routing with same external subnet on two interfaces

Shortly,
ROS 7.14

I’ve x.x.254.32/29 subnet from ISP
x.x.254.33 is a gateway on ISP side
x.x.254.34 - Public Manage for MKT1
x.x.254.35 - Public Manage for MKT2
x.x.254.36 - VRRP-Public


two Mikrotik routers
with VRRP on WAN and internal GW interfaces.

VRRP-Public will float between two Mikrotiks and used as VPN gateway.
VRRP-AD will between two Mikrotiks and used as internal gateway.

Issue is asymetric routing from internal network to public internet via VRRP-Public interface.

Any idea how i can fix this?
configuration example below



/interface ethernet
set [ find default-name=ether2 ] disable-running-check=no mtu=1400 name=LAN-AD-4001
set [ find default-name=ether1 ] disable-running-check=no mtu=1400 name=Public-4000
set [ find default-name=ether6 ] disable-running-check=no mtu=1400 name=PublicManage


/interface vrrp
add group-authority=self interface=Public-4000 mtu=1400 name=VRRP-Public vrid=0
add group-authority=VRRP-Public interface=LAN-AD-4001 mtu=1400 name=VRRP-AD


/routing table
add disabled=no fib name=PublicManage-Table
add disabled=no fib name=VRRP-Public-Table
/ip address
add address=x.x.254.34/29 interface=PublicManage network=x.x.254.32
add address=x.x.254.36/29 interface=VRRP-Public network=x.x.254.32
add address=10.10.11.1/24 interface=VRRP-AD network=10.10.11.0
add address=10.10.11.3/24 interface=LAN-AD-4001 network=10.10.11.0
add address=10.10.100.2/30 interface=Public-4000 network=10.10.100.0



/ip firewall mangle
add action=mark-connection chain=input connection-mark=no-mark in-interface=PublicManage new-connection-mark=PublicManage-mark passthrough=yes
add action=mark-routing chain=output connection-mark=PublicManage-mark new-routing-mark=PublicManage-Table passthrough=yes
add action=mark-connection chain=input connection-mark=no-mark in-interface=VRRP-Public new-connection-mark=VRRP-Public-Mark passthrough=yes
add action=mark-routing chain=output connection-mark=VRRP-Public-Mark new-routing-mark=VRRP-Public-Table passthrough=yes

/ip firewall nat
add action=src-nat chain=srcnat out-interface=VRRP-Public src-address-list=InternalNetworks to-addresses=x.x.254.36

/ip route
add disabled=no distance=1 dst-address=0.0.0.0/0 gateway=x.x.254.33 pref-src="" routing-table=main scope=30 suppress-hw-offload=no target-scope=10
add disabled=no dst-address=0.0.0.0/0 gateway=x.x.254.33%PublicManage routing-table=PublicManage-Table suppress-hw-offload=no
add disabled=no dst-address=0.0.0.0/0 gateway=x.x.254.33%VRRP-Public routing-table=VRRP-Public-Table suppress-hw-offload=no