OK here goes. I setup PCC with 2 internet connections.
wan1 is on ether1 with 72.24.205.34/24 as it's ip
wan2 is on ether2 with 216.161.237.204/29 as it's ip
lan is on ether5 with 172.16.5.12/22 as it's ip
PCC is working great but now I need to get to step 2. I have a server behind the firewall and I would like to dst-nat from each wan interface so that no matter which wan interface I come in from I can get to the server. So from a remote browser I should be able to browse to either ip and get to the server behind the firewall.
# ADDRESS NETWORK BROADCAST INTERFACE
0 172.16.5.12/22 172.16.4.0 172.16.7.255 ether5
1 216.161.237.204/29 216.161.237.200 216.161.237.207 ether2
2 D 72.24.205.34/24 72.24.205.0 72.24.205.255 ether1
/ip route
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=\
72.24.205.1 routing-mark=to_wan1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=\
216.161.237.206 routing-mark=to_wan2 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=1 dst-address=0.0.0.0/0 gateway=\
72.24.205.1 scope=30 target-scope=10
add check-gateway=ping disabled=no distance=2 dst-address=0.0.0.0/0 gateway=\
216.161.237.206 scope=30 target-scope=10
/ip firewall filter
add action=accept chain=input comment="" connection-state=established disabled=no
add action=accept chain=input comment="" connection-state=related disabled=no
add action=accept chain=forward comment="" connection-state=established disabled=no
add action=accept chain=forward comment="" connection-state=related disabled=no
add action=accept chain=output comment="" connection-state=established disabled=no
add action=accept chain=output comment="" connection-state=related disabled=no
add action=accept chain=input comment="" connection-state=new disabled=no icmp-options=8:0-255 limit=1,0 protocol=icmp
add action=accept chain=input comment="" connection-state=new disabled=no dst-port=22 limit=2/1m,0 protocol=tcp
add action=accept chain=input comment="" connection-state=new disabled=no dst-port=8291 limit=2/1m,0 protocol=tcp
add action=accept chain=forward comment="" disabled=no dst-address=172.16.5.4 dst-port=80 out-interface=ether5 protocol=\
tcp
add action=accept chain=forward comment="" connection-state=new disabled=no in-interface=ether5 src-address=\
172.16.4.0/22
add action=drop chain=input comment="" disabled=no
add action=drop chain=forward comment="" disabled=no
/ip firewall mangle
add action=mark-connection chain=input comment="" disabled=no in-interface=ether1 new-connection-mark=wan1_conn \
passthrough=yes
add action=mark-connection chain=input comment="" disabled=no in-interface=ether2 new-connection-mark=wan2_conn \
passthrough=yes
add action=mark-routing chain=output comment="" connection-mark=wan1_conn disabled=no new-routing-mark=to_wan1 \
passthrough=yes
add action=mark-routing chain=output comment="" connection-mark=wan2_conn disabled=no new-routing-mark=to_wan2 \
passthrough=yes
add action=accept chain=prerouting comment="" disabled=no dst-address=72.24.205.0/24 in-interface=ether5
add action=accept chain=prerouting comment="" disabled=no dst-address=216.161.237.200/29 in-interface=ether5
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local in-interface=ether5 \
new-connection-mark=wan1_conn passthrough=yes per-connection-classifier=both-addresses:2/0
add action=mark-connection chain=prerouting comment="" disabled=no dst-address-type=!local in-interface=ether5 \
new-connection-mark=wan2_conn passthrough=yes per-connection-classifier=both-addresses:2/1
add action=mark-routing chain=prerouting comment="" connection-mark=wan1_conn disabled=no in-interface=ether5 \
new-routing-mark=to_wan1 passthrough=yes
add action=mark-routing chain=prerouting comment="" connection-mark=wan2_conn disabled=no in-interface=ether5 \
new-routing-mark=to_wan2 passthrough=yes
/ip firewall nat
add action=dst-nat chain=dstnat comment="" disabled=no dst-port=80 in-interface=ether1 protocol=tcp to-addresses=\
172.16.5.4
add action=dst-nat chain=dstnat comment="" disabled=no dst-port=80 in-interface=ether2 protocol=tcp to-addresses=\
172.16.5.4
add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether1
add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether2
so here's what I got going on at the moment. When I try to hit the interfaces on from the web I get mixed results. Sometimes it loads and sometimes it doesn't.