There’s no “professional” or “unprofessional” way here, there are just “working” and “non-working” ways 
If I understand your requirements correctly, you want to make sure that devices in “VLAN 99” (subnet 10.99.99.0/24) or “VLAN 1” (subnet 192.168.0.0/24) will not be able to reach the devices in “VLAN 10” (subnet 10.0.0.0/24) in any uncontrolled way and that all the traffic from those devices to internet will only use the .84 addres whereas the traffic of the server will only use the .85 one.
I do mention both VLANs and subnets as that is important. By proper configuration of VLANs (in this particular case, on the switch), you can make sure that even a malicious software on a device that belongs to VLAN 99 but can send and receive VLAN-tagged frames will be unable to talk to devices in VLAN 10 directly, bypassing the router; by proper use of firewall rules on the router you can make sure that the traffic between 10.0.0.0/24 and 10.99.99.0/24 passing through the router will be properly filtered, i.e. that you will be able to selectively permit only some types of connections.
I can see multiple issues in your configurations.
First, both 10.0.0.1/24 and 10.99.99.1/24 are attached to vlan interfaces that in turn are attached to ether9, so traffic from both these IP addresses egresses from ether9 tagged. But on the switch, vlan-filtering is set to no in the bridge configuration, which means that the settings in /interface bridge vlan as well as some parameters on the /interface bridge port rows are ignored, hence no tagging/untagging on ingress/egress takes place; the frames pass through the switch unchanged. If you set vlan-filtering to yes, the settings in /interface bridge vlan will start having effect, and you will lose access to management of the switch via 10.99.99.2 because those settings are incorrect. In order not to lose communication via 10.99.99.2, you have to move the port of the bridge named bridge from the untagged list on the row with vlan-ids=99 to the tagged one before setting vlan-filtering to yes. Other than that, there is no access port to vlan 99 neither on the switch nor on the router, whereas vlan 1 that hosts 192.168.0.0/24 on the switch and has some access ports there is not handled on ether9 of the router, so there is either another cable connecting one of the member ports of the bridge on the router with one of the ethernet ports of the switch with pvid 1 or there is no way how you the router could talk to 192.168.0.2. The former is quite an unusual setup that does not actually improve the isolation as compared to having all 3 VLANs on the same cable between the router and the switch, the latter would be strange. What is the intention? Can you provide a diagram of the actual interconnection (a photo of a handmade drawing is sufficient)?
Second, the firewall filter rules on the router do not block forwarding of any traffic, except incoming connections from the internet. The safest way to build a firewall is to make it drop everything by default and only selectively permit what you intentionally want it to permit; the reverse approach, where you permit everything except what you intentionally want to drop, leaves you at risk that you forget to drop something and leave a security loophole that way.
Third, the purpose of the masquerade action in NAT is to deal with dynamically changing WAN addresses. This means that it chooses the reply-dst-address to use automatically so the to-addresses parameter seems redundant to me. Also, you don’t restrict the effect of either rule in the srcnat chain to any out-interface or out-interface-list, so it affects also traffic from one local network to another. If this is intentional, what is the idea behind that?
Other than that, it’s not a mistake but using mac-vlan the way you do seems like an overkill to me, as you do not make use of it for any VRF handling nor you refer to the interface name in any firewall rules. VRF is an elegant way to isolate groups of networks if you need to isolate them completely; if you need some communication between them, it’s better to use other ways to control the isolation.