Mikrotik Router with 2 ISPs (No load balancing required) help dst-nat issue

Hi, I’m having some issue with my Mikrotik Router.
Two of my ISPs incoming is via PPPOE connection. Thus, i’ve been splitting them up with routing rules and tables. Since I have some needed to go through VPN, some through normal routes, and etc. Recently, I am trying my dynamic ip connection trying to port forward to my pfsense firewall. Apparently there is some issue, based on the dst-nat firewall filter it shows → nat correctly, but in the NAT side logs showing direct public IP and out interface = unknown. P.S my apologies for a very very confusing firewall rules. Please look below for the configurations.

2024-07-30 12:36:55 by RouterOS 7.15.1

software id = PSI7-EAMH

model = RB4011iGS+

serial number =

/interface bridge
add name=vlan1-bridge port-cost-mode=short vlan-filtering=yes
/interface ethernet
set [ find default-name=ether9 ] name=maxis
set [ find default-name=ether10 ] name=unifi
/interface pppoe-client
add disabled=no interface=maxis name=pppoe-out2 use-peer-dns=yes user=\

/interface wireguard
add disabled=yes listen-port= mtu=1420 name=wireguard1
add listen-port=51821 mtu=1420 name=wireguard2
/interface vlan
add interface=unifi name=vlan500 vlan-id=500
/interface bonding
add mode=802.3ad name=bonding1 slaves=ether2,ether3,ether4,ether5
transmit-hash-policy=layer-2-and-3
/interface pppoe-client
add disabled=no interface=vlan500 max-mtu=1480 name=pppoe-out1 use-peer-dns=
yes
/interface vlan
add interface=bonding1 name=vlan4 vlan-id=4
add interface=bonding1 name=vlan5 vlan-id=5
add interface=bonding1 name=vlan6 vlan-id=6
add interface=bonding1 name=vlan7 vlan-id=7
/interface list
add name=LAN
add name=WAN
/ip pool
add name=pool1 ranges=192.168.3.100-192.168.3.200
add name=vmpool ranges=192.168.4.100-192.168.4.200
add name=lanpool ranges=192.168.0.113-192.168.0.240
add name=pool2 ranges=192.168.5.100-192.168.5.200
/ip dhcp-server
add address-pool=lanpool interface=vlan1-bridge name=server1
add address-pool=vmpool interface=vlan4 name=vmpool
add address-pool=pool2 disabled=yes interface=vlan5 name=server2
/port
set 0 name=serial0
set 1 name=serial1
/routing table
add disabled=no fib name=out-maxis
add disabled=no fib name=vpn-virtualizor2
add disabled=no fib name=test-ip
add disabled=no fib name=out-unifi
/interface bridge port
add bridge=vlan1-bridge interface=bonding1 internal-path-cost=10 path-cost=10
/ip neighbor discovery-settings
set discover-interface-list=none lldp-poe-power=no
/ip settings
set max-neighbor-entries=8192 rp-filter=strict tcp-syncookies=yes
/ipv6 settings
set accept-redirects=no accept-router-advertisements=no disable-ipv6=yes
forward=no max-neighbor-entries=4096
/interface list member
add interface=bonding1 list=LAN
add interface=pppoe-out1 list=WAN
add interface=pppoe-out2 list=WAN
add interface=vlan4 list=LAN
add interface=vlan7 list=LAN
add interface=vlan5 list=LAN
add interface=vlan6 list=LAN
/interface wireguard peers
add allowed-address=0.0.0.0/0 disabled=yes endpoint-address=
endpoint-port= interface=wireguard1 name=peer1 persistent-keepalive=
5s public-key=“”
add allowed-address=0.0.0.0/0 endpoint-address= endpoint-port=
interface=wireguard2 name=peer2 persistent-keepalive=5s public-key=
“”
/ip address
add address=192.168.0.1/24 interface=bonding1 network=192.168.0.0
add address=192.168.4.1/24 interface=vlan4 network=192.168.4.0
add address=192.168.5.1/24 interface=vlan5 network=192.168.5.0
add address=172.16.6.1/24 interface=vlan6 network=172.16.6.0
add address=10.20.0.2/24 interface=wireguard2 network=10.20.0.0
add address=10.8.0.2/24 interface=wireguard1 network=10.8.0.0
/ip cloud
set update-time=no
/ip dhcp-server network
add address=172.16.6.0/24 dns-server=172.16.6.1 gateway=172.16.6.1
add address=192.168.0.0/24 dns-server=192.168.0.1 gateway=192.168.0.1
add address=192.168.4.0/24 dns-server=192.168.4.1 gateway=192.168.4.1
add address=192.168.5.0/24 dns-server=192.168.5.1 gateway=192.168.5.1
netmask=24
add address=192.168.7.0/24 dns-server=192.168.7.1 gateway=192.168.7.1
netmask=24
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1 verify-doh-cert=yes
/ip firewall address-list
add address=192.168.0.0/24 list=lan
add address=192.168.4.0/24 list=lan
add address=192.168.4.11 list=exception
add address=1.1.1.1 list=dns
add address=8.8.8.8 list=dns
add address=1.0.0.1 list=dns
add address=1.0.0.2 list=dns
add address=1.1.1.2 list=dns
add address=8.8.4.4 list=dns
add address=192.168.5.0/24 list=lan
add address=10.10.0.0/24 list=lan
add address=172.16.6.0/24 list=lan
add address=10.20.0.0/24 list=lan
add address=192.168.0.112 list=pfsenseWAN
add address=192.168.0.113 list=pfsenseWAN
add address=192.168.0.115 list=pfsenseWAN
/ip firewall filter
add action=accept chain=forward comment=“Allow Port Forwarding”
connection-nat-state=dstnat connection-state=new in-interface=pppoe-out1
log=yes
add action=accept chain=input comment=“Accept DNS - UDP” connection-state=“”
port=53 protocol=udp
add action=accept chain=input comment=“Accept DNS - TCP” connection-state=“”
port=53 protocol=tcp
add action=accept chain=forward comment=“Accept DNS - UDP” port=53 protocol=
udp
add action=accept chain=forward comment=“Accept DNS - TCP” port=53 protocol=
tcp
add action=accept chain=forward dst-address=192.168.0.0/24 src-address=
192.168.4.0/24
add action=accept chain=forward dst-address=192.168.5.0/24 src-address=
192.168.4.0/24
add action=accept chain=forward dst-address=192.168.4.0/24 src-address=
192.168.4.0/24
add action=accept chain=forward dst-address=172.16.6.0/24 src-address=
192.168.4.0/24
add action=accept chain=forward dst-address=192.168.7.0/24 src-address=
192.168.4.0/24
add action=accept chain=forward dst-address=192.168.0.0/24 src-address=
192.168.0.0/24
add action=accept chain=forward dst-address=192.168.5.0/24 src-address=
192.168.0.0/24
add action=accept chain=forward dst-address=192.168.4.0/24 src-address=
192.168.0.0/24
add action=accept chain=forward dst-address=192.168.0.0/24 src-address=
192.168.5.0/24
add action=accept chain=forward dst-address=192.168.4.0/24 src-address=
192.168.5.0/24
add action=accept chain=input dst-address=172.16.6.1 src-address=
172.16.6.0/24
add action=drop chain=input dst-address=172.16.6.0/24 src-address=
172.16.6.0/24
add action=accept chain=input src-address=192.168.4.0/24
add action=accept chain=input src-address=192.168.5.0/24
add action=accept chain=input src-address=192.168.0.0/24
add action=accept chain=input comment=“Allow Winbox” dst-port=xx
in-interface=vlan4 protocol=tcp
add action=accept chain=input comment=“Allow Winbox” dst-port=xx
in-interface=vlan1-bridge protocol=tcp
add action=accept chain=input comment=wireguard dst-port=xx protocol=udp
add action=accept chain=input comment=
“defconf: accept established,related,untracked” connection-state=
established,related
add action=drop chain=input comment=“defconf: drop invalid” connection-state=
invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=drop chain=input comment=“Drop All Else”
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack”
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=
“defconf: accept established,related, untracked” connection-state=
established,related
add action=drop chain=forward comment=“defconf: drop invalid”
connection-state=invalid
add action=accept chain=forward in-interface=vlan1-bridge out-interface=vlan4
add action=accept chain=forward comment=“allow LAN to WAN traffic”
in-interface=vlan1-bridge out-interface=pppoe-out1 src-address-list=
pfsenseWAN
add action=accept chain=forward comment=“allow LAN to WAN traffic”
in-interface=vlan1-bridge out-interface=pppoe-out2
add action=accept chain=forward comment=“allow LAN to WAN traffic”
in-interface=vlan4 out-interface=pppoe-out2 src-address=192.168.4.12
add action=accept chain=forward comment=“allow LAN to WAN traffic”
in-interface=vlan4 out-interface=pppoe-out2 src-address=192.168.4.0/24
add action=accept chain=forward comment=“allow LAN to WAN traffic”
in-interface=vlan5 out-interface=wireguard2
add action=accept chain=forward comment=“Allow Port Forwarding”
connection-nat-state=dstnat connection-state=new in-interface=wireguard2
add action=drop chain=forward comment=“drop all else” log=yes
/ip firewall mangle
add action=mark-connection chain=prerouting connection-mark=no-mark disabled=
yes new-connection-mark=test passthrough=yes src-address=
add action=mark-connection chain=prerouting connection-mark=no-mark disabled=
yes dst-address= in-interface=wireguard1
new-connection-mark=test passthrough=no
add action=mark-routing chain=prerouting connection-mark=test disabled=yes
in-interface=vlan7 new-routing-mark=test-ip passthrough=no
/ip firewall nat
add action=src-nat chain=srcnat disabled=yes out-interface=wireguard1
src-address= to-addresses=
add action=dst-nat chain=dstnat disabled=yes dst-address=
in-interface=wireguard1 protocol=tcp to-addresses=
add action=dst-nat chain=dstnat dst-port=3389 in-interface=pppoe-out1 log=yes
protocol=tcp to-addresses=192.168.0.112 to-ports=3389
add action=masquerade chain=srcnat out-interface=wireguard2 src-address=
172.16.6.0/24
