How to exclude pppoe users from PCC?

Good evening, I would like to put pc1 and pc2 out on two separate lines while wifi continues to use the pcc.
Sorry the bad english I used the translator

#RouterOS 6.38.5

/interface ethernet
set [ find default-name=ether1 ] comment="ether1 - PPPoE" name=Local
set [ find default-name=ether5 ] comment="ether5 - WAN 1 Isp 1" name=\
    WAN1
set [ find default-name=ether6 ] comment="ether6 - WAN 2 Isp 2" \
    name=WAN2
set [ find default-name=ether7 ] comment="ether7 - WAN 3 Isp 3" \
    name=WAN3
set [ find default-name=ether8 ] comment="ether8 - WAN 4 Isp 4" name=WAN4
set [ find default-name=ether2 ] comment="ether2 - Switch con ether1" \
    master-port=Local
set [ find default-name=ether3 ] comment="ether3 - Libera"
set [ find default-name=ether4 ] comment="ether4 - Libera"
set [ find default-name=ether9 ] comment="ether9 - Libera"
set [ find default-name=ether10 ] comment="ether10 - Libera"
set [ find default-name=sfp1 ] disabled=yes
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=DHCP_Local ranges=172.16.230.10-172.16.230.254
add name=PPPoE-Pool ranges=10.22.10.1-10.22.10.254
/ip dhcp-server
add address-pool=DHCP_MyLink disabled=no interface=Local lease-time=12h name=\
    DHCP_MyLINK
/ppp profile
add dns-server=208.67.222.222,208.67.220.220 local-address=172.16.230.1 name=\
    profile2mb rate-limit=256k/2048k
add dns-server=208.67.222.222,208.67.220.220 local-address=172.16.230.1 name=\
    profile4mb rate-limit=512k/4096k
/tool user-manager customer
set admin access=\
    own-routers,own-users,own-profiles,own-limits,config-payment-gw
/interface pppoe-server server
add disabled=no interface=Local max-mru=1480 max-mtu=1480 \
    one-session-per-host=yes service-name=MyLink_PPPoE
/ip address
add address=172.16.230.1/24 interface=Local network=172.16.230.0
add address=192.168.10.2/24 interface=WAN1 network=192.168.10.0
add address=192.168.20.2/24 interface=WAN2 network=192.168.20.0
add address=192.168.30.2/24 interface=WAN3 network=192.168.30.0
add address=192.168.40.2/24 interface=WAN4 network=192.168.40.0
/ip dhcp-server network
add address=172.16.230.0/24 dns-server=208.67.222.222,208.67.220.220
/ip dns
set cache-size=10000KiB max-udp-packet-size=512 servers=\
    208.67.222.222,208.67.220.220
/ip firewall filter
add action=drop chain=forward comment=\
    "Regola per evitare che si vedano tra loro da PPPoE" dst-address=\
    10.22.10.5-10.22.10.254 src-address=10.22.10.5-10.22.10.254
add action=drop chain=forward comment=\
    "Regola per evitare che si vedano tra loro da dhcp interno" dst-address=\
    172.16.230.1-172.16.230.254 src-address=10.22.10.5-10.22.10.254
add action=drop chain=forward comment=\
    "Regola per evitare che accedano al gateway" dst-address=192.168.10.1 \
    src-address=10.22.10.5-10.22.10.254
add action=drop chain=forward comment=\
    "Regola per evitare che accedano al gateway" dst-address=192.168.20.1 \
    src-address=10.22.10.5-10.22.10.254
add action=drop chain=forward comment=\
    "Regola per evitare che accedano al gateway" dst-address=192.168.30.1 \
    src-address=10.22.10.5-10.22.10.254
add action=drop chain=forward comment=\
    "Regola per evitare che accedano al gateway" dst-address=192.168.40.1 \
    src-address=10.22.10.5-10.22.10.254
/ip firewall mangle
add action=mark-connection chain=input in-interface=WAN1 new-connection-mark=\
    WAN1_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN2 new-connection-mark=\
    WAN2_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN3 new-connection-mark=\
    WAN3_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN4 new-connection-mark=\
