How to implement pppoe dialing with 5 minutes interval between every two dials

I have a broadband account that allows me to dial up multiple times.

However, I can only dial up at most twice in a short period of time. After that, I need to wait 10 minutes before I can continue dialing.

I’ve searched Google for many cases but none are satisfactory.

May I ask what is the modern implementation method?
Thank you in advance to those who are willing to help me.

Try by changing the keepalive-timeout parameter in the PPPoE client settings to 150 seconds or greater

But I have a total of 10 PPPoE interfaces that need to dial. If every two interfaces take 5 minutes, then I need each interface to wait 1500 seconds.

Am I supposed to understand it this way?

Could you explain your configuration?

Do you have eg. 10 distinct accounts to dial-in your ISP or more ISPs? Why?
Can you establish multiply PPPoE connection at the same time to that ISP or to different ones?
Can you try to dial-in twice using one accont and you have to try next one as the previously used is “blocked” for 5 minutes or could be banned if you try too often?
What happens if you establish more than one connection?

What are you waiting for to explain the whole situation, instead of wasting people’s time by giving them one crumb at a time???

My ISP allows me to dial multiple times using the same account and password, but each dial-up must have a different MAC address. Additionally, my ISP’s server will limit the number of dial-ups within a short period based on my account, so I need to wait for a while before continuing to dial.

However, I discovered today that even if I disable all PPPoE interfaces and then enable all PPPoE interfaces simultaneously, although the logs keep showing dial-up failures, after waiting for 11 minutes, the dial-ups will gradually resume successfully.

The reason I post this topic is that I want to re-enable the PPPoE interfaces with a determined time delay instead of letting it constantly attempt redials in the background. Continuous retries might trigger the ISP’s restrictions.

Below is my current configuration.

