(1) Why do you have this enabled?
/ip firewall connection tracking
set enabled=yes
(2) Im no ppp expert but what interface are you supposed to identify here… Okay just a bad choice of words.
I would never use the word LAN to identify an etherport because its used elsewhere on MT as standard terminology.
Suggest maybe ether1-LAN etc…
/interface pppoe-server server
add default-profile=“PPPoE on LAN” disabled=no interface**=LAN**
keepalive-timeout=disabled one-session-per-host=yes service-name=
PPPoE-Special
(3) I no ppp expert but why here is there a reference to two diff subnets??
/ppp profile
add local-address=192.168.20.1 name=“PPPoE on LAN” remote-address=
“PPPoE Pool”
set FFFFFFFE local-address=192.168*.89**.1 remote-address=“PPPoE Pool”
(4) I dont see Missing???
/ip dhcp-server for pppoe subnet???
It has an ip pool, ip address, ip dhcp-server network though!
I suspect this is done through the ppp interface.
(5) I would get rid of this static setting as it seems to have no purpose, not tied to any known subnet.
/ip dns static
add address=192.168.10.1 name=lan.com
(6) Lets look at the sparse firewall rules…can only assume you are behind another router…
I cannot even begin to comprehend what the heck you aim to accomplish with these rules, so will let you explain!!
As of right now would recommend two things
a. remove all the garbage below and then keep troubleshooting.
b. once you have success then put in a small but decent firewall set of rules close to default.
/ip firewall filter
add action=drop chain=forward connection-state=invalid
add action=drop chain=forward connection-nat-state=!dstnat connection-state=
new in-interface-list=“All WAN”
add action=accept chain=forward comment=“*dstNat Accept”
connection-nat-state=dstnat
add action=add-dst-to-address-list address-list=ABL address-list-timeout=3d
chain=forward comment=“Detect MyABL List” content=myabl
out-interface-list=“All WAN”
(7) It seems as if you have expectations of external users coming in and reaching your LAN correct ???
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=“All WAN”
add action=dst-nat chain=dstnat comment=“"""Port Fwd for AC68u"""""”
dst-port=11945 in-interface-list=“All WAN” protocol=udp to-addresses=
192.168.15.2 to-ports=11945
Any expectations of internal users using the Server? and if so how, ( by dyndns name or the more direct LANIP ? )
(8) Looking at mangle rules. Lets look at what is required conceptually.
A. Have to ensure any users coming in externally for mainly the internal server, on any WAN, go back out the same WAN.
This rule has two purposes, to mark incoming traffic headed toward a server etc, or to the router itself!
add action=mark-connection chain=prerouting connection-mark=no-mark
in-interface=WAN2 new-connection-mark=WAN2_conn passthrough=yes
add action=mark-connection chain=prerouting connection-mark=“” in-interface=
WAN3 new-connection-mark=WAN3_conn passthrough=yes
add action=mark-connection chain=prerouting connection-mark=no-mark
in-interface=WAN4 new-connection-mark=WAN4_conn passthrough=yes
B. Next we have to ensure all users originating traffic heading for the WANs are both connection marked and PCCd. Since we have the standard LAN and anther ppp subnet to worry about (not really an interface) we need to use a firewall address list vice and interface list approach.
/ip firewall address list
add address=192.168.15.0/24 list=ALL-users
add address=192.168.20.0/24 list=ALL-users
And then the PCC rules.
add action=mark-connection chain=prerouting connection-mark=no-mark
dst-address-type=!local src-address-list=ALL-users new-connection-mark=
WAN2_conn passthrough=yes per-connection-classifier=
both-addresses-and-ports:4/0
add action=mark-connection chain=prerouting connection-mark=no-mark
dst-address-type=!local src-address-list=ALL-users new-connection-mark=
WAN3_conn passthrough=yes per-connection-classifier=
both-addresses-and-ports:4/1
add action=mark-connection chain=prerouting connection-mark=no-mark
dst-address-type=!local src-address-list=ALL-users new-connection-mark=
WAN3_conn passthrough=yes per-connection-classifier=
both-addresses-and-ports:4/2
add action=mark-connection chain=prerouting connection-mark=no-mark
dst-address-type=!local src-address-list=ALL-users new-connection-mark=
WAN4_conn passthrough=yes per-connection-classifier=
both-addresses-and-ports:4/3
C. Next, for the LAN and PPP traffic identified we want to associate that marked traffic withe the specific routes accordingly!!!
It is not totally necessary to include the LANSIDE members just for information.
add action=mark-routing chain=prerouting connection-mark=WAN2_conn
src-address-list=ALL-users new-routing-mark=to_WAN2 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN3_conn
src-address-list=ALL-users new-routing-mark=to_WAN3 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN4_conn
src-address-list=ALL-users new-routing-mark=to_WAN4 passthrough=yes
D. Lastly we want to ensure any traffic that was headed for the router itself through the WANs,
gets sent back out the same interface.
Note: Return traffic from the Router itself does not go through preouting and thus we must use output chain.
add action=mark-routing chain=output connection-mark=WAN3_conn
new-routing-mark=to_WAN3 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN4_conn
new-routing-mark=to_WAN4 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN2_conn
new-routing-mark=to_WAN2 passthrough=yes
E. I do not believe these mangle rules will serve any purpose on your config and can be removed! <---- I am wrong here, needed for OP to talk to modems!!
This ‘extra set of rules’ is typically used to reach modems or if other WANIPs in ones config, not noted are in play here!!
_/ip firewall mangle
add action=accept chain=prerouting dst-address=192.168.12.0/24
in-interface-list=LANs
add action=accept chain=prerouting dst-address=192.168.13.0/24
in-interface-list=LANs
add action=accept chain=prerouting dst-address=192.168.14.0/24
in-interface-list=LAN_s