add action=dst-nat chain=dstnat dst-port=80 in-interface=wireguard2 protocol=
tcp to-addresses=192.168.5.100 to-ports=80
add action=dst-nat chain=dstnat dst-port=443 in-interface=wireguard2
protocol=tcp to-addresses=192.168.5.100 to-ports=443
add action=masquerade chain=srcnat out-interface=pppoe-out2 src-address=
192.168.4.12
add action=masquerade chain=srcnat out-interface=pppoe-out1 src-address-list=
pfsenseWAN
add action=masquerade chain=srcnat out-interface=pppoe-out1 src-address=
192.168.4.0/24
add action=masquerade chain=srcnat out-interface=pppoe-out1 src-address=
192.168.0.0/24
add action=masquerade chain=srcnat out-interface=pppoe-out2 src-address=
192.168.0.0/24
add action=masquerade chain=srcnat out-interface=pppoe-out2 src-address=
192.168.4.0/24
add action=masquerade chain=srcnat out-interface=wireguard2 src-address=
192.168.5.0/24
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-out2
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=/32 gateway=pppoe-out2
routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.0.0/24 gateway=vlan1-bridge
routing-table=out-maxis scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.5.0/24 gateway=vlan5
routing-table=out-maxis scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-out2
routing-table=out-maxis scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=0.0.0.0/0 gateway=wireguard2 routing-table=
vpn-virtualizor2 suppress-hw-offload=no
add disabled=no distance=1 dst-address=192.168.5.0/24 gateway=vlan5
routing-table=vpn-virtualizor2 scope=10 suppress-hw-offload=no
target-scope=10
add disabled=no distance=1 dst-address=172.16.6.0/24 gateway=vlan6
routing-table=vpn-virtualizor2 scope=10 suppress-hw-offload=no
target-scope=10
add disabled=no distance=2 dst-address=0.0.0.0/0 gateway=pppoe-out2
routing-table=vpn-virtualizor2 scope=30 suppress-hw-offload=no
target-scope=10
add disabled=no distance=1 dst-address=192.168.4.0/24 gateway=vlan4
routing-table=out-maxis scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.4.0/24 gateway=vlan4
routing-table=vpn-virtualizor2 scope=10 suppress-hw-offload=no
target-scope=10
add disabled=no distance=1 dst-address=192.168.0.0/24 gateway=vlan1-bridge
routing-table=vpn-virtualizor2 scope=10 suppress-hw-offload=no
target-scope=10
add disabled=no distance=1 dst-address=172.16.6.0/24 gateway=vlan6
routing-table=out-maxis scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.7.0/24 gateway=192.168.0.112
routing-table=out-maxis scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=pppoe-out1
routing-table=out-unifi scope=30 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.5.0/24 gateway=vlan5
routing-table=out-unifi scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.4.0/24 gateway=vlan4
routing-table=out-unifi scope=10 suppress-hw-offload=no target-scope=10
add disabled=no distance=1 dst-address=192.168.0.0/24 gateway=vlan1-bridge
routing-table=out-unifi scope=10 suppress-hw-offload=no target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set winbox address=192.168.4.0/24,192.168.0.0/24,10.10.0.0/24
set api-ssl disabled=yes
/ipv6 nd
set [ find default=yes ] disabled=yes
/routing rule
add action=lookup-only-in-table disabled=no src-address=192.168.5.0/24 table=
vpn-virtualizor2
add action=lookup-only-in-table disabled=no src-address=172.16.6.0/24 table=
vpn-virtualizor2
add action=lookup-only-in-table disabled=no src-address=192.168.0.112/32
table=out-unifi
add action=lookup-only-in-table disabled=no src-address=192.168.0.113/32
table=out-unifi
add action=lookup-only-in-table disabled=no src-address=192.168.0.115/32
table=out-unifi
add action=lookup-only-in-table disabled=no src-address=192.168.0.0/24 table=
out-maxis
add action=lookup-only-in-table disabled=no src-address=192.168.4.12/32
table=out-maxis
add action=lookup-only-in-table disabled=no src-address=192.168.4.0/24 table=
out-maxis
/system clock
set time-zone-name=Asia/Kuala_Lumpur
/system identity
set name=
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=0.asia.pool.ntp.org
add address=1.asia.pool.ntp.org
add address=2.asia.pool.ntp.org
add address=3.asia.pool.ntp.org
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=none
/tool mac-server ping
set enabled=no
/tr069-client
set periodic-inform-enabled=no periodic-inform-interval=5m

It seems that dst-nat doesn’t know nat the incoming request to my rdp3389 but firewall filter is showing the correct portion.

Issue shown below : -

EDIT : It seems nothing was wrong, i’ve just fixed it trying to pass everything to that IP address

A diagram would help, and would entice me to then look at the config.