Hi ZeroByte,
I posted this question and your answer helpded, but becuase I used PPPoE it became confusing. So I have got it working.
However I cant PPTP in myself for VPN dial in, nor can I create a inbound rule to a internal webserver. Yet my rules on other Mikrotiks for inbound (that are not mangle WAN) work fine. So as you said must be to do with the Marking of WAN.
This is my config. is there anything you can see that is a problem.
# may/19/2016 15:18:00 by RouterOS 6.34.3
# software id = 4XTJ-IJDM
#
/interface ethernet
set [ find default-name=ether1 ] comment=WAN1
set [ find default-name=ether2 ] comment=WAN2
set [ find default-name=ether5 ] comment="LAN" speed=\
1Gbps
/interface pppoe-client
add comment="FTCC WAN1 " disabled=no interface=ether1 name=\
pppoe-out1 password=xxxxxxx user=
username1@isp.com
add comment="FTCC WAN2 " disabled=no interface=ether2 \
max-mru=1480 max-mtu=1480 mrru=1600 name=pppoe-out2 password=xxxxxx \
user=
username2@isp.com
/ip neighbor discovery
set ether1 comment=WAN1
set ether2 comment=WAN2
set ether5 comment="LAN"
set pppoe-out1 comment="WAN1 "
set pppoe-out2 comment="WAN2"
/ip dhcp-server option
add code=15 name="Domain Name" value="'mylan.local'"
/ip pool
add name=dhcp_pool1 ranges=192.168.88.2-192.168.88.252
add name=pptp-pool ranges=192.168.10.10-192.168.10.20
/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no interface=ether5 lease-time=1m name=\
dhcp1
/ppp profile
add local-address=pptp-pool name=pptp-profile remote-address=pptp-pool
/ip address
add address=192.168.88.1/24 interface=ether5 network=192.168.88.0
/ip dhcp-server network
add address=192.168.88.0/24 dns-server=208.67.222.222,208.67.220.220 gateway=\
192.168.88.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4
/ip dns static
add address=192.168.88.254 name=controller.local
/ip firewall filter
add chain=input comment="Dial In PPTP" dst-port=1723 protocol=tcp
add chain=input protocol=gre
add chain=input comment="WinBox In" dst-port=8291 protocol=tcp
add chain=input comment="Accept established connections" connection-state=\
established
add chain=input comment="Accept related connections" connection-state=related
add chain=input comment=UDP protocol=udp
add chain=input comment="From our LAN" in-interface=ether5 src-address=\
192.168.88.0/24
add action=log chain=input comment="Log everything else" log-prefix=\
"DROP INPUT"
add action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage3
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 \
protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 \
address-list-timeout=1m chain=input connection-state=new dst-port=22 \
protocol=tcp
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="Port scanners to list " \
protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP FIN Stealth scan" \
protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/FIN scan" protocol=tcp \
tcp-flags=fin,syn
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="SYN/RST scan" protocol=tcp \
tcp-flags=syn,rst
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="FIN/PSH/URG scan" protocol=\
tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="ALL/ALL scan" protocol=tcp \
tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list="port scanners" \
address-list-timeout=2w chain=input comment="NMAP NULL scan" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment="dropping port scanners" \
src-address-list="port scanners"
add action=drop chain=input comment="Drop invalid connections" \
connection-state=invalid
add action=drop chain=input comment="Drop excess pings" protocol=icmp
add chain=forward comment="Allow Only Certain Ports Out on Public WIfi LAN " \
dst-address=208.67.222.222 dst-port=53 protocol=tcp src-address=\
192.168.88.0/24
add chain=forward dst-address=208.67.222.222 dst-port=53 protocol=udp \
src-address=192.168.88.0/24
add chain=forward dst-address=208.67.220.220 dst-port=53 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=208.67.220.220 dst-port=53 protocol=udp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=80 protocol=tcp src-address=\
192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=8041 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=8040 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=443 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=8090 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 dst-port=8291 protocol=tcp \
src-address=192.168.88.0/24
add chain=forward dst-address=0.0.0.0/0 protocol=icmp src-address=\
192.168.88.0/24
add action=drop chain=forward dst-address=0.0.0.0/0 src-address=\
192.168.88.0/24
add action=drop chain=input comment="Drop everything else"
/ip firewall mangle
add chain=prerouting dst-address=192.168.88.0/24 in-interface=ether5
add action=mark-connection chain=input connection-mark=no-mark in-interface=\
pppoe-out1 new-connection-mark=WAN1 passthrough=no
add action=mark-connection chain=input connection-mark=no-mark in-interface=\
pppoe-out2 new-connection-mark=WAN2 passthrough=no
add action=mark-routing chain=output connection-mark=WAN1 new-routing-mark=\
WAN1 out-interface=pppoe-out1 passthrough=no
add action=mark-routing chain=output connection-mark=WAN2 new-routing-mark=\
WAN2 out-interface=pppoe-out2 passthrough=no
add action=mark-connection chain=prerouting connection-mark=no-mark \
dst-address-type=!local in-interface=ether5 new-connection-mark=WAN1 \
per-connection-classifier=both-addresses:2/0
add action=mark-connection chain=prerouting connection-mark=no-mark \
dst-address-type=!local in-interface=ether5 new-connection-mark=WAN2 \
per-connection-classifier=both-addresses:2/1
add action=mark-routing chain=prerouting connection-mark=WAN1 in-interface=\
ether5 new-routing-mark=WAN1 passthrough=no
add action=mark-routing chain=prerouting connection-mark=WAN2 in-interface=\
ether5 new-routing-mark=WAN2 passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat src-address=192.168.88.0/24
add action=masquerade chain=src-nat out-interface=pppoe-out1
add action=masquerade chain=src-nat out-interface=pppoe-out2
add action=dst-nat chain=dstnat dst-address=12.12.12.100 dst-port=8443 \
protocol=tcp src-port=8443 to-addresses=192.168.88.254
/ip route
add distance=1 gateway=pppoe-out1 routing-mark=WAN1
add distance=1 gateway=pppoe-out2 routing-mark=WAN2
add distance=1 gateway=pppoe-out1
add distance=2 gateway=pppoe-out2
/ppp secret
add name=mickeymouse password=minniemouse profile=pptp-profile
/system clock
set time-zone-name=Europe/London
/system routerboard settings
set protected-routerboot=disabled
Thanks for your help
Richard