You’ll have to use two rules, each targeting individual subnet. Problem with 192.168.0.0/21 is that it covers wide range of addresses and if you want to only cover some exact ranges, then you can’t do it with single wide range.
BTW, I doubt that your post is entirely accurate. 192.168.0.0/21 ranges from 192.168.0.0 to 192.168.7.255, so it doesn’t cover Net10 (192.168.10.0/23 which ranges 192.168.10.0-192.168.11.255) and thus this rule doesn’t affect connectivity between Net10 and your device.
Just for your edification. General rules of thumb.
To firewall a single address use: src-address or dst-address
To firewall a single subnet use: src-address=subnet or dst-address=subnet ( where subnet example looks like 192.168.88.0/24 )
For two or more subnets use: INTERFACE LISTS.
Exception: The management subnet ( base or management vlan typically ), is one case where for a single subnet we create an interface list. The reason being is that we are likely to need it in an interface list to apply to a. neighbours discovery, b. firewall rules c. interface ilst member d. winbox macserver. We can also add other interfaces to the management interface such as an off bridge port.
USE OF FIREWALL ADDRESS LISTs.
a. When one wants to capture REMOTE addresses or SUBNETS for firewall purposes. ( Interface lists are typically used ONLY for local interfaces )
b. Whenever you have a bunch of users, less than a full subnet that need to be identified for firewall rules.
c. Whenever you have a bunch of users from different subnets that need to be identified for firewall rules.
d. Anytime, you have a single user, or some users as described in b, c, AND whole Subnet(s), that need to be identified together for firewall rules.
+++++++++++++++++++++++++++++++++++++++
CAVEAT: On some rules in RoS, interface lists are NOT an option and one must use firewall address lists to identify users.