How do you port forward using IP filtering rules?
You don't. The core of "port forwarding" is not just packet filtering, it's packet rewriting (address translation), which needs a NAT rule – cannot be achieved with only a filter rule.
(The term 'port forwarding' is a bit of a misnomer; a router already forwards packets while 'port forwarding' alters them.)
It's rare for a home router to be able to do outbound NAT but not inbound port-forwarding; more likely that it's either called something different – some manufacturers call it "Virtual Server" – or the functionality was deliberately hidden in the ISP-branded firmware.
Should I configure the inbound or outbound port filters?
Neither (see above), but if it were the right type of rule, then usually you would only need inbound.
Most home routers have a stateful firewall, where the only filter rule you need depends on the direction of the first packet (i.e. inbound, in your case); all other packets belonging to the same connection will be implicitly allowed in both directions.
(On top of that, most home routers allow everything outbound by default anyway, so only an inbound filter rule does anything useful – unless you've deliberately set up strict outbound filtering, which it doesn't sound like you have.)
What should the "source IP address" and "dest IP address" be set to?
"Source IP address" should stay blank, to accept packets from all sources. If it can't be blank, then 0.0.0.0
–255.255.255.255
would have the same effect.
Similarly, "Source port" should remain blank, to accept any source port (it is not the same as the destination port; rather, usually the client-side port number is chosen randomly). If it can't be blank, then 1
–65535
would allow all source ports.
I assume the destination address should be set to the router's IP address, but should I be using the public IP address or just 192.168.1.1?
This is not fully answerable, because a filter rule isn't the right type of rule to begin with, and a NAT rule would have two such fields: "original/match destination" and "new destination".
For a NAT rule, the "original" destination IP field would be the router's public IP address, because that's what is on the actual inbound packets; the "forward to" field would be the NAS address.
(That being said, for filter rules, the same idea applies – you use what's on the actual packets. Though NAT complicates things, as it is usually done before filtering; so packets arriving from Internet at the router will have its public IP address as their destination, but if there's a port-forwarding rule, then the packets will actually have the NAS address on them, not the router's anymore.)
Obligatory for 2023: Make sure your router's public IP address is, in fact, still public. (That is, make sure you're not behind CGNAT.) Look at the address reported by the router itself (not by a website) and make sure it's neither from any of the usual private IP ranges, nor from the 100.64.0.0/10 (CGNAT) range.