There’s no DMZ interface because, strictly speaking, any interface can have any role you like, and DMZ is mostly a concept - a term used in the industry to indicate an untrusted network which may be reachable on certain select services from the world, but will have very restricted access to any internal network(s) at the site.
Okay - having said that, you can make anything into a DMZ by configuring policies that are “dmz-like” - and you can make comments/labels that name things as “dmz” for the sake of clarity.
For example, if you have 5 hosts connected to a certain 5 ports, you can bridge them together and name the bridge DMZ.
Then make forwarding rules which allow the DMZ hosts to go out to the Internet, but not in towards the LAN.
You could next make some rules which allow the specific services you want available to the public…
And a rule which allows lan->dmz on all ports (action=accept in-interface=lan out-interface=DMZ)
And finally, a rule which drops anything going out-interface=DMZ to protect the servers from access on ports that you don’t intend to be public.
As for the network number being different than the IP you type into the interface, that’s to be expected.
A network mask of /29 (i.e. 255.255.255.248) means a range of 8 IP addresses, of which 6 may be used by hosts.
So if the network block is 192.0.2.64/29, then the network address is 192.0.2.64 , addresses .65 - .70 are usable as hosts, and .71 is the broadcast address.
If you enter an IP address in ROS of 192.0.2.68/29, then the network for this is going to be 192.0.2.64
If you’d used 192.0.2.45/29, then the network for this is 192.0.2.40
This is because /29 means “8 hosts” - your valid network addresses for /29 are therefore going to count from .0 by increments of 8:
0, 8, 16, 24, 32, 40, 48, 56, 64, 72, 80, 88, 96, 104, 112, 120, 128, 136, 144, 152, 160, 168, 176, 184, 192, 200, 208, 216, 224, 232, 240, and 248
(32 possible /29 blocks per “class C”)
PPP(oE) has a nice feature that you don’t have to put the IP address of “your end” onto the PPP/PPPoE interface itself - it acts like a “wormhole” between two endpoints, so you can use the IP address of the DMZ interface as the “local” address. It’s probably being assigned by the ISP anyway as x.x.x.x/32 which won’t interfere with assigning the same address with /29 on the DMZ interface (I think).