I has been build ECMP load balance on mikrotik os version 7.14.2 (Behind nat). I have 2 Wan to access my web server internally. some of user manage to use Wan1, but not Wan2. some of user manage to access through Wan2, but not Wan1. do you all have any idea to make it both Wan public IP address manage to access my web server for any user?
Below is my config parameter.
[admin@MikroTik] /ip/route> /ip address print
Flags: X - DISABLED
Columns: ADDRESS, NETWORK, INTERFACE
ADDRESS NETWORK INTERFACE
;;; defconf
0 X 192.168.88.1/24 192.168.88.0 bridge
;;; LAN
1 192.168.0.2/23 192.168.0.0 bridge
;;; ISP2
2 172.28.2.2/24 172.28.2.0 ether2
;;; ISP1
3 172.28.1.2/24 172.28.1.0 ether1
;;; Ether5
4 X 192.168.0.1/32 192.168.0.0 ether5
[admin@MikroTik] /ip/route> print
Flags: D - DYNAMIC; I - INACTIVE, A - ACTIVE; c - CONNECT, s - STATIC; H - HW-OFFLOADED; + - ECMP
Columns: DST-ADDRESS, GATEWAY, DISTANCE
DST-ADDRESS GATEWAY DISTANCE
0 As + 0.0.0.0/0 172.28.1.1 1
1 As + 0.0.0.0/0 172.28.2.1 1
DAc 172.28.1.0/24 ether1 0
DAc 172.28.2.0/24 ether2 0
DAc 192.168.0.0/23 bridge 0
2 As 0.0.0.0/0 172.28.1.1 1
3 As 0.0.0.0/0 172.28.2.1 1
[admin@MikroTik] /ip/route> /ip firewall nat print
Flags: X - disabled, I - invalid; D - dynamic
0 X chain=srcnat action=masquerade src-address=192.168.0.200 out-interface=ether1 log=no log-prefix=""
1 X chain=srcnat action=masquerade src-address=192.168.0.200 out-interface=ether2 log=no log-prefix=""
2 X chain=srcnat action=masquerade out-interface=Unifi log=no log-prefix=""
3 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface=ether1 log=no log-prefix="" ipsec-policy=out,none
4 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface=ether2 log=no log-prefix="" ipsec-policy=out,none
5 chain=dstnat action=dst-nat to-addresses=192.168.0.205 to-ports=8000 protocol=tcp dst-address=172.28.1.2 in-interface=ether1 dst-port=8001 log=no
log-prefix=""
6 chain=dstnat action=dst-nat to-addresses=192.168.0.205 to-ports=8000 protocol=tcp dst-address=172.28.2.2 in-interface=ether2 dst-port=8000 log=no
log-prefix=""
[admin@MikroTik] /ip/route> /ip firewall mangle print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=prerouting action=passthrough
1 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
2 D ;;; special dummy rule to show fasttrack counters
chain=postrouting action=passthrough
3 chain=input action=mark-connection new-connection-mark=ISP1-Con passthrough=yes in-interface=ether1 log=no log-prefix=""
4 chain=input action=mark-connection new-connection-mark=ISP2-Con passthrough=yes in-interface=ether2 log=no log-prefix=""
5 chain=output action=mark-routing new-routing-mark=ISP1 passthrough=no connection-mark=ISP1-Con log=no log-prefix=""
6 chain=output action=mark-routing new-routing-mark=ISP2 passthrough=no connection-mark=ISP2-Con log=no log-prefix=""
7 chain=prerouting action=mark-routing new-routing-mark=ISP1 passthrough=no connection-mark=ISP1-Con in-interface=bridge log=no log-prefix=""
8 chain=prerouting action=mark-routing new-routing-mark=ISP2 passthrough=no connection-mark=ISP2-Con in-interface=bridge log=no log-prefix=""
[admin@MikroTik] /ip/route> /ip firewall filter print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 X ;;; Allow incoming traffic on the desired port
chain=input action=accept protocol=tcp dst-port=22 log=no log-prefix=""
2 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked
3 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp log=no log-prefix=""
4 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid log=no log-prefix=""
5 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
6 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
7 ;;; defconf: accept in ipsec policy
chain=forward action=accept ipsec-policy=in,ipsec
8 ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
9 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
chain=forward action=accept connection-state=established,related,untracked
11 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid log=no log-prefix=""
12 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN