pppoe users not work with PCC and other Q!!

hello there
im new with mikrotik … i used this PCC script for loadbalncing 32 mega …

/ip address
add address=192.168.0.1/24 network=192.168.0.0 broadcast=192.168.0.255 interface=Local
add address=192.168.1.2/24 network=192.168.1.0 broadcast=192.168.1.255 interface=WAN1
add address=192.168.2.2/24 network=192.168.2.0 broadcast=192.168.2.255 interface=WAN2

/ip dns set allow-remote-requests=yes cache-max-ttl=1w cache-size=5000KiB max-udp-packet-size=512 servers=8.8.8.8

/ip firewall mangle
add chain=input in-interface=WAN1 action=mark-connection new-connection-mark=WAN1_conn
add chain=input in-interface=WAN2 action=mark-connection new-connection-mark=WAN2_conn

add chain=output connection-mark=WAN1_conn action=mark-routing new-routing-mark=to_WAN1
add chain=output connection-mark=WAN2_conn action=mark-routing new-routing-mark=to_WAN2

add chain=prerouting dst-address=192.168.1.0/24 action=accept in-interface=Local
add chain=prerouting dst-address=192.168.2.0/24 action=accept in-interface=Local

add chain=prerouting dst-address-type=!local in-interface=Local per-connection-classifier=both-addresses-and-ports:2/0 action=mark-connection new-connection-mark=WAN1_conn passthrough=yes
add chain=prerouting dst-address-type=!local in-interface=Local per-connection-classifier=both-addresses-and-ports:2/1 action=mark-connection new-connection-mark=WAN2_conn passthrough=yes

add chain=prerouting connection-mark=WAN1_conn in-interface=Local action=mark-routing new-routing-mark=to_WAN1
add chain=prerouting connection-mark=WAN2_conn in-interface=Local action=mark-routing new-routing-mark=to_WAN2

/ip route
add dst-address=0.0.0.0/0 gateway=192.168.1.1 routing-mark=to_WAN1 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=192.168.2.1 routing-mark=to_WAN2 check-gateway=ping

add dst-address=0.0.0.0/0 gateway=192.168.1.1 distance=1 check-gateway=ping
add dst-address=0.0.0.0/0 gateway=192.168.2.1 distance=2 check-gateway=ping

/ip firewall nat
add chain=srcnat out-interface=WAN1 action=masquerade
add chain=srcnat out-interface=WAN2 action=masquerade

its working okay with hotspot users but it’s not with PPPoE user !! so how can i make it work for PPPoE also ??

the others questions :
1- can i upgrade my mikrotik version from 5.26 to 6.x and my rules and scripts still work or i should use new scripts for version 6.x ?
2- i used Bridge Filter - for Blocking DHCP Traffic by :

/interface bridge filter
add action=log chain=filter comment=“Block DHCP servers on 192.168.0.0/16”
disabled=no dst-address=255.255.255.255/32 ip-protocol=udp log-prefix=
“ALERT ROGUE DHCP (BLOCKED)” mac-protocol=ip src-address=192.168.0.0/16
src-port=67-68
add action=drop chain=filter comment=“Block DHCP servers on 192.168.0.0/16”
disabled=no dst-address=255.255.255.255/32 ip-protocol=udp mac-protocol=
ip src-address=192.168.0.0/16 src-port=67-68

Even simpler (all I wanted to do was block all DHCP requests through the bridge:
/interface bridge filter
add action=log chain=filter comment=“Block DHCP traffic”
disabled=no ip-protocol=udp mac-protocol=ip src-port=67-68

Remember to turn on “use-ip-firewall=yes”.

is this enough ? And protects my server from problem’s ??
3- The script that I mentioned above (PCC) work with 6.x ??

thats it <3

up
up
up
up
up
up

solved by :smiley:

/ip address
add address=10.10.10.2/24 network=10.10.10.0 broadcast=10.10.10.255 interface=LAN
add address=5.5.5.3/24 network=5.5.5.0 broadcast=5.5.5.255 interface=WAN1
add address=6.6.6.3/24 network=6.6.6.0 broadcast=6.6.6.255 interface=WAN2

/ip firewall mangle

add action=mark-connection chain=input comment=“MARK INCOMING WAN” connection-mark=no-mark in-interface=WAN1 new-connection-mark=cm_in_public1
add action=mark-connection chain=input connection-mark=no-mark in-interface=WAN2 new-connection-mark=cm_in_public2

add action=mark-routing chain=output connection-mark=cm_in_public1 new-routing-mark=via_public1
add action=mark-routing chain=output connection-mark=cm_in_public2 new-routing-mark=via_public2

add action=jump chain=prerouting comment=“JUMP → LOADBALANCE” dst-address-type=!local in-interface=LAN jump-target=loadbalance src-address=10.10.10.0/24

add action=mark-connection chain=loadbalance new-connection-mark=cm_lb_1 per-connection-classifier=both-addresses-and-ports:2/0
add action=mark-connection chain=loadbalance new-connection-mark=cm_lb_2 per-connection-classifier=both-addresses-and-ports:2/1

add action=mark-routing chain=prerouting connection-mark=cm_lb_1 in-interface=LAN new-routing-mark=via_public1 passthrough=no
add action=mark-routing chain=prerouting connection-mark=cm_lb_2 in-interface=LAN new-routing-mark=via_public2 passthrough=no

add chain=prerouting dst-address=5.5.5.0/24 action=accept in-interface=LAN
add chain=prerouting dst-address=6.6.6.0/24 action=accept in-interface=LAN


/ip firewall nat
add chain=srcnat out-interface=WAN1 action=masquerade
add chain=srcnat out-interface=WAN2 action=masquerade

/ip route
add check-gateway=ping distance=1 gateway=5.5.5.1 routing-mark=via_public1
add check-gateway=ping distance=1 gateway=6.6.6.1 routing-mark=via_public2
add check-gateway=ping distance=1 gateway=5.5.5.1,6.6.6.1

/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4


/system identity
set name=“Dr.BL@CKDeaTH”


\

You think this would work for pppoe and lan? Look at my last post