/ip firewall nat
add action=masquerade chain=srcnat comment=testcisco dst-address-list=cisco_remote_address_list out-interface=ether1 src-address=
10.0.0.38add action=masquerade chain=srcnat comment=
192.168.131.0/25 ipsec-policy=out,none out-interface=vlan10 src-address=
192.168.131.0/25add action=masquerade chain=srcnat comment="171.71.0.0/24 free" ipsec-policy=out,none out-interface=vlan10 src-address=171.71.0.0/24
add action=masquerade chain=srcnat comment=
10.0.0.0/24 ipsec-policy=out,none out-interface=vlan10 src-address=
10.0.0.0/24add action=dst-nat chain=dstnat comment=web disabled=yes dst-port=3389 in-interface=vlan10 protocol=tcp src-address=
134.249.117.159 src-address-list=winbox_telnet to-addresses=
10.0.0.71 to-ports=3389
add action=dst-nat chain=dstnat dst-address=
185.46.220.25 dst-port=3389 in-interface=vlan10 protocol=tcp src-address=
134.249.117.159 to-addresses=
192.168.131.38 to-ports=3389
add action=dst-nat chain=dstnat comment=ssh dst-address=
185.46.220.25 dst-port=22 in-interface=vlan10 protocol=tcp src-address=
134.249.117.159 to-addresses=
192.168.131.38 to-ports=22
add action=masquerade chain=srcnat out-interface=ARKADAX_NAT src-address-list=pppoe_route