How to bypass the mangle rules and ping two local subnets?

Hello guys,

I need to make two specific ip addresses 192.168.2.5/24 & 192.168.20.150/24 that are in different local bridges on the same Mikrotik device to ping each other. I’ve configured mangle rules to allow “Bonding of 2 ISP WAN”, which are not allowing to ping these addresses with each other. Any suggestion how to bypass the mangle and make them “visible within”?

Here is the conf file.

nov/17/2017 11:05:56 by RouterOS 6.30.4

software id = SU7T-YYN0

/interface bridge
add name=“Guest Rooms fe0/2”
add name=“LAN - int 4,6,9,10”
add name=“Rest 7,8/wifi”
/interface ethernet
set [ find default-name=ether2 ] name=“Guest Rooms fe0”
set [ find default-name=ether3 ] name=“WAN Port Telekom”
set [ find default-name=ether1 ] name=“WAN Port fe0/1”
/interface wireless
set [ find default-name=wlan1 ] disabled=no l2mtu=1600 mode=ap-bridge name=
WLAN1 ssid=Unknown wireless-protocol=802.11
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk eap-methods=“” mode=
dynamic-keys wpa-pre-shared-key=mail@royalviewcommk wpa2-pre-shared-key=
mail@royalviewcommk
/ip pool
add name=dhcp ranges=192.168.2.150-192.168.2.200
add name=“DHCP Room Guests” ranges=192.168.20.2-192.168.20.200
add name=“DHCP Restaurant” ranges=192.168.10.150-192.168.10.200
/ip dhcp-server
add address-pool=dhcp disabled=no interface=“LAN - int 4,6,9,10” lease-time=
1h name=server1
add address-pool=“DHCP Room Guests” disabled=no interface=“Guest Rooms fe0/2”
lease-time=15m name=server2
add address-pool=“DHCP Restaurant” interface=“Rest 7,8/wifi” lease-time=15m
name=server3
/queue simple
add disabled=yes max-limit=1M/8M name=“restaurant bandwidth” target=
“Rest 7,8/wifi” time=0s-1d,sun,mon,tue,wed,thu,fri,sat
add disabled=yes max-limit=1M/10M name=“guest rooms speed” target=
“Guest Rooms fe0”
/interface bridge port
add bridge=“LAN - int 4,6,9,10” interface=ether6
add bridge=“Guest Rooms fe0/2” interface=ether7
add bridge=“Guest Rooms fe0/2” interface=ether8
add bridge=“LAN - int 4,6,9,10” interface=ether9
add bridge=“LAN - int 4,6,9,10” interface=WLAN1
add bridge=“LAN - int 4,6,9,10” interface=ether4
add bridge=“LAN - int 4,6,9,10” interface=ether10
add bridge=“Guest Rooms fe0/2” interface=ether5
add bridge=“Guest Rooms fe0/2” interface=“Guest Rooms fe0”
/ip address
add address=192.168.2.20/24 interface=“LAN - int 4,6,9,10” network=
192.168.2.0
add address=192.168.10.254/24 disabled=yes interface=“Rest 7,8/wifi” network=
192.168.10.0
add address=192.168.1.10/24 interface=“WAN Port fe0/1” network=192.168.1.0
add address=192.168.20.254/24 interface=“Guest Rooms fe0/2” network=
192.168.20.0
add address=192.168.178.100/24 interface=“WAN Port Telekom” network=
192.168.178.0
/ip dhcp-server lease
add address=192.168.20.128 client-id=1:44:d9:e7:ac:4f:d8 mac-address=
44:D9:E7:AC:4F:D8 server=server2
add address=192.168.20.129 client-id=1:44:d9:e7:ac:4f:32 mac-address=
44:D9:E7:AC:4F:32 server=server2
add address=192.168.20.131 client-id=1:44:d9:e7:a4:ff:47 mac-address=
44:D9:E7:A4:FF:47 server=server2
add address=192.168.20.134 client-id=1:44:d9:e7:ac:4f:2b mac-address=
44:D9:E7:AC:4F:2B server=server2
add address=192.168.20.135 client-id=1:44:d9:e7:ac:50:b7 mac-address=
44:D9:E7:AC:50:B7 server=server2
add address=192.168.20.136 client-id=1:44:d9:e7:ac:50:dc mac-address=
44:D9:E7:AC:50:DC server=server2
add address=192.168.20.109 client-id=1:44:d9:e7:ac:4f:1d mac-address=
44:D9:E7:AC:4F:1D server=server2
add address=192.168.20.98 client-id=1:44:d9:e7:ac:4f:f5 mac-address=
44:D9:E7:AC:4F:F5 server=server2
add address=192.168.20.97 client-id=1:44:d9:e7:ac:4f:5d mac-address=
44:D9:E7:AC:4F:5D server=server2
/ip dhcp-server network
add address=192.168.2.0/24 dns-server=192.168.2.20 gateway=192.168.2.20
netmask=24
add address=192.168.10.0/24 dns-server=192.168.10.254 gateway=192.168.10.254
netmask=24
add address=192.168.20.0/24 dns-server=192.168.20.254 gateway=192.168.20.254
netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4
/ip firewall filter
add chain=input comment=Winbox dst-port=8291 protocol=tcp
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.6
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.7
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.3
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.2
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.4
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.5
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.8
add chain=output disabled=yes out-interface=“LAN - int 4,6,9,10” src-address=
192.168.20.9
add action=drop chain=output disabled=yes dst-address=192.168.2.0/24
out-interface=“LAN - int 4,6,9,10” src-address=192.168.20.0/24
add chain=input disabled=yes in-interface=“LAN - int 4,6,9,10”
/ip firewall mangle
add action=mark-connection chain=input comment=“Mangle za Rooms”
in-interface=“WAN Port fe0/1” new-connection-mark=WAN1_ConnM
add action=mark-connection chain=input in-interface=“WAN Port Telekom”
new-connection-mark=WAN2_ConnM
add action=mark-routing chain=output connection-mark=WAN1_ConnM
new-routing-mark=na_WAN1
add action=mark-routing chain=output connection-mark=WAN2_ConnM
new-routing-mark=na_WAN2
add chain=prerouting dst-address=192.168.1.0/24 in-interface=
“Guest Rooms fe0/2”
add chain=prerouting dst-address=192.168.178.0/24 in-interface=
“Guest Rooms fe0/2”
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=“Guest Rooms fe0/2” new-connection-mark=WAN1_ConnM
per-connection-classifier=both-addresses-and-ports:2/0
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=“Guest Rooms fe0/2” new-connection-mark=WAN2_ConnM
per-connection-classifier=both-addresses-and-ports:2/1
add action=mark-routing chain=prerouting connection-mark=WAN1_ConnM
in-interface=“Guest Rooms fe0/2” new-routing-mark=na_WAN1
add chain=prerouting dst-address=192.168.1.0/24 in-interface=
“LAN - int 4,6,9,10”
add action=mark-connection chain=input comment=“Mangle za LAN” in-interface=
“WAN Port fe0/1” new-connection-mark=WAN3_ConnM
add action=mark-connection chain=input in-interface=“WAN Port Telekom”
new-connection-mark=WAN4_ConnM
add action=mark-routing chain=output connection-mark=WAN3_ConnM
new-routing-mark=na_WAN3
add action=mark-routing chain=output connection-mark=WAN4_ConnM
new-routing-mark=na_WAN4
add chain=prerouting dst-address=192.168.178.0/24 in-interface=
“LAN - int 4,6,9,10”
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=“LAN - int 4,6,9,10” new-connection-mark=WAN3_ConnM
per-connection-classifier=both-addresses-and-ports:2/0
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=“LAN - int 4,6,9,10” new-connection-mark=WAN4_ConnM
per-connection-classifier=both-addresses-and-ports:2/1
add action=mark-routing chain=prerouting connection-mark=WAN3_ConnM
in-interface=“LAN - int 4,6,9,10” new-routing-mark=na_WAN3
add action=mark-routing chain=prerouting connection-mark=WAN4_ConnM
in-interface=“LAN - int 4,6,9,10” new-routing-mark=na_WAN4
add action=mark-routing chain=prerouting connection-mark=WAN2_ConnM
in-interface=“Guest Rooms fe0/2” new-routing-mark=na_WAN2
/ip firewall nat
add action=masquerade chain=srcnat out-interface=“WAN Port fe0/1”
add action=masquerade chain=srcnat out-interface=“WAN Port Telekom”
add action=dst-nat chain=dstnat dst-port=8443 in-interface=“WAN Port fe0/1”
protocol=tcp to-addresses=192.168.20.150 to-ports=8443
add action=dst-nat chain=dstnat dst-port=8880 in-interface=“WAN Port fe0/1”
protocol=tcp to-addresses=192.168.20.200 to-ports=8880
add action=dst-nat chain=dstnat dst-port=8843 in-interface=“WAN Port fe0/1”
protocol=tcp to-addresses=192.168.20.150 to-ports=8843
add action=dst-nat chain=dstnat dst-port=8080 in-interface=“WAN Port fe0/1”
protocol=tcp to-addresses=192.168.20.150 to-ports=8080
add action=dst-nat chain=dstnat dst-port=8443 in-interface=“WAN Port Telekom”
protocol=tcp to-addresses=192.168.20.150 to-ports=8443
add action=dst-nat chain=dstnat dst-port=8880 in-interface=“WAN Port Telekom”
protocol=tcp to-addresses=192.168.20.150 to-ports=8880
add action=dst-nat chain=dstnat dst-port=8843 in-interface=“WAN Port Telekom”
protocol=tcp to-addresses=192.168.20.150 to-ports=8843
add action=dst-nat chain=dstnat dst-port=8080 in-interface=“WAN Port Telekom”
protocol=tcp to-addresses=192.168.20.150 to-ports=8080
/ip route
add check-gateway=ping distance=1 gateway=192.168.1.254 routing-mark=na_WAN1
add check-gateway=ping distance=2 gateway=192.168.178.1 routing-mark=na_WAN2
add check-gateway=ping distance=1 gateway=192.168.1.254 routing-mark=na_WAN3
add check-gateway=ping distance=1 gateway=192.168.178.1 routing-mark=na_WAN4
add distance=1 gateway=192.168.1.254
add check-gateway=ping distance=1 gateway=192.168.1.254
add distance=2 gateway=192.168.178.1
add check-gateway=ping distance=2 gateway=192.168.178.1
/lcd
set time-interval=daily
/lcd interface pages
set 0 interfaces=“sfp1,WAN Port fe0/1,Guest Rooms fe0,WAN Port Telekom,ether4,
ether5,ether6,ether7,ether8,ether9,ether10”
/system clock
set time-zone-name=Europe/Skopje
/system routerboard settings
set protected-routerboot=disabled
/tool romon port
add

Thank you in advance.