I configured PCC as per http://wiki.mikrotik.com/wiki/Manual:PCC and this is working fine.
Incoming connections from either WAN interface are marked correctly. The router adress is 10.10.2.253, WAN Uplinks are 10.10.1.1 (ether1-gateway) and 10.10.2.1 (ether5-gateway) and the VPN Server is 10.10.10.1.
When i try to establish a VPN connection via WAN2 (ether5-gateway), the connection is marked with WAN2_conn (but the answer back from the VPN server goes out to ether1-gateway. I have hidden the external IP from the VPN Client:
https://www.dropbox.com/s/yb1yvztjg54cu ... 1.jpg?dl=0
Firewall Connections
The same connection via WAN1 runs perfect.
My config is below:
Code: Select all
[admin@MikroTik RB3011] > /ip firewall mangle print
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=prerouting
1 D ;;; special dummy rule to show fasttrack counters
chain=forward
2 D ;;; special dummy rule to show fasttrack counters
chain=postrouting
3 XI chain=prerouting action=mark-connection new-connection-mark=no-mark passthrough=yes connection-state=new log=no log-prefix=""
4 chain=prerouting action=accept dst-address=10.10.1.0/24 in-interface=LAG1 log=no log-prefix=""
5 chain=prerouting action=accept dst-address=10.10.2.0/24 in-interface=LAG1 log=no log-prefix=""
6 chain=prerouting action=mark-connection new-connection-mark=WAN1_conn passthrough=yes in-interface=ether1-gateway connection-mark=no-mark log=no log-prefix=""
7 chain=prerouting action=mark-connection new-connection-mark=WAN2_conn passthrough=yes in-interface=ether5-gateway connection-mark=no-mark log=no log-prefix=""
8 chain=prerouting action=mark-connection new-connection-mark=WAN1_conn passthrough=yes dst-address-type=!local in-interface=LAG1 connection-mark=no-mark per-connection-classifier=both-addresses:2/0 log=no log-prefix=""
9 chain=prerouting action=mark-connection new-connection-mark=WAN2_conn passthrough=yes dst-address-type=!local in-interface=LAG1 connection-mark=no-mark per-connection-classifier=both-addresses:2/1 log=no log-prefix=""
10 ;;; Mark Connection to dnsomatic for WAN_2
chain=prerouting action=mark-connection new-connection-mark=WAN2_conn passthrough=yes dst-address-type=!local dst-address-list=host_dnsomatic log=no log-prefix=""
11 chain=prerouting action=mark-routing new-routing-mark=to_WAN1 passthrough=yes in-interface=LAG1 connection-mark=WAN1_conn log=no log-prefix=""
12 chain=prerouting action=mark-routing new-routing-mark=to_WAN2 passthrough=yes in-interface=LAG1 connection-mark=WAN2_conn log=no log-prefix=""
13 chain=output action=mark-routing new-routing-mark=to_WAN1 passthrough=yes connection-mark=WAN1_conn log=no log-prefix=""
14 chain=output action=mark-routing new-routing-mark=to_WAN2 passthrough=yes connection-mark=WAN2_conn log=no log-prefix=""
Code: Select all
[admin@MikroTik RB3011] > /ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface=ether1-gateway log=no log-prefix=""
1 chain=srcnat action=masquerade out-interface=ether5-gateway log=no log-prefix=""
2 chain=dstnat action=dst-nat to-addresses=10.10.10.1 protocol=udp in-interface=ether1-gateway dst-port=500,4500 log=no log-prefix=""
3 chain=dstnat action=dst-nat to-addresses=10.10.10.1 protocol=ipsec-esp in-interface=ether1-gateway log=no log-prefix=""
4 chain=dstnat action=dst-nat to-addresses=10.10.10.1 protocol=udp in-interface=ether5-gateway dst-port=500,4500 log=no log-prefix=""
5 chain=dstnat action=dst-nat to-addresses=10.10.10.1 protocol=ipsec-esp in-interface=ether5-gateway log=no log-prefix=""
Code: Select all
[admin@MikroTik RB3011] > /ip route print detail
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
0 A S dst-address=0.0.0.0/0 gateway=10.10.1.1 gateway-status=10.10.1.1 reachable via ether1-gateway check-gateway=ping distance=1 scope=30 target-scope=10 routing-mark=to_WAN1
1 A S dst-address=0.0.0.0/0 gateway=10.10.2.1 gateway-status=10.10.2.1 reachable via ether5-gateway check-gateway=ping distance=1 scope=30 target-scope=10 routing-mark=to_WAN2
2 A S dst-address=0.0.0.0/0 gateway=10.10.1.1 gateway-status=10.10.1.1 reachable via ether1-gateway check-gateway=ping distance=1 scope=30 target-scope=10
3 S dst-address=0.0.0.0/0 gateway=10.10.2.1 gateway-status=10.10.2.1 reachable via ether5-gateway check-gateway=ping distance=2 scope=30 target-scope=10
Many thanks in advance.