Hi,
I have a similar setup. I will try to go through your questions.
The /24 is a short way of specifying your subnet mask. a 24 bit subnet mask would look like 255.255.255.0 which means that for example in your DMZ the IP addresses in that range would be 192.168.2.1-192.168.2.254 They are usually 24, 25, 26, 27, 28, 29, or 30 (For class C ranges) 34 doesn't work which was why it wouldn't let you set up the DHCP
With regard to the accessing the login screen, you are correct to be concerned. A simple fix though. In you rules for the DMZ interface block access to the interface IP address (192.168.2.1) from the DMZ LAN. I would also suggest blocking access to the WAN interface.
With regard to the WAP, I would keep a range out of the DHCP scope that you can use for static IPs. You will not be able to block access to it from the DMZ though because it sits in this subnet and traffic to it from the DMZ does not pass through the monowall to get to it. I would ensure you have a very strong password for it. I find that
this is a useful secure password generator. Make sure you record it somewhere though.
You might want to give thought to using the captive portal as well. I have set up a coffee shop Wi-Fi using a voucher system. The voucher is free for time limited access, they have to accept an Acceptable Use Policy before use and it stops people on the road outside being able to use the Wi-Fi.
It might also be worth (I used this) of using
OpenDNS as a method of limiting the type of content that can be accessed. "Family Friendly" Wi-Fi
Hope this helps.