Sorry, I've had a busy week that took me out of town for awhile.
Here is the relevant configuration information from the routers. I've omitted some information that is not pertinent to this particular issue for the sake of clarity.
House (main) router
------------------------
/ip address print
# ADDRESS NETWORK INTERFACE
0 ;;; WISP Antennas
10.10.0.1/24 10.10.0.0 bridgeWISP
2 ;;; Company Network
10.20.0.1/24 10.20.0.0 bridgeCompany
4 ;;; VSAT
10.2.8.18/29 10.2.8.16 ether1-VSAT
ip route print
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 10.2.8.17 10
1 ADC 10.2.8.16/29 10.2.8.18 ether1-VSAT 0
2 ADC 10.10.0.0/24 10.10.0.1 bridgeWISP 0
5 ADC 10.20.0.0/24 10.20.0.1 bridgeCompany 0
interface print
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE MTU L2MTU MAX-L2MTU
2 R ;;; AP 11 Southeast
ether7-Southeast ether 1500 1600 4080
3 ether8 ether 1500 1600 4080
4 R ;;; AP 10 North
ether6-North ether 1500 1600 4080
5 R ;;; Servers
ether5-Servers ether 1500 1598 4078
9 R ;;; VSAT (WAN)
ether1-VSAT ether 1500 1598 4078
10 R ;;; WISP
bridgeWISP bridge 1500 1598
11 R ;;; Company bridge
bridgeCompany bridge 1500 1594
12 R ;;; Company VLAN
vlan100-bridgeWISP vlan 1500 1594
interface bridge port print
Flags: X - disabled, I - inactive, D - dynamic
# INTERFACE BRIDGE PRIORITY PATH-COST HORIZON
1 ether7-Southeast bridgeWISP 0x80 10 none
2 ether6-North bridgeWISP 0x80 10 none
3 ether5-Servers bridgeCompany 0x80 10 none
4 vlan100-bridgeWISP bridgeCompany 0x80 10 none
ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Masquerade WAN traffic
chain=srcnat action=masquerade out-interface=ether1-VSAT
Office router
======================
ip address print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK INTERFACE
0 ;;; Guest Network
10.0.0.1/24 10.0.0.0 wlan2
1 ;;; WISP
10.10.0.80/24 10.10.0.0 ether1-Ant
interface print
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE MTU L2MTU MAX-L2MTU
0 R ether1-Ant ether 1500 1600 4076
5 RS wlan1 wlan 1500 2290
6 S wlan2 wlan 1500 2290
8 R bridgeCompany bridge 1500 1596
9 RS ether1-Ant-VLAN100 vlan 1500 1596
interface bridge port print
Flags: X - disabled, I - inactive, D - dynamic
# INTERFACE BRIDGE PRIORITY PATH-COST HORIZON
0 ether5 bridgeCompany 0x80 10 none
1 ether2 bridgeCompany 0x80 10 none
2 I ether3 bridgeCompany 0x80 10 none
3 I ether4 bridgeCompany 0x80 10 none
4 wlan1 bridgeCompany 0x80 10 none
5 ether1-Ant-VLAN100 bridgeCompany 0x80 10 none
ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=ether1-Ant
All traffic out the WAN interface (ether1-VSAT) on the house router masquerades properly, except that from clients in the 10.20.0.0/24 network connected over the VLAN from the office.
I even tried adding this dstnat rule on the house router specifically for the IP address of test computer at the office, but it caught no traffic. Running torch on ether1 still showed traffic from the src address of 10.20.0.99.
0 chain=srcnat action=masquerade src-address=10.20.0.99
out-interface=ether1-VSAT
Likewise, I tried this rule rule specifically for one source and destination IP, and still it caught nothing when I tried pinging 8.8.8.8:
0 chain=srcnat action=masquerade src-address=10.20.0.99 dst-address=8.8.8.8
Any other suggestions why VLAN traffic might not be masquerading? We are going to try a different router this afternoon or tomorrow, and the latest RouterOS.