This is my first post. After reading so much and make thousand trials with chatgpt, deepseek, grok and some others ai , not success at all. The only basic requierment I have is to balance both wans (ether7 is twice speed than ether8), failover and that server wireguard 192.168.0.200 has to go thru ether7 as peers resturns to that wan. Sorry for my english. This is my conf actual. Any aidea, help. Thanks in advance ! [admin@CASA-MikroTik] > /export
2025-10-29 17:56:01 by RouterOS 7.20.2
software id = 7YBB-5VKJ
model = RB5009UG+S+
serial number = Hxxxxxxxxxxx5X
/interface bridge
add name=bridge-LAN protocol-mode=none
/interface ethernet
set [ find default-name=sfp-sfpplus1 ] disabled=yes
/interface eoip
add mac-address=xxxxxxxxxx name=eoip-garaje remote-address=192.168.10.250 tunnel-id=100
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=pool-LAN ranges=192.168.0.100-192.168.0.200
/ip dhcp-server
add address-pool=pool-LAN interface=bridge-LAN name=dhcp-LAN
/interface bridge port
add bridge=bridge-LAN interface=ether1
add bridge=bridge-LAN interface=ether2
add bridge=bridge-LAN interface=ether3
add bridge=bridge-LAN interface=ether4
add bridge=bridge-LAN interface=ether5
add bridge=bridge-LAN interface=ether6
add bridge=bridge-LAN interface=*C
add bridge=bridge-LAN interface=eoip-garaje
/ip address
add address=192.168.0.1/24 interface=bridge-LAN network=192.168.0.0
add address=192.168.10.2/24 comment="WAN Orange" interface=ether7 network=192.168.10.0
add address=192.168.20.2/24 comment="WAN O2" interface=ether8 network=192.168.20.0
add address=10.80.0.1/30 interface=eoip-garaje network=10.80.0.0
/ip dhcp-server lease
add address=192.168.0.106 client-id=1xxxxxxxxxxxxxe comment="aaaaaaaaaaaaaaaa" mac-address=xxxxxxxxxxxxxxxx server=dhcp-LAN
add address=192.168.0.101 comment="aaaaaaaaaaaaaa" mac-address=xxxxxxxxxxxxxxxxxxxx server=dhcp-LAN
add address=192.168.0.65 client-id=xxxxxxxxxxxxxxxxx mac-address=xxxxxxxxxxxxxxxxxx server=dhcp-LAN
add address=192.168.0.66 client-id=xxxxxxxxxxxxxxxxxx comment=aaaaaaaaaaaaaa mac-address=xxxxxxxxxxxxxxxxxx server=dhcp-LAN
add address=192.168.0.108 client-id=xxxxxxxxxxxxxxxxxxx comment="aaaaaaaaaaaaaa" mac-address=xxxxxxxxxxxxxxxxxxxxxxxx server=dhcp-LAN
/ip dhcp-server network
add address=192.168.0.0/24 gateway=192.168.0.1
/ip dns
set allow-remote-requests=yes servers=192.168.0.1,8.8.8.8
/ip firewall filter
add action=accept chain=forward dst-address=192.168.0.200 dst-port=51822 protocol=udp
add action=accept chain=forward dst-address=192.168.0.200 dst-port=51822 protocol=udp
add action=accept chain=forward dst-address=192.168.0.0/24 src-address=10.50.0.0/24
/ip firewall mangle
add action=mark-connection chain=prerouting new-connection-mark=orange_conn src-address=192.168.0.200
/ip firewall nat
add action=masquerade chain=srcnat comment="NAT O2" out-interface=ether8
add action=masquerade chain=srcnat comment="NAT Orange" out-interface=ether7
add action=dst-nat chain=dstnat dst-port=51822 protocol=udp to-addresses=192.168.0.200
add action=masquerade chain=srcnat out-interface=ether7 src-address=192.168.0.200 to-addresses=192.168.10.1
add action=dst-nat chain=dstnat dst-port=51822 protocol=udp to-addresses=192.168.0.200
/ip route
add distance=1 dst-address=0.0.0.0/0 gateway=192.168.10.1 routing-table=main
add distance=2 dst-address=0.0.0.0/0 gateway=192.168.20.1 routing-table=main
add dst-address=192.168.10.0/24 gateway=10.80.0.2
add distance=1 dst-address=10.50.0.0/24 gateway=192.168.0.200
/system clock
set time-zone-name=Europe/Madrid
/system identity
set name=CASA-MikroTik
/system routerboard settings
set auto-upgrade=yes
[admin@CASA-MikroTik] >
deanMK
October 29, 2025, 5:41pm
2
There is tons of threads for PCC Load balancing here and on other places.
