I have a router at the main office with 3 isp’s with many l2tp tunnels coming in.
The issue is that the incoming tunnel has to be over the isp that has the default route on the router, OR with a route->rule that sends it over another isp.
I have tried putting in mangle rules on the input/output chains in an attempt to mark the traffic, but it does NOT work.
Im trying to get past this same issue as well, ive tried all kinds of mangle rules but none of them can see the mikrotik’s own l2tp traffic. I do have a server that is behind the router properly being connection marked, then routing marked via a separate public gateway. So that part is working, my problem is doing the initial connection marked mangle rule to find the l2tp traffic.
anyone have any ideas? this answer could help both myself and the OP.
Route rules are processed in order IIRC, so make sure the new rule is at the top.
To make sure I am understanding this properly, an outisde client is connecting to the IP address of ISP1, but the mikrotik response is going out ISP2 with a source IP of ISP2?
Hi that is correct. (your network map with isp 1 isp2)
Also every rule i have been testing is always moved to the top so that is not the issue. THe main problem i every have is not the action, its getting the rule to be qualified (and thus see the packet counter go up) most of these tests the packet count on the rule is 0.
I think this is clear mikrotik BUG judging by all the other threads about this and judging by the strage replies im getting from mikrotik support on this issue *( first the completely ignored the question and focued on a 1 line question about an RB1200, then they sent a one line very vague rule).
The sad thing is i brought this issue up to mikrotik back on 2.9.2x days
I have three of these setups running right now (the latest of which I just set up last week), and all of them work great (dual WAN, failover, VPN on both links).
They are all on 450G’s running 4.17, 5.4 or 5.7.
In theory I should be able to get rid of the src/dst checks on the final 2 mangle rules, but I haven’t gotten around to testing it yet. Since the CPU doesn’t ever hit over 20% I’m not worried about redundant checks.
I should note that I am checking against <LAN/16> instead of <LAN/24> to make sure I get the VPN user’s subnet as well
With this setup, LAN customers default to out ISP1, failover to ISP2. In the event of failback, existing connections stay on their established line until terminated. I can successfully PPTP,L2TP, and SSH to both ISP1 and ISP2 from the internet.
Hi, we have the same situation, but we need to mark traffic only to ISP2 and when local router initiated IPSec traffic also to go to the ISP2. Please help, our central router is static IP and our remote router is dynamic IP which we have script to resolve IP. We tried your solution but doesnt work. Please provide us more specific example. If you need we cant provide you our configuration with IP adresses.
Anyone found a solution for this ? Seems like L2TP is not being marked correctly still.
I have problem with l2tp going to wan2, but answered with wan1.