I don’t think you can set this both ways. Normally you access from your local network to the remote network with masquerade.
You masquerade the local LAN addresses (192.168.0.202/24) to the SSTP_ address. (Whatever that is)
The remote site receives initiation requests from this SSTP_ address and put them on the remote LAN, masqueraded with the remote LAN port (defined as WAN port in RouterOS) IP address (192.168.1.x/24, whatever address that interface got, might have used DHCP client to get it from the remote LAN)
The SSTP setup is from the remote MT (SSTP_out1) to the local MT. (SSTP server binding).
Communication setup is from the local MT or local LAN (eg your PC) to the remote site. Once the UDP/TCP/ICMP session is established the data flows in both directions. The firewall with the default firewall rules allows answers on an established session, not new sessions, and even due to the NAT used it would not know where to connect to.
This setup is used if you have full control over the local LAN. (eg. use the local MT as default gateway, setting the appropriate routes through the SSTP_)
The remote MT is configured as if it connects to Internet (WAN port) for accessing the remote LAN. (You need a masquerade to that ethernet port, not connected to the bridge!)
The remote MT is not known nor used by any remote device, remote devices need no modification whatsoever. (They see the remote MT as just another client device, in their network)
If you have full control on all devices on the remote site, this could be replaced with a plain routed solution, but then at least the remote devices must route correctly (eg use the remote MT as default gateway. Communication initiation would then be possible in 2 directions.
Think of this. If I drop this remote MT on your network, and get an IP address and are allowed outgoing access to Internet on some ports. I would be “in” your network with access just as any of your local devices. (e.g. My remote network has 3 NAT levels, 3 different firewalls, dynamic CGNAT address, not allowed incoming connection by the provider (4G and satellite) … it doesn’t matter … I’m permanently IN that network from anywhere.)
On your config …
So this is the masquerade needed (but not on SSTP_out1, but the other end of the SSTP tunnel). Setting up two SSTP tunnels in opposite directions is not what I use, and would need careful consideration for having the session following the same in/out path. Firewalls don’t like non-stateful sessions by default). Setting both directions would require a public IP address and port forwarding on both sides. Here the second NAT rules is the one that is used, and the only one that makes sense here.

So this is my local setup again … I do manage multiple sites …
.

.
Ad this is my internet default route and the the specific route for one of the sites.
.
