Thnks for the answer.
below is my confuguration
[admin@xxxxx] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=input action=accept protocol=tcp dst-port=80
1 X ;;; default configuration
chain=input action=accept protocol=icmp
2 X ;;; default configuration
chain=input action=accept connection-state=established
3 X ;;; default configuration
chain=input action=accept connection-state=related
4 X ;;; default configuration
chain=input action=drop in-interface=Local
5 X chain=input action=accept protocol=tcp in-interface=WAN1
6 X chain=input action=accept protocol=tcp in-interface=WAN1 dst-port=80
7 X chain=input action=accept protocol=tcp in-interface=WAN2 dst-port=80
[admin@xxxxx] /ip firewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; default configuration
chain=srcnat action=masquerade out-interface=Local
1 chain=srcnat action=masquerade out-interface=WAN1
2 chain=srcnat action=masquerade out-interface=WAN2
3 X chain=srcnat action=masquerade src-address-list=Allowed-Internet out-interface=WAN1
4 X chain=srcnat action=masquerade src-address-list=Allowed-Internet out-interface=WAN2
5 chain=dstnat action=dst-nat to-addresses=192.168.1.245 to-ports=80 protocol=tcp dst-address=192.168.3.2 dst-port=41245
[admin@xxxxxx] /ip firewall mangle> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=prerouting action=accept dst-address=192.168.2.0/24 in-interface=Local
1 chain=prerouting action=accept dst-address=192.168.3.0/24 in-interface=Local
2 chain=prerouting action=mark-connection new-connection-mark=WAN1_conn passthrough=yes in-interface=WAN1 connection-mark=no-mark
3 chain=prerouting action=mark-connection new-connection-mark=WAN2_conn passthrough=yes in-interface=WAN2 connection-mark=no-mark
4 chain=prerouting action=mark-connection new-connection-mark=WAN1_conn passthrough=yes dst-address-type=!local in-interface=Local connection-mark=no-mark per-connection-classifier=both-addresses:2/0
5 chain=prerouting action=mark-connection new-connection-mark=WAN2_conn passthrough=yes dst-address-type=!local in-interface=Local connection-mark=no-mark per-connection-classifier=both-addresses:2/1
6 chain=prerouting action=mark-routing new-routing-mark=to_WAN1 passthrough=yes in-interface=Local connection-mark=WAN1_conn
7 chain=prerouting action=mark-routing new-routing-mark=to_WAN2 passthrough=yes in-interface=Local connection-mark=WAN2_conn
8 chain=output action=mark-routing new-routing-mark=to_WAN1 passthrough=yes connection-mark=WAN1_conn
9 chain=output action=mark-routing new-routing-mark=to_WAN2 passthrough=yes connection-mark=WAN2_conn
10 X chain=input action=mark-connection new-connection-mark=from_WAN1 passthrough=yes in-interface=WAN1
11 X chain=input action=mark-connection new-connection-mark=from_WAN1 passthrough=yes in-interface=WAN2
If u notice, there is one nat rule(no. 5) that does forwards the port 41245 from 192.168.3.1 to an internal server, on it's 80 port. I mean that there is a port forward in the adsl modem-router that does forwards port 41245 from 192.168.3.1 to 192.168.3.2:41245(mikrotik's wan2 port). With the nat rule this packet goes from mikrotik to the internal server, changing the port from 41245 to 80. This works fine and i can access my server from outside.
But i still cannot access mikrotik's web interface from outside...
Do u see any wrong in my configuration?