Skip to content

Instantly share code, notes, and snippets.

@ramiil
Created February 24, 2020 04:39
Show Gist options
  • Save ramiil/9343fee3a436d4085ace3185c8fbffb0 to your computer and use it in GitHub Desktop.
Save ramiil/9343fee3a436d4085ace3185c8fbffb0 to your computer and use it in GitHub Desktop.
mikrotik pcc 2 isp config
/interface bridge
add name=GUEST protocol-mode=none
add name=LAN protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] name=ISP1-NLS
set [ find default-name=ether2 ] name=ISP2-BLN
/ip pool
add name=dhcp_pool0 ranges=10.202.100.51-10.202.100.249
add name=guest_pool0 ranges=192.168.1.100-192.168.1.200
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=LAN name=dhcp1
add add-arp=yes address-pool=guest_pool0 disabled=no interface=GUEST name=server1
/queue simple
add max-limit=65M/65M name=Common target=10.202.102.0/24
add burst-time=1s/1s max-limit=10M/10M name=Guest target=192.168.1.0/24
/interface bridge port
add bridge=LAN interface=ether3
add bridge=LAN interface=ether4
add bridge=LAN interface=ether5
add bridge=LAN interface=ether6
add bridge=LAN interface=ether7
add bridge=LAN interface=ether8
add bridge=LAN interface=ether9
add bridge=LAN interface=ether10
/ip address
add address=45.*.*.*/24 interface=ISP1-NLS network=45.*.*.0
add address=85.*.*.*/19 interface=ISP2-BLN network=85.*.*.0
add address=10.202.100.1/24 interface=LAN network=10.202.100.0
add address=192.168.1.1/24 interface=GUEST network=192.168.1.0
/ip dhcp-server network
add address=10.202.100.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=10.202.100.1
add address=192.168.1.0/24 dns-server=8.8.8.8 gateway=192.168.1.1
/ip firewall mangle
add action=mark-connection chain=input in-interface=ISP1-NLS new-connection-mark=cin_ISP1
add action=mark-connection chain=input in-interface=ISP2-BLN new-connection-mark=cin_ISP2
add action=mark-routing chain=output connection-mark=cin_ISP1 new-routing-mark=rout_ISP1 passthrough=no
add action=mark-routing chain=output connection-mark=cin_ISP2 new-routing-mark=rout_ISP2 passthrough=no
add action=mark-routing chain=prerouting new-routing-mark=lan_out_ISP1 passthrough=yes per-connection-classifier=src-address:2/1 src-address=10.202.100.0/24
add action=mark-routing chain=prerouting new-routing-mark=lan_out_ISP2 passthrough=yes per-connection-classifier=src-address:2/0 src-address=10.202.100.0/24
add action=mark-routing chain=prerouting new-routing-mark=lan_out_ISP1 passthrough=yes per-connection-classifier=src-address:2/1 src-address=192.168.1.0/24
add action=mark-routing chain=prerouting new-routing-mark=lan_out_ISP2 passthrough=yes per-connection-classifier=src-address:2/0 src-address=192.168.1.0/24
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ISP1-NLS
add action=masquerade chain=srcnat out-interface=ISP2-BLN
/ip route
add check-gateway=ping distance=2 gateway=45.8.116.1 routing-mark=rout_ISP1
add distance=4 gateway=85.*.*.161 routing-mark=rout_ISP1
add check-gateway=ping distance=2 gateway=85.*.*.161 routing-mark=rout_ISP2
add distance=4 gateway=45.*.*.1 routing-mark=rout_ISP2
add check-gateway=ping distance=2 gateway=45.*.*.1 routing-mark=lan_out_ISP1
add distance=4 gateway=85.*.*.161 routing-mark=lan_out_ISP1
add check-gateway=ping distance=2 gateway=85.*.*.161 routing-mark=lan_out_ISP2
add distance=4 gateway=45.*.*.1 routing-mark=lan_out_ISP2
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment