IP Address:
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK BROADCAST INTERFACE
0 192.168.1.1/24 192.168.1.0 192.168.1.255 LAN1
1 192.168.2.1/24 192.168.2.0 192.168.2.255 LAN2
2 192.168.3.1/24 192.168.3.0 192.168.3.255 LAN3
3 192.168.4.1/24 192.168.4.0 192.168.4.255 LAN4
4 192.168.5.1/24 192.168.5.0 192.168.5.255 LAN5
5 192.168.6.1/24 192.168.6.0 192.168.6.255 LAN6
6 192.168.7.1/24 192.168.7.0 192.168.7.255 LAN7
7 192.168.8.1/24 192.168.8.0 192.168.8.255 LAN8
8 192.168.9.1/24 192.168.9.0 192.168.9.255 wlan1
9 D 172.31.255.226/16 172.31.0.0 172.31.255.255 WAN
Route:
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 172.31.0.1 0
1 ADC 172.31.0.0/16 172.31.255.226 WAN 0
2 ADC 192.168.1.0/24 192.168.1.1 LAN1 0
3 ADC 192.168.2.0/24 192.168.2.1 LAN2 0
4 ADC 192.168.3.0/24 192.168.3.1 LAN3 0
5 ADC 192.168.4.0/24 192.168.4.1 LAN4 0
6 ADC 192.168.5.0/24 192.168.5.1 LAN5 0
7 ADC 192.168.6.0/24 192.168.6.1 LAN6 0
8 ADC 192.168.7.0/24 192.168.7.1 LAN7 0
9 ADC 192.168.8.0/24 192.168.8.1 LAN8 0
10 ADC 192.168.9.0/24 192.168.9.1 wlan1 0
Firewall filter:
None
Firewall NAT:
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade src-address=192.168.1.0/24
1 chain=srcnat action=masquerade src-address=192.168.2.0/24
2 chain=srcnat action=masquerade src-address=192.168.3.0/24
3 chain=srcnat action=masquerade src-address=192.168.4.0/24
4 chain=srcnat action=masquerade src-address=192.168.5.0/24
5 chain=srcnat action=masquerade src-address=192.168.6.0/24
6 chain=srcnat action=masquerade src-address=192.168.7.0/24
7 chain=srcnat action=masquerade src-address=192.168.8.0/24
8 chain=srcnat action=masquerade src-address=192.168.9.0/24
9 X chain=dstnat action=accept dst-address=0.0.0.0/0
10 X chain=srcnat action=accept src-address=192.168.0.0/24 dst-address=192.168.0.0/24
DHCP Servers:
Flags: X - disabled, I - invalid
# NAME INTERFACE RELAY ADDRESS-POOL LEASE-TIME ADD-ARP
0 LAN1 dhcp LAN1 dhcp_pool1 3d
1 LAN2 dhcp LAN2 dhcp_pool2 3d
2 LAN3 dhcp LAN3 dhcp_pool3 3d
3 LAN4 dhcp LAN4 dhcp_pool4 3d
4 LAN5 dhcp LAN5 dhcp_pool5 3d
5 LAN6 dhcp LAN6 dhcp_pool6 3d
6 LAN7 dhcp LAN7 dhcp_pool7 3d
7 LAN8 dhcp LAN8 dhcp_pool8 3d
8 WLAN dhcp wlan1 dhcp_pool9 3d
EDIT:
Its a little embarazing to say, but I fixed the internet issue, cuz I had defined the gateway for each subnet as 192.168.x.0/24 which ofc only are the definition of the subnet! DOH! I changed all gateways to be 192.168.x.1 instead now, and ofc its working then. Sorry for the noobness of that.
And I can access each PC on each subnet now. Working as intended.
Thnx for your inlightning 
Here at the end, are there any default/normal firewall/nat rules, that you would suggest that I’m AT LEAST using for security reasons?