No communication between 2 subnets

Sorry for the query, but I am a new user in Mikrotik.
First I will tell you a bit about the scenario and then my problem (which I hope you can help me with).
I have a Rb1100Hx4 (arm) v7.9.2 and 2 wan accesses by fiber optic with dhcp client
I have configured two network segments 192.168.0.0/24 and 192.168.1.0/24 and I only need the first network segment to have internet access and sometimes an IP from the second segment.
For now I just make everything navigate a wan interface. So far everything works.

The problem arises when I need to access from ip 192.168.0.44 to 192.168.1.16 (both computers with windows 10)
With rule:
add action=accept chain=forward dst-address=192.168.1.16 src-address=192.168.0.44
I get it to work on some computers (192.168.1.16 and 192.168.1.16 for example)
Everything indicates that it is a windows block, but I don’t know what it will be. Disabling the firewall in windows the exact same thing happens

I have the same scenario running with a squid proxy on debian and the subnets share resources without disabling the firewall and no issues.

I hope someone who has been through the same thing can help me.
Thank you so much

I share my config file
set [ find default=yes ] supplicant-identity=MikroTik
/port
set 0 name=serial0
set 1 name=serial1
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set max-neighbor-entries=8192
/interface list member
add interface=1WAN1-CLARO1 list=WANes
add interface=2WAN-CANAL4 list=WANes
add interface=3WAN2-CLARO2 list=WANes
/interface ovpn-server server
set auth=sha1,md5
/ip address
add address=192.168.1.1/24 interface=4LAN-TV network=192.168.1.0
add address=192.168.0.2/24 interface=5LAN-RVJ network=192.168.0.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=10m
/ip dhcp-client
add interface=1WAN1-CLARO1 use-peer-dns=no
add default-route-distance=2 interface=2WAN-CANAL4 use-peer-dns=no
add interface=3WAN2-CLARO2
/ip dns
set servers=8.8.8.8,8.8.4.4
/ip firewall filter
add action=accept chain=forward dst-address=192.168.1.16 src-address=
192.168.0.44
add action=accept chain=forward dst-address=192.168.1.20 src-address=
192.168.0.44
add action=drop chain=forward comment=
“Bloquea toda comunicacion entre redes RVJ y LanTV” in-interface=
5LAN-RVJ out-interface=4LAN-TV

/ip firewall mangle
add action=accept chain=prerouting src-address=192.168.0.0/16
add action=accept chain=prerouting disabled=yes dst-address=192.168.0.0
src-address=192.168.1.0
/ip route
add disabled=no distance=1 dst-address=192.168.0.0/24 gateway=192.168.1.1
pref-src=“” routing-table=main scope=30 suppress-hw-offload=no
target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/system clock
set time-zone-name=America/Argentina/Buenos_Aires
/system note
set show-at-login=no

Problems..

  1. I have a Rb1100Hx4 (arm) v7.9.2 and 2 wan accesses by fiber optic with dhcp client

/interface list member
add interface=1WAN1-CLARO1 list=WANes
add interface=2WAN-CANAL4 list=WANes
add interface=3WAN2-CLARO2 list=WANes


2. You have no complete set of firewall rules…
/interface list member
add interface=1WAN1-CLARO1 list=WANes
add interface=2WAN-CANAL4 list=WANes
add interface=3WAN2-CLARO2 list=WANes
add interface=4LAN-TV list=LAN
add interface=5LAN-TV list=LAN

/ip firewall address-list
add ip-address=192.168.1.16/32 list=CrossSubnet
add ip-address=192.168.1.20/32 list=CrossSubnet
add ip-address=AdminDesktop list=Authorized
add ip-address=AdminLaptop list=Authorized
add ip-address=AdminSmartphone list=Authorized

/ip firewall filter
{Input Chain}
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“defconf: accept to local loopback (for CAPsMAN)” dst-address=127.0.0.1
add action=accept chain=input comment=“admin access only” in-interface-list=LAN src-address-list=Authorized
add action=accept chain=input comment=“Allow LAN DNS queries-UDP”
dst-port=53 in-interface-list=LAN protocol=udp
add action=accept chain=input comment=“Allow LAN DNS queries - TCP”
dst-port=53 in-interface-list=LAN protocol=tcp
add action=drop chain=input comment=“drop all else” { put this rule in last }
{forward chain}
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=forward comment=“allow internet traffic” in-interface=5LAN-TV out-interface-list=WAN
add action=accept chain=forward dst-address-list=CrossSubnet src-address=192.168.0.44
add action=accept chain=forward comment=“allow port forwarding” connection-nat-state=dstnat { disable or remove if not required }
add action=drop chain=forward comment=“drop all else”
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” out-interface-list=WAN

  1. Dont understand the purpose of this route??
    _/ip route
    add disabled=no distance=1 dst-address=192.168.0.0/24 gateway=192.168.1.1
    pref-src=“” routing-table=main scope=30 suppress-hw-offload=no _

If WAN2 has a default route, then yes you need a route for WAN1
add dst-address=0.0.0.0/0 gateway=192.168.1.1 routing-table=main.

The questions I have, besides the mystery of wan3, is
A. which WAN is primary and which WAN is failover etc… what is the plan???B
B. what is the purpose of the mangling?