STILL no joy. 
While the hotspot works good and I can get DHCP addresses and have access to the internet, I can STILL ping from the guest network to the other “internal” LANs. In the interest of having a second set of eyes look at things, I have attached a few text file dumps.
I do have a question on this line:
add action=src-nat chain=masquerade out-interface=outside
I couldn’t come up with the correct way to enter that particular rule. When I set the action to “src-nat” it would complain that it needed a ‘to’ address. I was able to come up with the following possible alternatives:
add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether1-WAN
add action=src-nat chain=masquerade comment="" disabled=no out-interface=ether1-WAN to-addresses=0.0.0.0-255.255.255.255
I’m unsure how to implement that rule correctly.
Interesting point: I dumped the text files below and then I did a reboot. After the reboot, magically NEW hotspot rules appeared with jumps and such. These “new” rules only appear in WinBox. If you do a “ip firewall export”, they don’t show up. ---- More confusion.
Fewi - If you have some time and are willing, can we work on this 1 on 1 sometime. I am self employed, (and under-employed at that) so I can be available most any time. If you are willing, we can connect via telephone and TeamViewer? so that we can talk via voice and you can run the box remotely through my machine. I have everything setup on the test bench with a laptop to connect to the APs. I have a second laptop at hand as well if needed. As always, thanks for your help and understanding.
0 address=192.168.100.1/24 network=192.168.100.0 broadcast=192.168.100.255
interface=vlan1-Main actual-interface=vlan1-Main
1 address=192.168.200.1/24 network=192.168.200.0 broadcast=192.168.200.255
interface=vlan2-Guest actual-interface=vlan2-Guest
2 D address=192.168.1.150/24 network=192.168.1.0 broadcast=192.168.1.255
interface=ether1-WAN actual-interface=ether1-WAN
3 address=192.168.10.1/24 network=192.168.10.0 broadcast=192.168.10.255
interface=ether5-LAN actual-interface=ether5-LAN
/ip pool
add name=pool-vlan1 ranges=192.168.100.10-192.168.100.254
add name=pool-vlan2 ranges=192.168.200.10-192.168.200.254
/ip dhcp-server
add address-pool=pool-vlan1 authoritative=yes bootp-support=static disabled=no interface=vlan1-Main lease-time=3h name=DHCP-vlan1
add address-pool=pool-vlan2 authoritative=yes bootp-support=static disabled=no interface=vlan2-Guest lease-time=3h name=DHCP-vlan2
/ip dhcp-server config
set store-leases-disk=5m
/ip dhcp-server network
add address=192.168.100.0/24 comment=vlan1-Main dns-server=192.168.100.1 gateway=192.168.100.1
add address=192.168.200.0/24 comment=vlan2-Guest dns-server=192.168.200.1 gateway=192.168.200.1
/ip firewall address-list
add address=192.168.1.0/24 comment="" disabled=no list=Administrative_Networks
add address=192.168.100.0/24 comment="" disabled=no list=Administrative_Networks
add address=192.168.10.0/24 comment="" disabled=no list=Administrative_Networks
/ip firewall connection tracking
set enabled=yes generic-timeout=10m icmp-timeout=10s tcp-close-timeout=10s tcp-close-wait-timeout=10s tcp-established-timeout=1d tcp-fin-wait-timeout=10s \
tcp-last-ack-timeout=10s tcp-syn-received-timeout=5s tcp-syn-sent-timeout=5s tcp-syncookie=no tcp-time-wait-timeout=10s udp-stream-timeout=3m \
udp-timeout=10s
/ip firewall filter
add action=accept chain=input comment="allow established" connection-state=established disabled=no
add action=accept chain=input comment="allow related" connection-state=related disabled=no
add action=accept chain=input comment="allow local service UDP ports from LAN" disabled=no dst-port=53,67,123 in-interface=!ether1-WAN protocol=udp
add action=accept chain=input comment="allow local service TCP ports from LAN" disabled=no dst-port=53 in-interface=!ether1-WAN protocol=tcp
add action=accept chain=input comment="allow rate-limited ICMP" disabled=no limit=20,20 protocol=icmp
add action=accept chain=input comment="allow everything from admin networks" disabled=no src-address-list=Administrative_Networks
add action=drop chain=input comment="drop everything else" disabled=no
add action=accept chain=forward comment="forward established traffic" connection-state=established disabled=no
add action=accept chain=forward comment="forward related traffic" connection-state=related disabled=no
add action=accept chain=forward comment="forward traffic from vlan2 to WAN" disabled=no in-interface=vlan2-Guest out-interface=ether1-WAN
add action=drop chain=forward comment="drop traffic initiated from WAN" disabled=no in-interface=ether1-WAN
add action=accept chain=forward comment="accept everything else" disabled=no
/ip firewall nat
add action=masquerade chain=srcnat comment="" disabled=no out-interface=ether1-WAN
add action=accept chain=pre-hotspot comment="" disabled=no dst-address-type=!local hotspot=auth
add action=accept chain=pre-hotspot comment="" disabled=no dst-port=53 protocol=udp
/ip firewall service-port
set ftp disabled=no ports=21
set tftp disabled=no ports=69
set irc disabled=no ports=6667
set h323 disabled=no
set sip disabled=no ports=5060,5061
set pptp disabled=no