fullnat

in astaro firewall have a nat name full nat that can change both source and destination ip address.
in juniper name dual nat
http://www.juniper.net/techpubs/en_US/junos10.4/topics/example/nat-security-source-and-destination-nat-translation-configuring.html


how in mikrotik?

1:1 mapping
http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/NAT#1:1_mapping

HTH,

Going by the example from Juniper it’s more like source NAT and destination NAT being applied to the same packet (source NAT it, and also rewrite the destination IP).
Just make the relevant rules in source and destination NAT chains. The two are processed separately.

Going off the linked example, to source NAT 192.168.1.200 to 1.1.1.10 (you cannot do NAT to range pools that expire like on JunOS and IOS) and also destination NAT 192.168.1.200 accessing 1.1.1.100/32 to 1.1.1.200:

/ip firewall nat
add chain=srcnat src-address=192.168.1.200 out-interface=untrusted action=src-nat to-address=1.1.1.10
add chain=dstnat src-address=192.168.1.200 dst-address=1.1.1.100 action=dst-nat to-address=1.1.1.200

The packet entering the router will have a source of 192.168.1.200 and a destination of 1.1.1.100, the packet leaving the router will have a source of 1.1.1.10 and a destination of 1.1.1.200, much like in the Juniper manual.