Let’s maybe take a step back to clarify. The fact that you mentioned you are using the web client for QBit makes me wonder. Are you running this (VPN, Plex, Sonarr, QBit) all on the same machine and if so, what is it and what operating system? It might make a difference to this advice.
Although the AirVPN docs you are referring to may not be clear, what they are saying is you can choose a public port for them to forward to you and it will go to the machine/device that is running the VPN client on your end. You will need to have a corresponding service ‘listening’ on that port because it’s an inbound connection. Its address will be [AirVPN-IP]:[forwarded-port]
Most often in the case of a non-VPN connection, ‘mapping’ (aka ‘forwarding’) of an inbound port to a local port is done on your router but if you want to do it while running a VPN you would have to be running the VPN on your router or be able to do port mapping on whatever device the VPN is running on. Regardless, it’s not necessary if you do this properly.
You seem to be saying you want multiple services to listen like this on different ports. Again, that’s not necessary and really not advisable. If you want to admin your arr’s and so on from the outside you should do it via Tailscale or other direct point-to-point private VPN. Even if you just want to ‘get it working’ for now and then go back and revisit the security later, please realize how vulnerable you are and you cannot fix that vulnerability in less time than it takes for a bot to scan your ports and get in. You will lose that race every time. But I’m not going to lecture you; if you insist on not taking the advice then go ahead, but be prepared for some damage.
What I would do in this use case is have AirVPN forward their external port to whatever VPN client device is running QBit. Then go into QBit in the Advanced config section and bind ‘all IPv4 addresses’ to the VPN interface (usually ‘tun0’). Then in the Connection tab, if uPnP/NAT-PMP forwarding is on, turn it OFF, then set the inbound (listening) port manually to match whatever port AirVPN is forwarding to you. Remember to save that config. Now QBit is the ‘listening’ service on that port (notice you didn’t have to do port mapping?). As an aside, I’d also advise globally turning off IPv6 on your device as it can cause leaks. Next I would install Tailscale on the device that is running all this stuff, and on the device you want to use for remote access. This literally takes about 10 minutes to get working and it’s free for up to 3 devices and very secure. Now you can make a remote connection to the Tailscale IP and the port of whatever service you want to admin, in the form [tailscale-IP]:8989 or whatever local port you are using.
You can then refine this setup by split-tunneling the AirVPN client such that QBit is the only service using the VPN connection, since you really don’t need it for the other services and so why have the additional overhead for them? Remember, a VPN doesn’t ‘protect’ them so there’s no advantage. QBit (or rather, what you do with it) is the only service that needs to mask your real IP through a VPN.
If you do the steps in the prior paragraph you should have a working QBit service over AirVPN and a secure means to get in remotely for administration.