I would do this like this: All ports in a bridge + very serious Bridge Filters, so that none of my local packets, DHCP, etc, gets out to the ISP network.
But right now if you already have this set up, this way you will have better top speeds (max, and the board cpu will not even notice that traffic - cooool) for ports 1-3 because they use the switch function.
So to have access to the PC and Server from the Bridge DHCP clients, you can use NATed addresses. These packets will be routed. So you will be able to control them precisely with the IP Firewall Filter
Clarifying a bit - the RouterBOARD has ping to the PC and to the Server on their respective IP addresses that they would have, if they were sitting on that side as your picture shows them. And the Bridge DHCP clients will be NATed so they will have different IPs. For traffic to go from the DHCP NAT clients to the PC and Server, you would not need to add anything, - they should simply be routed, this direction of establishing a connection is covered.
And for traffic to pass from the PC and Server to the NATed clients, as in - a new connection is trying to be establised in that direction, you would need either NAT rules*, or if the PC and Server’s Internet traffic goes though the RouterBAORD (their Gateway is the RouterBOARD) , again those packets will have to be routed.
*this would not be the case with this Switch configuration, you can not NAT right in the Switch. NAT is best performend in Routing mode.
So why do you need the PC and the Server to be in the ISPs Layer 2 network in the first place? To use the “white” IPs the ISP gave you?
To utilise the IPs you can use NAT, with only downside - the Server and PC will not be aware of their “white” addresses.
About the VLANs you said that the Server would handle an additional VLAN. To link the Brodge DHCP with the Server, for example in VLAN505 you can add that VLAN to the Server’s interface, add that VLAN to the RouterBOARD’s ether1 interface, put that newly created VLAN505 interface in the Bridge.
I hope no one else on the ISPs Layer 2 network uses VLAN505 (example) because if they did - traffic would pass accross and confusion and wasted work time would be the result. So to prevent the example VLAN from commucating to the ISP, you could use the Switch’es ability to disallow some stuff. 
So it’s better than Cisco so far 