If you only have two interfaces, add another.
Thanks for the reply.
I do have a third network card in there, but from what I see about setting up a DMZ in the handbook, adding a third interface and doing it that way just creates another subnet, which would protect your main LAN from attackers who would come through the DMZ, and you would have to have more than one public IP to not break any individually forwarded ports anyway, as it says "Now you need to determine whether you'll use inbound or 1:1 NAT. If you have multiple public IP's, use 1:1 NAT.
If you have only a single public IP, you'll need to use inbound NAT. If you have multiple public IP's, but more DMZ hosts than public IP's, you can use inbound NAT, or a combination of 1:1 and inbound.".
I'm looking to set up a DMZ on the same subnet as the rest of my LAN, without breaking individually forwarded ports from the Firewall: NAT: Inbound config. I only have one public IP. As I said, I just need a way to set up a DMZ function that forwards all ports to my server unless I specifically map ports to other machines. If there was a way to put the Firewall: NAT: Inbound config on a higher priority than the Firewall: NAT: 1:1 config, I would be golden.