This is my current configration for PCC Dual WAN Dual Fallover, but with ether1 and ether2 as dual wan links. With some experience you can setup your too to your router.
Make note ! Current configuraiton will not merge both connection into one faster. I tryed configuration like that before, but issues some problems and revert to Fallover setup.
# 2025-10-29 18:36:00 by RouterOS 7.19.3
# software id = 0Q24-H92Q
#
# model = RB5009UPr+S+
# serial number =
/interface bridge
add admin-mac=D4:01:C3:E5:2D:E1 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] poe-out=off
/interface pppoe-client
add disabled=no interface=ether1 name=pppoe-out1 use-peer-dns=yes user=\
data
/interface wireguard
add comment=back-to-home-vpn listen-port=39825 mtu=1420 name=back-to-home-vpn
/disk
set usb1 media-interface=bridge
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/ip smb users
set [ find default=yes ] disabled=yes
add name=admin
/disk settings
set auto-media-interface=bridge auto-smb-user=admin
/ip smb
set enabled=no
/interface bridge port
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=pppoe-out1 list=WAN
add interface=ether2 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
/ip cloud
set back-to-home-vpn=enabled ddns-enabled=yes ddns-update-interval=30m
/ip cloud back-to-home-user
add allow-lan=yes comment=RB5009UPr+S+ file-access=full file-access-path=\
/usb1/disk name="dsdss" private-key=\
"ggg" public-key=\
"ggg"
/ip dhcp-client
add comment=defconf disabled=yes interface=ether1
add add-default-route=no default-route-tables=main interface=ether2
/ip dhcp-server lease
add address=192.168.88.29 client-id=1:9c:14:63:7e:91:8b mac-address=\
9C:14:63:7E:91:8B server=defconf
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
192.168.88.1
/ip dns
set allow-remote-requests=yes servers=192.168.88.14
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip route
add check-gateway=ping comment="Tran Kabel WAN" disabled=no distance=1 \
dst-address=0.0.0.0/0 gateway=8.8.8.8 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=11
add check-gateway=ping comment="Tran Kabel WAN" disabled=no distance=2 \
dst-address=0.0.0.0/0 gateway=8.8.4.4 routing-table=main scope=30 \
suppress-hw-offload=no target-scope=11
add comment="Tran Kabel WAN Recursive" disabled=no dst-address=8.8.8.8/32 \
gateway=pppoe-out1 routing-table=main scope=11 suppress-hw-offload=no \
target-scope=10
add comment="Tran Kabel WAN Recursive" disabled=no distance=1 dst-address=\
8.8.4.4/32 gateway=pppoe-out1 routing-table=main scope=11 \
suppress-hw-offload=no target-scope=10
add comment="Telekom WAN Backup" disabled=no distance=4 dst-address=0.0.0.0/0 \
gateway=192.168.1.1 routing-table=main scope=30 suppress-hw-offload=no \
target-scope=10
/ip service
set ftp disabled=yes
set ssh disabled=yes
set telnet disabled=yes
set www disabled=yes
/ip traffic-flow
set active-flow-timeout=1m
/ip traffic-flow target
add dst-address=192.168.88.30 port=666 version=5
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" \
dst-port=33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Europe
/system routerboard settings
set auto-upgrade=yes
/system scheduler
add interval=30m name=traffic on-event=\
"/import usb1/traffic-per-month/traffic.rsc" policy=read,write,sensitive \
start-date=2025-05-13 start-time=16:55:00
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
How come I'm not surprised?
We can't be on the same topic; I'm allergic to Artificial Deficiency.
And I'm also allergic to router s without firewall s...
As an open relay you are a detriment to the entire network.
There is no configuration you can make, with any type of manufacturer,
that can combine the connection speeds using two lines from different operators ,
(and even with the same one, unless specific agreements are made first)...
1 Like