OK. In the company where I work there is a SME Server with a WAN and LAN interfaces. The lan to which is connected has its own Firewall with a couple of WAN interfaces. Something like this
Internet ---------- Sme Server --------|
|
Lan
|
Internet -----------Firewall ------------ |
The SME Server is reachable from the internet by itself but is also connected the LAN. We also wanted to reach the server by the Firewall, so we made a NAT 1:1 on the firewall but didn't work.
It turns out that when the firewall was trying to do the NAT, the SME Server was sending the reply to his own WAN interface and never got back to the firewall, so in the firewall we change the Source Adress from the NATed packages so as they come from the firewall itself to make sure they return.
Here is the thing, the NAT now works because the reply is send to the firewall, which act like the source. But because of this every connection made to the public IP that is being NATed (You know, the one that is using to do the NAT

) is consider as a local connection by SME Server.
We had some trouble in the past with the smtp server that allowed to local user send emails without authentication but we get to solve it by adding authentication. Now we wanted block access to the server manager and ssh port only to the firewall host, we believed that this is the most appropiate approach, however if there is a better solution you can suggest it.
I tried to explain as clear as I can, my english is not very good so some things may have no sense, sorry about that.