    WAN4_conn passthrough=yes
add action=mark-routing chain=output connection-mark=WAN1_conn \
    new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN2_conn \
    new-routing-mark=to_WAN2 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN3_conn \
    new-routing-mark=to_WAN3 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN4_conn \
    new-routing-mark=to_WAN4 passthrough=yes
add action=accept chain=prerouting dst-address=192.168.10.0/24
add action=accept chain=prerouting dst-address=192.168.20.0/24
add action=accept chain=prerouting dst-address=192.168.30.0/24
add action=accept chain=prerouting dst-address=192.168.40.0/24
add action=mark-connection chain=prerouting comment=\
    "Le seguenti regole stabiliscono il peso delle linee" dst-address-type=\
    !local new-connection-mark=WAN1_conn passthrough=yes \
    per-connection-classifier=src-address-and-port:5/0 src-address=\
    10.22.10.1-10.22.10.255
add action=mark-connection chain=prerouting dst-address-type=!local \
    new-connection-mark=WAN1_conn passthrough=yes per-connection-classifier=\
    src-address-and-port:5/1 src-address=10.22.10.1-10.22.10.255
add action=mark-connection chain=prerouting dst-address-type=!local \
    new-connection-mark=WAN2_conn passthrough=yes per-connection-classifier=\
    src-address-and-port:5/2 src-address=10.22.10.1-10.22.10.255
add action=mark-connection chain=prerouting dst-address-type=!local \
    new-connection-mark=WAN3_conn passthrough=yes per-connection-classifier=\
    src-address-and-port:5/3 src-address=10.22.10.1-10.22.10.255
add action=mark-connection chain=prerouting dst-address-type=!local \
    new-connection-mark=WAN4_conn passthrough=yes per-connection-classifier=\
    src-address-and-port:5/4 src-address=10.22.10.1-10.22.10.255
add action=mark-routing chain=prerouting connection-mark=WAN1_conn \
    new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN2_conn \
    new-routing-mark=to_WAN2 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN3_conn \
    new-routing-mark=to_WAN3 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN4_conn \
    new-routing-mark=to_WAN4 passthrough=yes
/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1 src-address=\
    10.22.10.1-10.22.10.255
add action=masquerade chain=srcnat out-interface=WAN2 src-address=\
    10.22.10.1-10.22.10.255
add action=masquerade chain=srcnat out-interface=WAN3 src-address=\
    10.22.10.1-10.22.10.255
add action=masquerade chain=srcnat out-interface=WAN4 src-address=\
    10.22.10.1-10.22.10.255
/ip route
add check-gateway=ping distance=1 gateway=192.168.10.1 routing-mark=to_WAN1
add check-gateway=ping distance=2 gateway=192.168.20.1 routing-mark=to_WAN2
add check-gateway=ping distance=3 gateway=192.168.30.1 routing-mark=to_WAN3
add check-gateway=ping distance=4 gateway=192.168.40.1 routing-mark=to_WAN4
add check-gateway=ping distance=1 gateway=192.168.10.1
add check-gateway=ping distance=2 gateway=192.168.20.1
add check-gateway=ping distance=3 gateway=192.168.30.1
add check-gateway=ping distance=4 gateway=192.168.40.1
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
/ppp secret
add name=wifi password=wifi profile=profile2mb remote-address=10.22.10.1 \
    service=pppoe
add name=pc1 password=pc1 profile=profile4mb remote-address=10.22.10.2 \
    service=pppoe
add name=pc2 password=pc2 profile=profile4mb remote-address=10.22.10.3 \
    service=pppoe

No one help?

Inviato dal mio GT-I9505 utilizzando Tapatalk

Add connection-mark=no-mark to your five PCC rules. And then add another rule(s) before those, where you set some other mark for traffic you want to exclude from PCC.