# 2025-04-18 16:41:26 by RouterOS 7.16.2
# software id = xxx
#
# model = CCR1036-12G-4S
# serial number = xxx
/disk
add media-interface=none media-sharing=no slot=tmpfs tmpfs-max-size=2863311530 type=tmpfs
/interface ethernet
set [ find default-name=ether2 ] disabled=yes
set [ find default-name=ether3 ] disabled=yes
set [ find default-name=ether4 ] disabled=yes
set [ find default-name=ether5 ] disabled=yes
set [ find default-name=ether6 ] disabled=yes
set [ find default-name=ether7 ] disabled=yes
set [ find default-name=ether8 ] disabled=yes
set [ find default-name=sfp1 ] disabled=yes
set [ find default-name=sfp2 ] disabled=yes
set [ find default-name=sfp3 ] disabled=yes
set [ find default-name=sfp4 ] disabled=yes
/interface bonding
add mode=802.3ad name=bonding1 slaves=ether12,ether11,ether10,ether9 transmit-hash-policy=layer-2-and-3
/interface vlan
add disabled=yes interface=bonding1 name=vlan_cmcc vlan-id=1001
add interface=bonding1 name=vlan_cnct vlan-id=1003
add interface=bonding1 name=vlan_cncu vlan-id=1002
add interface=bonding1 name=vlan_guest vlan-id=2001
add interface=bonding1 name=vlan_iot vlan-id=2000
/interface macvlan
add interface=vlan_cnct mac-address=8E:54:8A:56:06:92 mode=private name=macvlan1
add interface=vlan_cnct mac-address=BE:1D:B1:F4:0A:95 mode=private name=macvlan2
add interface=vlan_cnct mac-address=E2:A2:7A:B7:DE:B8 mode=private name=macvlan3
add interface=vlan_cnct mac-address=E6:ED:E7:E7:B1:62 mode=private name=macvlan4
add interface=vlan_cnct mac-address=56:5A:94:1E:C2:93 mode=private name=macvlan5
add interface=vlan_cnct mac-address=86:A9:7D:77:C8:74 mode=private name=macvlan6
add interface=vlan_cnct mac-address=4A:0D:B2:7F:91:1C mode=private name=macvlan7
add interface=vlan_cnct mac-address=C2:E3:3F:13:B9:81 mode=private name=macvlan8
add interface=vlan_cnct mac-address=8A:5A:7D:34:53:F6 mode=private name=macvlan9
/interface pppoe-client
add disabled=no interface=macvlan1 name=pppoe-ct1 user=<username>
add disabled=no interface=macvlan2 name=pppoe-ct2 user=<username>
add disabled=no interface=macvlan3 name=pppoe-ct3 user=<username>
add disabled=no interface=macvlan4 name=pppoe-ct4 user=<username>
add disabled=no interface=macvlan5 name=pppoe-ct5 user=<username>
add disabled=no interface=macvlan6 name=pppoe-ct6 user=<username>
add disabled=no interface=macvlan7 name=pppoe-ct7 user=<username>
add disabled=no interface=macvlan8 name=pppoe-ct8 user=<username>
add disabled=no interface=macvlan9 name=pppoe-ct9 user=<username>
add disabled=no interface=vlan_cncu name=pppoe-out8 user=<username>
/interface list
add name=WAN
add name=LAN
add name=LB
add name=MODEM
add name=UNTRUSTED
/ip pool
add name=dhcp ranges=10.0.0.150-10.0.0.240
add name=dhcp_guest ranges=192.168.200.10-192.168.200.250
add name=dhcp_iot ranges=192.168.50.10-192.168.50.200
/ip dhcp-server
add address-pool=dhcp interface=bonding1 name=dhcp1
add address-pool=dhcp_guest interface=vlan_guest name=dhcp_guest
add address-pool=dhcp_iot interface=vlan_iot name=dhcp_iot
/port
set 0 name=serial0
set 1 name=serial1
/routing table
add disabled=yes fib name=ecmp
add disabled=no fib name=cmip_route
add disabled=no fib name=ct1
add disabled=no fib name=ct2
add disabled=no fib name=ct3
add disabled=no fib name=ct6
add disabled=no fib name=ct5
add disabled=no fib name=ct7
add disabled=no fib name=ct8
add disabled=no fib name=ct9
add disabled=no fib name=ct4
/ip settings
set ipv4-multipath-hash-policy=l4
/interface detect-internet
set detect-interface-list=WAN internet-interface-list=WAN
/interface list member
add interface=vlan_cmcc list=WAN
add interface=bonding1 list=LAN
add interface=vlan_iot list=LAN
add interface=vlan_guest list=LAN
add interface=vlan_cmcc list=MODEM
add interface=vlan_cncu list=MODEM
add interface=vlan_guest list=UNTRUSTED
add interface=vlan_iot list=UNTRUSTED
add interface=pppoe-ct1 list=WAN
add interface=pppoe-ct2 list=WAN
add interface=pppoe-ct3 list=WAN
add interface=pppoe-ct4 list=WAN
add interface=pppoe-ct5 list=WAN
add interface=pppoe-ct6 list=WAN
add interface=pppoe-ct7 list=WAN
add interface=pppoe-ct8 list=WAN
add interface=pppoe-ct9 list=WAN
add interface=pppoe-out8 list=WAN
add interface=vlan_cnct list=MODEM
add interface=ether1 list=WAN
/ip address
add address=10.0.0.1/24 comment=defconf interface=bonding1 network=10.0.0.0
add address=120.<public ip>/28 interface=ether1 network=120.<public ip>
add address=192.168.1.20/24 comment=ma5671 interface=vlan_cncu network=192.168.1.0
add address=192.168.200.1/24 interface=vlan_guest network=192.168.200.0
add address=192.168.50.1/24 interface=vlan_iot network=192.168.50.0
/ip dhcp-server network
add address=10.0.0.0/24 dns-server=119.29.29.29,223.5.5.5 gateway=10.0.0.1 netmask=24
add address=192.168.50.0/24 dns-server=223.6.6.6,114.114.114.114 gateway=192.168.50.1
add address=192.168.200.0/24 dns-server=223.6.6.6,114.114.114.114 gateway=192.168.200.1
/ip dns
set servers=119.29.29.29,119.28.28.28
/ip firewall address-list
add address=10.0.0.100 comment="mac mini" list="port mapping"
add address=10.0.0.93 comment=ss+rustdesk list="port mapping"
add address=10.0.0.94 comment=ss list="port mapping"
add address=10.0.0.8 comment=freepbx list="port mapping"
add address=10.0.0.95 comment=ss list="port mapping"
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=drop chain=input comment="security: drop UNTRUSTED access router" in-interface-list=UNTRUSTED
add action=drop chain=forward comment="security: drop UNTRUSTED access internal" dst-address=10.0.0.0/24 in-interface-list=UNTRUSTED
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-mark=no-mark connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=mark-connection chain=prerouting disabled=yes new-connection-mark=cmip_conn passthrough=yes src-address-list=CMIP
add action=mark-routing chain=prerouting connection-mark=CMIP_conn disabled=yes new-routing-mark=cmip_route passthrough=no src-address-list=CMIP
add action=mark-connection chain=prerouting comment="surge ponte port mapping return" new-connection-mark=cmip_conn passthrough=yes protocol=udp src-address-list="port mapping" src-port=6208
add action=mark-connection chain=prerouting comment="ss port mapping return" new-connection-mark=cmip_conn passthrough=yes protocol=tcp src-address-list="port mapping" src-address-type=!local src-port=23001-23009
