Hi guys, I just wonder if anyone could do me favour and take a look at my setup. (Don’t laugh, I’m probably doing something fundamentally wrong.)

RB2011 is basically running like a switch for PC_VPN & PC3 and others. All the PCs can access each others’ resources. AC56U is sitting at the gateway simply because of its hardware NAT acceleration. I will lose nearly half the bandwith if RB2011 sits there.
My question is, is it possible to set up MikroTik to divert only traffic from PC_VPN (or to a certain destination) thru its VPN connection, while PC4’s traffic will just go the normal way.
I tried working on Policy Based Routing, but I either have no internet at all for both PC4 and PC_VPN, or all traffic will go thru the normal way, as if there is no VPN.
The following script is my setup, it will probably take you guys just two minutes to work it out, so please do me a favour:
_# oct/30/2014 15:45:20 by RouterOS 6.20
software id = xxxx-xxxx
/interface bridge
add admin-mac=xx:xx:xx:xx:xx:xx auto-mac=no name=bridge-local
/interface ethernet
set [ find default-name=ether2 ] comment=“Ether2 to 5 switched off Ether2”
set [ find default-name=ether3 ] master-port=ether2
set [ find default-name=ether4 ] master-port=ether2
set [ find default-name=ether5 ] master-port=ether2
set [ find default-name=ether6 ] comment=“Ehter6 to 10 switched off Ether6”
name=ether6-master-local
set [ find default-name=ether7 ] master-port=ether6-master-local name=
ether7-slave-local
set [ find default-name=ether8 ] master-port=ether6-master-local name=
ether8-slave-local
set [ find default-name=ether9 ] master-port=ether6-master-local name=
ether9-slave-local
set [ find default-name=ether10 ] master-port=ether6-master-local name=
ether10-slave-local
/ip neighbor discovery
set ether1 discover=no
set ether2 comment=“Ether2 to 5 switched off Ether2”
set ether6-master-local comment=“Ehter6 to 10 switched off Ether6”
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk eap-methods=“”
management-protection=allowed mode=dynamic-keys name=WPA2
supplicant-identity=“” wpa-pre-shared-key=xxxxxxxx wpa2-pre-shared-key=
xxxxxxxx
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=
20/40mhz-ht-above distance=indoors l2mtu=2290 mode=ap-bridge
security-profile=WPA2 ssid=MikroTik-6B3A0D
/ip pool
add name=dhcp ranges=192.168.88.11-192.168.88.20
/ip dhcp-server
add address-pool=dhcp interface=ether2 name=default
/port
set 0 name=serial0
/interface pptp-client
add add-default-route=no allow=pap,chap,mschap1,mschap2 connect-to=
5.254.100.70 dial-on-demand=no disabled=no keepalive-timeout=60 max-mru=
1450 max-mtu=1450 mrru=disabled name=FreeVPN_me password=xxxxxx profile=
default-encryption user=xxxx
/system logging action
set 2 remember=yes
/interface bridge port
add bridge=bridge-local interface=ether6-master-local
add bridge=bridge-local interface=sfp1
add bridge=bridge-local interface=wlan1
add bridge=bridge-local interface=ether1
add bridge=bridge-local interface=ether2
/ip address
add address=192.168.88.1/24 comment=“default configuration” interface=
bridge-local network=192.168.88.0
/ip dhcp-client
add comment=“default configuration” dhcp-options=hostname,clientid interface=
bridge-local
/ip dhcp-server network
add address=192.168.88.0/24 comment=“default configuration” dns-server=
192.168.88.1 gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,114.114.114.114
/ip dns static
add address=192.168.88.1 name=router
/ip firewall filter
add chain=input comment=“default configuration” protocol=icmp
add chain=input comment=“default configuration” connection-state=established
add chain=input comment=“default configuration” connection-state=related
add action=drop chain=input comment=“default configuration” in-interface=
bridge-local
add chain=forward comment=“default configuration” connection-state=
established
add chain=forward comment=“default configuration” connection-state=related
add action=drop chain=forward comment=“default configuration”
connection-state=invalid
/ip firewall mangle
add action=mark-routing chain=prerouting new-routing-mark=VPN passthrough=no
src-address=192.168.88.103
/ip firewall nat
FreeVPN_me not ready
add action=masquerade chain=srcnat log=yes log-prefix=@@@@@@@@@@
out-interface=FreeVPN_me
add action=masquerade chain=srcnat comment=“default configuration”
out-interface=bridge-local
/ip route
add distance=1 gateway=FreeVPN_me routing-mark=VPN
add distance=1 gateway=bridge-local
/ip upnp
set allow-disable-external-interface=no
/lcd
set enabled=no touch-screen=disabled
/lcd interface pages
set 0 interfaces=“sfp1,ether1,ether2,ether3,ether4,ether5,ether6-master-local,
ether7-slave-local,ether8-slave-local,ether9-slave-local,ether10-slave-loc
al”
/snmp
set trap-community=public
/system clock
set time-zone-name=Asia/Hong_Kong
/system identity
set name=MikroTik_AP
/system ntp client
set enabled=yes primary-ntp=223.255.185.2 secondary-ntp=137.189.4.10
/tool mac-server
set [ find default=yes ] disabled=yes
add interface=ether2
add interface=ether3
add interface=ether4
add interface=ether5
add interface=ether6-master-local
add interface=ether7-slave-local
add interface=ether8-slave-local
add interface=ether9-slave-local
add interface=ether10-slave-local
add interface=sfp1
add interface=wlan1
add interface=bridge-local
/tool mac-server mac-winbox
set [ find default=yes ] disabled=yes
add interface=ether2
add interface=ether3
add interface=ether4
add interface=ether5
add interface=ether6-master-local
add interface=ether7-slave-local
add interface=ether8-slave-local
add interface=ether9-slave-local
add interface=ether10-slave-local
add interface=sfp1
add interface=wlan1
add interface=bridge-local_



