Ok…
But without that feedback, the only thing I can answer is “yes, I know there is, because I do that regularly with no problems”, but I cannot tell you where else to dig. Disabling of the action=fasttrack-connection rule in /ip firewall filter should have made all the action=change-dscp rules in /ip firewall mangle work. If it hasn’t, I need the full config export to tell you what to do next.
/ip firewall filter fastrack is removed !
Here is my complete configuation
# jan/02/1970 03:53:15 by RouterOS 6.46.6
# software id = M97U-JVGB
#
# model = RB952Ui-5ac2nD
# serial number = BEE40BD3C89B
/interface bridge add admin-mac=C4:AD:34:88:00:7B auto-mac=no comment="Network LAN" name=bridge
/interface wireless set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-Ceee distance=indoors frequency=auto mode=ap-bridge ssid=MikroTik-B26F1D wireless-protocol=802.11
/interface wireless set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX comment="Interface(s) Wifi" country="france res" disabled=no distance=indoors frequency=2437 installati
on=indoor mode=ap-bridge name=wlan2.4 ssid=WIFI_TIK wireless-protocol=802.11
/interface ethernet set [ find default-name=ether1 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface ethernet set [ find default-name=ether2 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface ethernet set [ find default-name=ether3 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface ethernet set [ find default-name=ether4 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface ethernet set [ find default-name=ether5 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface wireless nstreme set wlan2.4 comment="Interface(s) Wifi"
/interface wireless manual-tx-power-table set wlan2.4 comment="Interface(s) Wifi"
/interface vlan add comment="WAN" interface=ether5 name=vlan20 vlan-id=20
/interface list add comment=defconf name=WAN
/interface list add comment=defconf name=LAN
/interface list add exclude=dynamic name=discover
/interface list add name=mactel
/interface list add name=mac-winbox
/interface wireless security-profiles set [ find default=yes ] authentication-types=wpa-psk eap-methods="" mode=dynamic-keys supplicant-identity=MikroTik wpa-pre-shared-key=XXXXXXXX
/ip pool add name=default-dhcp ranges=192.168.1.1-192.168.1.249
/ip dhcp-server add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/ipv6 pool add name=pool1 prefix=2001:db8:25:b068::/64 prefix-length=64
/interface bridge port add bridge=bridge comment="Interfaces du LAN" interface=ether2
/interface bridge port add bridge=bridge interface=wlan2.4
/interface bridge port add bridge=bridge interface=ether3
/interface bridge port add bridge=bridge interface=ether4
/interface bridge port add bridge=bridge interface=ether1
/ip neighbor discovery-settings set discover-interface-list=discover
/interface list member add comment=defconf interface=bridge list=LAN
/interface list member add comment=defconf interface=vlan20 list=WAN
/interface list member add interface=wlan2.4 list=discover
/interface list member add interface=wlan2 list=discover
/interface list member add interface=ether2 list=discover
/interface list member add interface=ether3 list=discover
/interface list member add interface=ether4 list=discover
/interface list member add interface=ether5 list=discover
/interface list member add interface=bridge list=discover
/interface list member add interface=bridge list=mactel
/interface list member add interface=bridge list=mac-winbox
/interface wireless access-list add interface=wlan2.4 mac-address=C4:AD:34:88:00:81 vlan-mode=no-tag
/ip address add address=192.168.1.254/24 comment="Network LAN" interface=bridge network=192.168.1.0
/ip address add address=10.0.2.1/30 comment="IP WAN" interface=vlan20 network=10.0.2.0
/ip dhcp-server network add address=192.168.1.0/24 comment="Network LAN" domain=network.local gateway=192.168.1.254
/ip dns set servers=2001:4860:4860::8888,2620:0:ccc::2,8.8.8.8,208.67.222.222
/ip firewall filter add action=accept chain=input comment="Accept established,related,untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=accept chain=input comment="Accept ICMP" protocol=icmp
/ip firewall filter add action=accept chain=input comment="Accept WINBOX" dst-port=8291 in-interface=vlan20 protocol=tcp
/ip firewall filter add action=accept chain=input comment="Allow L2TP VPN (ipsec-esp)" in-interface-list=WAN protocol=ipsec-esp