add action=mark-connection chain=prerouting comment="freepbx port mapping return" new-connection-mark=cmip_conn passthrough=yes protocol=udp src-address-list="port mapping" src-port=10000-10100,5060
add action=mark-connection chain=prerouting comment="freepbx port mapping return" new-connection-mark=cmip_conn passthrough=yes protocol=tcp src-address-list="port mapping" src-port=5060
add action=mark-connection chain=prerouting comment="rustdesk port mapping return" new-connection-mark=cmip_conn passthrough=yes protocol=tcp src-address-list="port mapping" src-port=21114-21119,8000
add action=mark-routing chain=prerouting comment="port mapping return" connection-mark=cmip_conn in-interface-list=!LAN new-routing-mark=cmip_route passthrough=no src-address-list="port mapping"
add action=mark-routing chain=prerouting comment="port mapping return" connection-mark=cmip_conn disabled=yes in-interface-list=!LAN new-routing-mark=ct1 passthrough=no src-address-list="port mapping"
/ip firewall nat
add action=dst-nat chain=dstnat comment="surge mac ponte" dst-address=120.<public ip> dst-port=6208 protocol=udp to-addresses=10.0.0.100 to-ports=6208
add action=dst-nat chain=dstnat comment=ss dst-address=120.<public ip> dst-port=23001-23009 protocol=tcp to-addresses=10.0.0.93 to-ports=23001-23009
add action=dst-nat chain=dstnat comment=ss dst-port=23001-23009 in-interface=pppoe-ct1 protocol=tcp to-addresses=10.0.0.93 to-ports=23001-23009
add action=dst-nat chain=dstnat comment=freepbx dst-address=120.<public ip> dst-port=10000-10100,5060 protocol=udp to-addresses=10.0.0.8
add action=dst-nat chain=dstnat comment=freepbx dst-address=120.<public ip> dst-port=5060 protocol=tcp to-addresses=10.0.0.8 to-ports=5060
add action=dst-nat chain=dstnat comment=rustdesk dst-address=120.<public ip> dst-port=21114-21119,8000 protocol=tcp to-addresses=10.0.0.93
add action=dst-nat chain=dstnat comment=rustdesk dst-address=120.<public ip> dst-port=21116 protocol=udp to-addresses=10.0.0.93 to-ports=21116
add action=masquerade chain=srcnat out-interface-list=WAN
add action=masquerade chain=srcnat comment="Hairpin NAT" disabled=yes dst-address-list="port mapping" out-interface-list=LAN protocol=tcp src-address=10.0.0.0/24
add action=masquerade chain=srcnat comment="access ma5671" disabled=yes out-interface-list=MODEM
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=120.237.4.161 routing-table=cmip_route scope=30 suppress-hw-offload=no target-scope=10
add disabled=yes distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct1 routing-table=ecmp scope=30 suppress-hw-offload=no target-scope=12
add disabled=yes distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct2 routing-table=ecmp scope=30 suppress-hw-offload=no target-scope=12
add disabled=yes distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct3 routing-table=ecmp scope=30 suppress-hw-offload=no target-scope=12
add disabled=yes distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct4 routing-table=ecmp scope=30 suppress-hw-offload=no target-scope=12
add disabled=yes distance=2 dst-address=0.0.0.0/0 gateway=pppoe-out8 routing-table=ecmp scope=30 suppress-hw-offload=no target-scope=12
add disabled=no distance=1 dst-address=1.1.1.1/32 gateway=pppoe-ct1 routing-table=main scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=1.1.1.2/32 gateway=pppoe-ct2 routing-table=main scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=1.1.1.3/32 gateway=pppoe-ct3 routing-table=main scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=1.1.1.4/32 gateway=pppoe-ct4 routing-table=main scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=2 dst-address=1.1.1.8/32 gateway=pppoe-out8 routing-table=main scope=10 suppress-hw-offload=no target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=1.1.1.1 routing-table=main scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=1.1.1.2 routing-table=main scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=1.1.1.3 routing-table=main scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=1.1.1.4 routing-table=main scope=30 suppress-hw-offload=no target-scope=11
add check-gateway=ping disabled=no distance=2 dst-address=0.0.0.0/0 gateway=1.1.1.8 routing-table=main scope=30 suppress-hw-offload=no target-scope=11
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct6 routing-table=ct6 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct3 routing-table=ct3 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct4 routing-table=ct4 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct5 routing-table=ct5 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct7 routing-table=ct7 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct8 routing-table=ct8 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct9 routing-table=ct9 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct1 routing-table=ct1 scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-ct2 routing-table=ct2 scope=30 suppress-hw-offload=no target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set ssh address=10.0.0.0/24
set api disabled=yes
set winbox address=10.0.0.0/24
set api-ssl disabled=yes
/ip ssh
set host-key-type=ed25519 strong-crypto=yes
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bonding1 type=internal
add interface=pppoe-ct1 type=external
add interface=pppoe-ct2 type=external
add interface=pppoe-ct3 type=external
add interface=pppoe-ct4 type=external
/lcd
set enabled=no
/mpls ldp interface
add disabled=no interface=lo
/routing rule
add action=lookup disabled=no min-prefix=0 table=main
add action=lookup-only-in-table src-address=10.0.0.99/32 table=ct9
add action=lookup-only-in-table src-address=10.0.0.98/32 table=ct8
add action=lookup-only-in-table src-address=10.0.0.97/32 table=ct7
add action=lookup-only-in-table src-address=10.0.0.96/32 table=ct6
add action=lookup-only-in-table src-address=10.0.0.95/32 table=ct5
add action=lookup-only-in-table src-address=10.0.0.94/32 table=ct4
add action=lookup-only-in-table src-address=10.0.0.93/32 table=ct3
add action=lookup disabled=no src-address=10.0.0.112/32 table=cmip_route
/system clock
set time-zone-name=Asia/Shanghai
/system logging
set 0 topics=info,!dhcp
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.cn.pool.ntp.org
add address=1.cn.pool.ntp.org
add address=2.cn.pool.ntp.org
add address=3.cn.pool.ntp.org
/system routerboard settings
set enter-setup-on=delete-key
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none

