Newbie here.
I have Mikrotik hap ac2 with the latest version of Router OS ( version: 6.43.8 ).
I have an ADSL connection as primary and LTE connection via Android Tethering as secondary. I route both ADSL and LTE via Mikrotik. I want to use Mikrotik router for failover. Manual failover is okay for me, and it works too. I have an issue with the (manual) failover.
As a first step, I linked ADSL connection to Mikrotik's Ethernet 1 port and used Webfig->Quickset for the initial configuration.
Then, I connected Android phone via USB tethering, created firewall NAT rule (chain=srcnat action=masquerade out-interface=lte1 log=no log-prefix="").
Modified DHCP clients to never "Add Default Route", so that I can add routes manually.
Deleted existing routes at IP => Route and created them manually. Now, I can switch between both internet connections manually. I can see my public IP has changed whenever I change the route (aka internet connection from ADSL to LTE or vice versa).
The issue is when I switch between ADSL to LTE, all existing connections (for example, ping to 1.1.1.1) that originated from ADSL doesn't switch to LTE automatically (ping command shows timeout). Similarly, when switch from LTE to ADSL, all existing connections that originated from LTE doesn't switch to ADSL automatically. For example, I had to restart the browser in order to use the newer internet connection.
Please know that the same ping command, if I issue from within Mikrotik router (/ping 1.1.1.1), the ping keeps going when I switch the routes. I hope you all can understand what I am trying to say or do.
Here's output of /export hide-sensitive compact
Code: Select all
# feb/01/2019 10:27:19 by RouterOS 6.43.8
# software id = KBW2-46HF
#
# model = RBD52G-5HacD2HnD
# serial number = xxxx
/interface bridge
add admin-mac=xxxx auto-mac=no comment=defconf name=bridge
/interface lte
set [ find ] mac-address=xxxx name=lte1
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX disabled=no distance=indoors frequency=auto mode=ap-bridge ssid=MikroTik-20C6B3 wireless-protocol=\
802.11
set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=20/40/80mhz-XXXX country=india disabled=no distance=indoors frequency=auto mode=ap-bridge ssid=MikroTik-20C6B4 \
wireless-protocol=802.11
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=ether2 network=192.168.88.0
/ip dhcp-client
add add-default-route=no comment=defconf dhcp-options=hostname,clientid disabled=no interface=ether1
add add-default-route=no dhcp-options=clientid,hostname disabled=no interface=lte1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat out-interface=lte1
/ip route
add distance=1 gateway=192.168.75.1
add distance=2 gateway=192.168.42.129
/system clock
set time-zone-name=Asia/Kolkata
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
What did I miss to do for a smooth failover of internet connection on my PC?