I’m glad it works for you.
A few remarks on config you posted above:
-
set [ find default=yes ] authentication-types=> wpa-psk,> wpa2-psk group-ciphers=\
tkip,> aes-ccm mode=dynamic-keys supplicant-identity=MikroTik
unicast-ciphers=> tkip,> aes-ccm
Nowdays it’s hardly necessary to support WPA authentication. Same goes for TKIP cyphering.
add interface=wlan1 list=WAN
add > interface=bridge > list=LAN
add list=LAN
/ip address
add address=192.168.88.1/24 network=192.168.88.0
add address=172.31.92.9/24 interface=ether1 network=172.31.92.0
Addressing in general is a mess in posted config. 192.168.88.1/24 above is hanging in thin air (no interface associated, if thst should be your LAN, set interface=bridge) while 172.31.92.9/24 is set on slave port (of bridge) which is not correct either. After you decide about which subnet address is a keeper, remove the surplus network definition in /ip dhcp-server network .
add action=src-nat chain=srcnat out-interface-list=WAN to-addresses=
172.31.92.1
add action=masquerade chain=srcnat out-interface-list=WAN
The first rule will do the work. However, the address it’s using as new src-address, is not defined elsewhere in configuration and chances are it’s wrong (or can become wrong if upstream DHCP server serves another lease). In your use case (dynamic WAN address) it’s better to use the second rule, to make it active you have to remove the first one.
Overall your router is not secured at all. So if you can’t trust both LAN and “WAN” devices not to try to play tricks on your router, you should configure some firewall filter rules. Default filter rule set would be a very good starting point since you fixed the interface list membership.
As precaution, before doing any other configuration changes, backup your current config so you can go back if reconfiguration fails big time. When doing changes, enter safe mode, apply change and if it’s OK, exit safe mode. If change breaks your management connection while safe mode is active, ROS will automatically revert changes made while in safe mode. It is important to exit safe mode before manually closing management session (log-out).