Please answer:

Can you establish multiply PPPoE connection at the same time to that ISP?
What happens if you establish more than one connection?

Switch off - “Detect Internet”

What causes sessions drops so frequently taht you need reconnect again and again?

The idea is to make a script that, whan

  1. disable all that interfaces interfaces.
  2. select the any of them as “worth to try”
  3. enable “worth to try” interface
  4. wait eg 10 sec. to establish connection
  5. if it’s is established,disable that script
  6. if no succes during connection after “delay”, disable the current interface, set the next interface as “worth to try” and goto 2
  7. gdisable that cript

When you loose the internet - use netwatch - enable the “Activation script”

Can you establish multiply PPPoE connection at the same time to that ISP?
yes, view my upload image.
SCR-20250423-ojft.png
What happens if you establish more than one connection?
I need to use a different public IP as an outlet for my service.

What causes sessions drops so frequently that you need reconnect again and again?
My ISP may disconnect at 48 hour intervals and let me re-establish the connection.

Why your ISP does not assign you a pool/set of addresses and route it over one connection to your router?

Why PPPoE connections are not established immediately after recalling? What is the cause of rejection? Do you have any logs? PPPoE seems to be
mainly a security thing.



Why your ISP does not assign you a pool/set of addresses and route it over one connection to your router?
ISP do not accept



Why PPPoE connections are not established immediately after recalling? What is the cause of rejection? Do you have any logs? PPPoE seems to be
mainly a security thing.

If the connection cannot be established, the remote PPPoE server will time out, and even using PPPoE Scan, the server cannot be detected. It is necessary to wait for 10 minutes before the server will respond to my requests again.

I think the server has protection measures in place to prevent users from making a large number of dial-out attempts in a short period of time.
SCR-20250426-upps.png