/ip firewall filter
add action=drop chain=input comment="Drop invalid connections" connection-state=invalid disabled=no
add action=drop chain=customer comment="" disabled=no packet-mark=deny_sitespacket
add action=accept chain=input comment="Allow esatblished connections" connection-state=established disabled=no
add action=accept chain=input comment="Allow related connections" connection-state=related disabled=no
add action=accept chain=input comment="Allow UDP" disabled=no protocol=udp
add action=accept chain=input comment="Allow ICMP" disabled=no protocol=icmp
add action=accept chain=forward comment="" disabled=no dst-port=4444 protocol=tcp
add action=accept chain=input comment="Allow connection to router from local network" disabled=no in-interface=!Optica
add action=drop chain=input comment="Drop everything else" disabled=no
add action=jump chain=forward comment="" disabled=no in-interface=Optica jump-target=customer
add action=drop chain=customer comment="Drop invalid connection packets" connection-state=invalid disabled=no
add action=accept chain=customer comment="Allow established connections" connection-state=established disabled=no
add action=accept chain=customer comment="Allow related connections" connection-state=related disabled=no
add action=log chain=customer comment="Log dropped connections" disabled=no log-prefix=customer_drop
add action=drop chain=customer comment="Drop and log everything else" disabled=no
/ip firewall nat
add action=masquerade chain=srcnat comment="" disabled=no out-interface=Optica
add action=dst-nat chain=dstnat comment="" disabled=no dst-address=92.39.50.3 dst-port=4444 protocol=tcp to-addresses=192.168.1.1 to-ports=\
4444
а на 4444 не пускает

Можно закрыть глаза и не захотеть ничего увидеть, но это будет обманом, точнее самообманом, который только отдалит момент истины, но не изменит её и не уничтожит.