Step 1: DISABLE all current port forwardings for the ports you entered for the P5. (not remove as they may be required later).
Be advised all the rules are not in the correct format for dynamic IP address and hairpin nat and would have to be changed anyway)
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=1935 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=1935
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3478 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=3478
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3479 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=3479
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3480 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=3480
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3074 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=3074
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3478 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=3478
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=3479 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=3479
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=987 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=987
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=987 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=987
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9295 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9295
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9295 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9295
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9296 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9296
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9296 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9296
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9297 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9297
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9297 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9297
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9301 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9301
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9301 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9301
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9303 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9303
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9303 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9303
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9304 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9304
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9304 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9304
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9308 \
in-interface=pppoe-out1 protocol=tcp to-addresses=192.168.xxx.151 \
to-ports=9308
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=9308 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=9308
add action=dst-nat chain=dstnat comment=PlayStation_5 dst-port=8572 \
in-interface=pppoe-out1 protocol=udp to-addresses=192.168.xxx.151 \
to-ports=8572
.......................
Now lets modify a particular firewall rule you have ..........
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
We are going to create three rules instead..........
add action=accept chain=forward in-interface-list=LAN out-interface-list=WAN
add action=accept chain=forward connection-nat-state=dstnat
add action=drop chain=forward comment="Drop all else"
Drop all else as the last rule, is part of the rule we are replacing but a better way of doing this as this drops all traffic from WAN to LAN but also all LAN to WAN or potentially any other L3 traffic within the LAN (lan to lan - if you had vlans for example). Its more comprehensive and puts the admin in control of allowed traffic. Due to this we have to add in the allow internet rule.
The dst-nat rule is now in a clear format which will allow dst nat from inside the LAN not just from the WAN which is in effect part of the issue here........
Now try connecting and see what the results are!