You can follow one from two ways
1) Make DMZ with transparent mode and set up your addresses on servers. In this case, you will have transparent control of server's traffic (like with NAT), but you will don't need to setup something special for each server.
2) You can use IP aliases and special NAT rules for each sever.
For this way, first, you should add IP alias (for each address)
- Add ARP publish on intreface WAN with additional IP address
- Add route into main - core <additional IP> 0
After, make special NAT rule before your "allow_standart" rule - lan/<internal IP> wan/all-nets instead of NAT rule. On "NAT" tab, check "Specify sender address" and input/select your IP for this server.
If you need symmetric NAT, make SAT/Allow rules lan/<internal IP> wan/all-nets, in SAT tule on "SAT" tab select "translate the source IP" and set <additional IP>. But i just found this way and didn't have time to fully test it.
For incoming connections, on SAT/Allow rules (make it as usual for port mapping) use core/<additional IP> in destination.
As for me, first way is more better (IMHO), especially if you use not only simple (one-connect) protols. For example, VoIP thru DFL's NAT working not so good as want