This is for msf6 framework , since they have changed a lot of module names and the way you interact with them.
This is how you use autoroute & socks_proxy in metasploit. all the online materials I found either didn't conver this whole or just plain old.

DMZ infra but not the Coperate.10.10.51.0/24 with the our tap0A phish user to click a browser exploit and open a Dynamic Tunnel to the Corporate enviroment which is the 10.10.51.0/24 network.10.10.50.8.10.10.51.21.