You have been given examples, what doesnt work?
dear Anav,
when isp1 is down still i cannot get internet from isp2
below is my config
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,8.8.8.8
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall address-list
add address=192.168.70.0/24 list=LAN_USERS
add address=192.168.10.0/24 list=LAN_USERS
add address=192.168.1.0/24 list=LAN_USERS
add address=192.168.20.0/24 list=LAN_USERS
add address=192.168.30.0/24 list=LAN_USERS
add address=192.168.40.0/24 list=LAN_USERS
add address=192.168.88.0/24 list=LAN_USERS
add address=192.168.80.0/24 list=LAN_USERS
add address=192.168.210.0/24 list=WAN_LIST
add address=196.x.x.x/30 list=WAN_LIST
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall mangle
add action=accept chain=prerouting dst-address=196.x.x.x/30 src-address-list=LAN_USERS
add action=accept chain=prerouting dst-address=192.x.x.0/24 src-address-list=LAN_USERS
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface=ether1-WAN1
add action=masquerade chain=srcnat out-interface=ether2-WAN2
/ip route
add check-gateway=ping comment="B1 - Recursive Routing, check ping 1.1.1.1 instead of PrimaryISP" distance=5 gateway=1.1.1.1
add check-gateway=ping comment="B2 - Recursive Routing check ping 9.9.9.9 instead of PrimaryISP" distance=10 gateway=9.9.9.9
add comment="C - ISP2 is alternative Gateway" distance=20 gateway=192.168.210.1
add comment="A1- 1.1.1.1 must be reachable only from PrimaryISP" distance=5 dst-address=1.1.1.1/32 gateway=196.x.x.x scope=10
add comment="A2- 9.9.9.9 must be reachable only from PrimaryISP" distance=10 dst-address=9.9.9.9/32 gateway=196.x.x.x scope=10