Dual WAN configuration

Hi.
How to configure dual wan with RB1100AHx4? Need help.
Here is my environment:

WAN 1 - External network with address 10.10.10.0/30. 10.10.10.2/30 on my side, 10.10.10.1 is default on other side.
WAN 2 - External network statically routed with p2p link. 20.20.20.3/32 is on my side, 20.20.20.2/32 is default on other side. 20.20.20.16/28 is external routed network behind 20.20.20.3.

What is the best practice for WAN 2? Any examples?

Thank you.

https://help.mikrotik.com/docs/display/ROS/Load+Balancing (if using RouterOS V7.x)
https://wiki.mikrotik.com/wiki/Load_Balancing (if using RouterOS V6.x)

Question is too vague. Its not what we want its what your requirements are.
It would appear you are stating you have two WANIPs, both by private IP.
Are we to assume that your router is connected to two ISP routers?
If so are they from the same provider or different provider.
Is WAN1 the primary connection and WAN2 only used for backup?

Thank you for reply. I'll check this.

Thank you for reply.
Yes. Sorry.
Main question is how to properly configure WAN 2 connection. This private ip ranges are given for example. Router is connected to two different internet providers.
WAN1 and WAN2 are working at same time. At WAN2 address 20.20.20.17/28 is used for my other routers.

Here is more explanation scheme.


And config:

/interface bridge
add frame-types=admit-only-vlan-tagged name=bridge-vlans-trunk port-cost-mode=short vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] comment="Trunk"
set [ find default-name=ether2 ] disabled=yes
set [ find default-name=ether3 ] disabled=yes
set [ find default-name=ether4 ] disabled=yes
set [ find default-name=ether5 ] disabled=yes
set [ find default-name=ether6 ] comment="WAN1"
set [ find default-name=ether7 ] disabled=yes
set [ find default-name=ether8 ] disabled=yes
set [ find default-name=ether9 ] disabled=yes
set [ find default-name=ether10 ] disabled=yes
set [ find default-name=ether11 ] disabled=yes
set [ find default-name=ether12 ] disabled=yes
/interface vlan
add comment="Users" interface=bridge-vlans-trunk name=vlan1 vlan-id=1
add comment="WAN2 inet" interface=bridge-vlans-trunk name=vlan101 vlan-id=101
add comment="WAN2 p2p" interface=bridge-vlans-trunk name=vlan100 vlan-id=100
/interface list
add name=External
add name=Internal
/interface bridge port
add bridge=bridge-vlans-trunk frame-types=admit-only-untagged-and-priority-tagged interface=ether13 \
    internal-path-cost=10 path-cost=10 pvid=1
add bridge=bridge-vlans-trunk frame-types=admit-only-vlan-tagged interface=ether1 internal-path-cost=10 \
    path-cost=10
/interface bridge vlan
add bridge=bridge-vlans-trunk tagged=bridge-vlans-trunk,ether1 untagged=ether13 vlan-ids=1
add bridge=bridge-vlans-trunk tagged=bridge-vlans-trunk,ether1 vlan-ids=100
add bridge=bridge-vlans-trunk tagged=bridge-vlans-trunk,ether1 vlan-ids=101
/interface list member
add interface=vlan1 list=Internal
add interface=ether6 list=External
add interface=vlan100 list=External
add interface=vlan101 list=External
/ip address
add address=10.10.10.2/30 comment="WAN1" interface=ether6 network=10.10.10.0
add address=20.20.20.3 comment="WAN2 p2p" interface=vlan100 network=20.20.20.2
add address=20.20.20.17/28 comment="WAN2 inet" interface=vlan101 network=20.20.20.16
add address=192.168.0.1/24 comment="Users" interface=vlan1 network=192.168.0.0
/ip firewall mangle
add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=ether6 new-connection-mark=conn-wan1 passthrough=yes
add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=vlan100 new-connection-mark=conn-wan2 passthrough=yes
add action=mark-connection chain=prerouting connection-mark=no-mark in-interface=vlan101 new-connection-mark=conn-wan2 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=conn-wan1 in-interface-list=!External new-routing-mark=wan1 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=conn-wan2 in-interface-list=!External new-routing-mark=wan2 passthrough=yes
add action=mark-routing chain=output connection-mark=conn-wan1 new-routing-mark=wan1 passthrough=yes
add action=mark-routing chain=output connection-mark=conn-wan2 new-routing-mark=wan2 passthrough=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether6 src-address=192.168.0.0/24 to-addresses=10.10.10.2
add action=masquerade chain=srcnat out-interface=vlan101 src-address=192.168.0.0/24 to-addresses=20.20.20.17
/ip route
add distance=251 dst-address=0.0.0.0/0 gateway=10.10.10.1 routing-table=main scope=30 target-scope=10
add distance=252 dst-address=0.0.0.0/0 gateway=20.20.20.2 routing-table=main scope=30 target-scope=10
add distance=1 dst-address=0.0.0.0/0 gateway=10.10.10.1 routing-table=wan1
add distance=1 dst-address=0.0.0.0/0 gateway=20.20.20.2 routing-table=wan2

Why is the switch needed before the router?
ether1, from wan1
ether2, from wan2
ether3, to other router
etc…

Because:
WAN1 is shared with other routers. There is another networks and routers in the same uplink which are connected to catalyst.
WAN2 physical uplink located at another building.

In case what is it that you wouild like to accomplish?

All use WAN1 as primary and WAN2 is used as secondary/backup only?
WAN1 user for some vlans WAn2 used for other vlans with the ability to use opposite WAN if yours fails.