.tiktokcdn.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.byteoversea.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.ibyteimg.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.ibytedtos.com dst-address-list=!1LAN \
src-address-list=1LAN
add action=add-dst-to-address-list address-list=TikTok address-list-timeout=\
1m chain=prerouting content=.myqcloud.com dst-address-list=!1LAN \
src-address-list=1LAN
/ip route
add check-gateway=ping comment=toISP2 distance=1 gateway=192.168.2.1 \
routing-table=toISP2
add check-gateway=ping comment=toISP2 distance=2 gateway=192.168.2.1
add check-gateway=ping comment=toISP3 distance=1 gateway=192.168.3.1 \
routing-table=toISP3
add check-gateway=ping comment=toISP3 distance=3 gateway=192.168.3.1
add check-gateway=ping comment=toISP1 distance=1 gateway=192.168.1.1 \
routing-table=toISP1
add check-gateway=ping comment=toISP1 distance=1 gateway=192.168.1.1
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=time.android.com
/system script
add dont-require-permissions=no name=dhcp2 owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="{\
\r\
\n:local rmark \"toISP2\"\r\
\n:local count [/ip route print count-only where comment=\"toISP2\"] \r\
\n:if (\$bound=1) do={\r\
\n:if (\$count = 0) do={\r\
\n/ip route add distance=1 gateway=\$\"gateway-address\" check-gateway=pin\
g routing-table=toISP2 comment=\"toISP2\"\r\
\n/ip route add distance=2 gateway=\$\"gateway-address\" check-gateway=pin\
g comment=\"toISP2\"\r\
\n} else={\r\
\n:if (\$count = 1) do={\r\
\n:local test [/ip route find where comment=\"toISP2\"]\r\
\n:if ([/ip route get \$test gateway] != \$\"gateway-address\") do={\r\
\n/ip route set \$test gateway=\$\"gateway-address\"}\r\
\n} else={\r\
\n:error \"Multiple routes found\"\r\
\n}\r\
\n}\r\
\n} else={\r\
\n/ip route remove [find comment=\"toISP2\"]\r\
\n}\r\
\n}"
add dont-require-permissions=no name=dhcp1 owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="{\
\r\
\n:local rmark \"toISP1\"\r\
\n:local count [/ip route print count-only where comment=\"toISP1\"] \r\
\n:if (\$bound=1) do={\r\
\n:if (\$count = 0) do={\r\
\n/ip route add distance=1 gateway=\$\"gateway-address\" check-gateway=pin\
g routing-table=toISP1 comment=\"toISP1\"\r\
\n/ip route add distance=1 gateway=\$\"gateway-address\" check-gateway=pin\
g comment=\"toISP1\"\r\
\n} else={\r\
\n:if (\$count = 1) do={\r\
\n:local test [/ip route find where comment=\"toISP1\"]\r\
\n:if ([/ip route get \$test gateway] != \$\"gateway-address\") do={\r\
\n/ip route set \$test gateway=\$\"gateway-address\"}\r\
\n} else={\r\
\n:error \"Multiple routes found\"\r\
\n}\r\
\n}\r\
\n} else={\r\
\n/ip route remove [find comment=\"toISP1\"]\r\
\n}\r\
\n}"
add dont-require-permissions=no name=dhcp3 owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="{\
\r\
\n:local rmark \"toISP3\"\r\
\n:local count [/ip route print count-only where comment=\"toISP3\"] \r\
\n:if (\$bound=1) do={\r\
\n:if (\$count = 0) do={\r\
\n/ip route add distance=1 gateway=\$\"gateway-address\" check-gateway=pin\
g routing-table=toISP3 comment=\"toISP3\"\r\
\n/ip route add distance=3 gateway=\$\"gateway-address\" check-gateway=pin\
g comment=\"toISP3\"\r\
\n} else={\r\
\n:if (\$count = 1) do={\r\
\n:local test [/ip route find where comment=\"toISP3\"]\r\
\n:if ([/ip route get \$test gateway] != \$\"gateway-address\") do={\r\
\n/ip route set \$test gateway=\$\"gateway-address\"}\r\
\n} else={\r\
\n:error \"Multiple routes found\"\r\
\n}\r\
\n}\r\
\n} else={\r\
\n/ip route remove [find comment=\"toISP3\"]\r\
\n}\r\
\n}"
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool netwatch
add disabled=no dns-server=8.8.8.8 down-script="/ip firewall mangle set [find \
comment=\"Route YouTube to ISP2\"] new-routing-mark=toISP1\r\
\n/ip firewall mangle set [find comment=\"Route Facebook to ISP2\"] new-ro\
uting-mark=toISP1\r\
\n/ip firewall mangle set [find comment=\"Route Instagram to ISP2\"] new-r\
outing-mark=toISP1\r\
\n/ip firewall mangle set [find comment=\"Route Twitter to ISP2\"] new-rou\
ting-mark=toISP1\r\
\n/ip firewall mangle set [find comment=\"Route TikTok to ISP2\"] new-rout\
ing-mark=toISP1\r\
\n/ip firewall mangle set [find comment=\"Route Downloads to ISP2\"] new-r\
outing-mark=toISP1" host=google.com http-codes="" interval=30s name=\
"Check ISP2" record-type=A src-address=192.168.2.2 test-script="" \
timeout=500ms type=dns up-script="/ip firewall mangle set [find comment=\"\
Route YouTube to ISP2\"] new-routing-mark=toISP2\r\
\n/ip firewall mangle set [find comment=\"Route Facebook to ISP2\"] new-ro\
uting-mark=toISP2\r\
\n/ip firewall mangle set [find comment=\"Route Instagram to ISP2\"] new-r\
outing-mark=toISP2\r\
\n/ip firewall mangle set [find comment=\"Route Twitter to ISP2\"] new-rou\
ting-mark=toISP2\r\
\n/ip firewall mangle set [find comment=\"Route TikTok to ISP2\"] new-rout\
ing-mark=toISP2\r\
\n/ip firewall mangle set [find comment=\"Route Downloads to ISP2\"] new-r\
outing-mark=toISP2"
add disabled=no dns-server=8.8.8.8 down-script="" host=google.com http-codes=\
"" interval=30s name="Check ISP3" record-type=A src-address=192.168.3.2 \
test-script="" timeout=500ms type=dns up-script=""