If you don't care what IP your guest network shows to the public, you should be able to do this.
You should simply need to create a source NAT rule for the traffic.
At various locations, I have fiber services delivered without an ISP router from the carriers. Part of that service is also a /29 block of IP addresses.
What I do in those instances is put the /30 public IP that would normally be on the ISP router on my router, then I create source and destination rules to handle the traffic.
ISP Assigned Router IP: 123.123.123.190/30
Routed IP block: 123.122.122.138/29
eth0 = WAN 123.123.123.190/30
eth3 = LAN 10.200.0.1/23
eth3.10 = Public Wifi 10.200.10.1/24
Note that I do not assign the routed block to any interface.
Some firewall rules to prevent talking and such..
set firewall group address-group 10_0_0_0_8 address 10.0.0.0/8 set firewall group address-group 10_0_0_0_8 description 'Entire 10.0.0.0/8' set firewall group network-group Public_WiFI_LAN description 'Public WiFi LAN' set firewall group network-group Public_WiFI_LAN network 10.200.10.0/24 set firewall name Public_WiFi_IN default-action accept set firewall name Public_WiFi_IN description 'Public WiFi in to other interfaces' set firewall name Public_WiFi_IN rule 10 action accept set firewall name Public_WiFi_IN rule 10 description 'Allow response to existing connections' set firewall name Public_WiFi_IN rule 10 log disable set firewall name Public_WiFi_IN rule 10 protocol all set firewall name Public_WiFi_IN rule 10 state established enable set firewall name Public_WiFi_IN rule 10 state invalid disable set firewall name Public_WiFi_IN rule 10 state new disable set firewall name Public_WiFi_IN rule 10 state related enable set firewall name Public_WiFi_IN rule 20 action accept set firewall name Public_WiFi_IN rule 20 description 'Allow access to gateway' set firewall name Public_WiFi_IN rule 20 destination group address-group ADDRv4_eth3.10 set firewall name Public_WiFi_IN rule 20 log disable set firewall name Public_WiFi_IN rule 20 protocol all set firewall name Public_WiFi_IN rule 30 action drop set firewall name Public_WiFi_IN rule 30 description 'Block all other access to private networks' set firewall name Public_WiFi_IN rule 30 destination group address-group 10_0_0_0_8 set firewall name Public_WiFi_IN rule 30 log disable set firewall name Public_WiFi_IN rule 30 protocol all set firewall name Public_WiFi_IN rule 40 action drop set firewall name Public_WiFi_IN rule 40 description 'Block all SMTP' set firewall name Public_WiFi_IN rule 40 destination port 25 set firewall name Public_WiFi_IN rule 40 log enable set firewall name Public_WiFi_IN rule 40 protocol tcp set firewall name Public_WiFi_LOCAL default-action drop set firewall name Public_WiFi_LOCAL description 'Public WiFi in to router' set firewall name Public_WiFi_LOCAL rule 10 action accept set firewall name Public_WiFi_LOCAL rule 10 description 'Allow DNS' set firewall name Public_WiFi_LOCAL rule 10 destination port 53 set firewall name Public_WiFi_LOCAL rule 10 log enable set firewall name Public_WiFi_LOCAL rule 10 protocol udp set firewall name Public_WiFi_LOCAL rule 50 action accept set firewall name Public_WiFi_LOCAL rule 50 description 'Allow pings' set firewall name Public_WiFi_LOCAL rule 50 limit burst 1 set firewall name Public_WiFi_LOCAL rule 50 limit rate 62/minute set firewall name Public_WiFi_LOCAL rule 50 log enable set firewall name Public_WiFi_LOCAL rule 50 protocol icmpThen I use NAT rules to specify how it routes out. I do not have a destination NAT rule here because there is no inbound traffic allowed. the NAT translation should handle the return traffic.
In your case, you could just tell it to use the IP on the WAN interface instead of some other IP.
set service nat rule 5995 description 'Outbound Public WiFi LAN Traffic' set service nat rule 5995 log disable set service nat rule 5995 outbound-interface eth0 set service nat rule 5995 outside-address address 123.122.122.140 set service nat rule 5995 protocol all set service nat rule 5995 source group network-group Public_WiFI_LAN set service nat rule 5995 type source