/ip firewall filter add action=accept chain=input comment="Allow L2TP VPN (500,4500,1701/udp)" dst-port=500,1701,4500 in-interface-list=WAN protocol=udp
/ip firewall filter add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
/ip firewall filter add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
/ip firewall filter add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall filter add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
/ip firewall filter add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
/ip firewall filter add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall mangle add action=mark-connection chain=forward dst-address=1.2.3.4 dst-port=5060 new-connection-mark=sip-connection passthrough=yes protocol=udp
/ip firewall mangle add action=mark-packet chain=forward connection-mark=sip-connection new-packet-mark=SIP passthrough=yes
/ip firewall mangle add action=mark-connection chain=forward dst-address=1.2.3.4 new-connection-mark=rtp-connection passthrough=yes port=10000-20000 protocol=udp
/ip firewall mangle add action=mark-packet chain=forward connection-mark=rtp-connection new-packet-mark=RTP passthrough=yes
/ip firewall mangle add action=change-dscp chain=postrouting log=yes log-prefix=DSCP-RTP new-dscp=46 out-interface=vlan20 packet-mark=RTP passthrough=no
/ip firewall mangle add action=change-dscp chain=postrouting log=yes log-prefix=DSCP-SIP new-dscp=46 out-interface=vlan20 packet-mark=SIP passthrough=no
/ip firewall mangle add action=change-dscp chain=postrouting log=yes log-prefix=test_cs1 new-dscp=8 out-interface=vlan20 passthrough=yes
/ip firewall nat add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip route add distance=1 gateway=10.0.2.2
/ip service set telnet disabled=yes
/ip service set ftp disabled=yes
/ip service set www disabled=yes
/ip service set ssh disabled=yes
/ip service set api disabled=yes
/ip service set winbox address=2001:db9:2525:ffff::/64,A.B.C.D/32
/ip service set api-ssl disabled=yes
/ipv6 address add address=2001:db8:1234:3329:20:ffff:ffff:1/126 advertise=no comment="IPv6" interface=vlan20
/ipv6 address add address=::f254 comment="Gateway IPv6 LAN" from-pool=pool1 interface=bridge
/ipv6 firewall filter add action=accept chain=input comment="Accept established,related,untracked" connection-state=established,related
/ipv6 firewall filter add action=accept chain=input comment="Accept ICMP" protocol=icmpv6
/ipv6 firewall filter add action=accept chain=input comment="Accept WINBOX" dst-port=8291 in-interface=vlan20 protocol=tcp
/ipv6 firewall filter add action=drop chain=input connection-state=invalid
/ipv6 firewall filter add action=drop chain=input connection-state=new in-interface=vlan20
/ipv6 firewall filter add chain=forward protocol=icmpv6
/ipv6 firewall filter add chain=forward connection-state=established,related
/ipv6 firewall filter add chain=forward connection-state=new in-interface=!vlan20
/ipv6 firewall filter add action=drop chain=forward connection-state=invalid
/ipv6 firewall filter add action=drop chain=forward connection-state=new in-interface=vlan20
/ipv6 nd set [ find default=yes ] interface=bridge managed-address-configuration=yes other-configuration=yes
/ipv6 nd prefix add autonomous=no interface=bridge
/ipv6 route add distance=1 gateway=2001:db8:1234:3329:20:ffff:ffff:2
/system clock set time-zone-name=Europe/Paris
/system identity set name=RB952UI_VLAN20
/tool bandwidth-server set enabled=no
/tool graphing interface add allow-address=192.168.1.254/32 interface=vlan20
/tool mac-server set allowed-interface-list=none
/tool mac-server mac-winbox set allowed-interface-list=none
/tool mac-server ping set enabled=no
As for “everything is crystal clear on Cisco, and dark forest on Mikrotik” - this is usually a matter of what vendor’s ecosystem you’ve met first when learning networking. To me, the way how everything is done in Mikrotik (ordered rule chains for firewall, ordered rule chains for routing, ordered rule chains for IPsec policies, …) is crystal clear, because RouterOS is in fact a unified configuration front-end above various linux features, and the hundreds of default settings not shown in show runnig-config upset me.
You are right ! I learned about Cisco for a long time … I really like Mikrotik but it is true that from time to time I have problems converting a configuration from a Cisco to Mikrotik. I still don’t despair of finding the DSCP problem…