RouterBoard 2011uas 2hnd dual wan with 30 users

Hi

I have read that the Routerboard 2011uas 2hnd should be able to handle dual wan with load balance, but have anyone tried it?
please let me know how and how well it was.
I have 15 users with 2 devices each. Besides the load balancing i need to set up a PPTP tunnel to my workstation at home.

What i am asking is can the 2011uas 2hnd handle dual 20/2 mbit wan with 15-30 users, load balancing and a PPTP tunnel to my workstation?

Thanks you in advance
Carsten Jacobsen

I have a 751G with a similar kind of setup and using PCC loadbalancing without issues. RB2011 will be more than enough

Can you send me you config, then I can compare with the one I have made?

Let us know the type of load balancing you want or are trying to achieve/your current config and we’ll see how we can be of assistance.

I have now setup the dualwan with the eksample from mikrotik wiki, and this is my code, can you help me it doesn’t work. I have throughput on wan1, but not on wan2. Just to be sure that nothing is wrong i allmost posted the hole config file :smiley:

/interface bridge
add admin-mac=D4:CA:6D:96:D6:FF auto-mac=no l2mtu=1598 name=bridge-local
protocol-mode=rstp
/interface ethernet
set 0 name=WAN-OUT
set 1 name=WAN1
set 2 name=WAN2
set 5 name=ether6-master-local
set 6 master-port=ether6-master-local name=ether7-slave-local
set 7 master-port=ether6-master-local name=ether8-slave-local
set 8 master-port=ether6-master-local name=ether9-slave-local
set 9 master-port=ether6-master-local name=ether10-slave-local
set 10 name=sfp1-gateway speed=100Mbps
/ip pool
add name=default-dhcp ranges=192.168.1.20-192.168.1.254
add name=Printers ranges=192.168.1.10-192.168.1.20
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge-local name=default
/port
set 0 name=serial0
/interface bridge port
add bridge=bridge-local interface=ether3
add bridge=bridge-local interface=ether4
add bridge=bridge-local interface=WAN-OUT
add bridge=bridge-local interface=ether6-master-local
add bridge=bridge-local interface=wlan1
/ip address
add address=192.168.1.1/24 comment=“default configuration” interface=wlan1
network=192.168.1.0
/ip dhcp-client
add comment=“default configuration” dhcp-options=hostname,clientid disabled=
no interface=sfp1-gateway
add comment=“default configuration” dhcp-options=hostname,clientid disabled=
no interface=WAN1
add dhcp-options=hostname,clientid disabled=no interface=WAN2
/ip dhcp-server network
add address=192.168.1.0/24 comment=“default configuration” dns-server=
192.168.1.1 gateway=192.168.1.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 name=router
/ip firewall filter
add chain=input comment=“default configuration” protocol=icmp
add chain=input comment=“default configuration” connection-state=established
add chain=input comment=“default configuration” connection-state=related
add action=drop chain=input comment=“default configuration” in-interface=
sfp1-gateway
add action=drop chain=input comment=“default configuration” in-interface=WAN1
/ip firewall mangle
add action=mark-connection chain=input in-interface=WAN1 new-connection-mark=
WAN1_conn
add action=mark-connection chain=input in-interface=WAN2 new-connection-mark=
WAN2_conn
add action=mark-routing chain=output connection-mark=WAN1_conn
new-routing-mark=to_WAN1
add action=mark-routing chain=output connection-mark=WAN2_conn
new-routing-mark=to_WAN2
add chain=prerouting dst-address=188.183.116.104/30 in-interface=WAN-OUT
add chain=prerouting dst-address=62.66.128.16/30 in-interface=WAN-OUT
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=WAN-OUT new-connection-mark=WAN1_conn
per-connection-classifier=both-addresses-and-ports:2/0
add action=mark-connection chain=prerouting dst-address-type=!local
in-interface=WAN-OUT new-connection-mark=WAN2_conn
per-connection-classifier=both-addresses-and-ports:2/1
add action=mark-routing chain=prerouting connection-mark=WAN1_conn
in-interface=WAN-OUT new-routing-mark=to_WAN1
add action=mark-routing chain=prerouting connection-mark=WAN2_conn
in-interface=WAN-OUT new-routing-mark=to_WAN2
/ip firewall nat
add action=masquerade chain=srcnat comment=“default configuration”
out-interface=sfp1-gateway
add action=masquerade chain=srcnat comment=“default configuration”
out-interface=WAN1 to-addresses=0.0.0.0
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
/ip route
add check-gateway=ping distance=1 gateway=188.183.116.106 routing-mark=
to_WAN1
add check-gateway=ping distance=1 gateway=62.66.128.18 routing-mark=to_WAN2
add check-gateway=ping distance=1 gateway=188.183.116.106
add check-gateway=ping distance=2 gateway=62.66.128.18