Now I'm confused about your network topology. I'll assume this one:
cable modem (internet gateway, NAT) <-+-> mikrotik (for VPN)
(NAT, basic firewall,...) ^
\-> host for other things
.
There are two things:
- device as VPN end point (mikrotik), you need to NAT one (or more in case of port knocking) port from cable modem to mikrotik
- host for other things, which might need NATed ports or not, depending on intended availability from the internet. E.g. bitcoin miner probably doesn't need port forwarded as NAT does it dynamically for LAN clients connecting WAN servers.
.
You might actually want to reconfigure cable modem into bridge mode and use mikrotik as router, firewall, ...
cable modem <---> mikrotik <--> LAN
(bridge mode) ^
\--> host for other things
.
In this case, you'd configure all NAT and port forwarding on mikrotik. Using fine firewall rules (default is fine, you need to add only a few rules to allow certain connections otherwise forbidden) the whole setup can still be secure enough.
In both cases you can decide whether the "host for other things" is actually part of your LAN or separate (kind of DMZ) ... in first scenario you can put LAN either behind mikrotik or parallel to it (but it's highly probable that cable modem lacks lots of routing/firewall capability present in ROS), in second scenario you can decide to have two LAN segments, one for DMZ and one for the rest of LAN (it is just a matter of proper configuration).