No need to add another filter rule. Your nat rule is dstnatting both incoming and outgoing connections. Limit the nat rule instead (e.g. dst-address-type=local and dst-address=!192.168.0.0/16).
Note that you already made this effort on the first nat rule (ssh) with src-address=!192.168.2.0/24.
To properly post config, better use /firewall export to export configuration to terminal.
So, even outgoing connections will be rewritten to destination ip 192.168.2.7. If this is the desired behavior, you should also apply hairpin nat to rewrite the source address and it will work (both outgoing and incoming connection will go to your internal mail server). But that’s not what you want.
dst-address-type=local makes sure only connections directed to the router itself (either wan or lan) will be rewritten to destination address 192.168.2.7
dst-address=!192.168.0.0/16 makes sure only connections to the wan address will be rewritten to destination address 192.168.2.7
(in-interface-list=WAN is also an possibility, but would not apply to LAN-initiated connections to WAN address)