The DMZ forest should be implemented on the internal network with RODC's (if available with your version). DMZ devices can then authenticate through configured ports on your firewall to access the "DMZ" Forest RODC's only, allowing centralised management of DMZ devices. More @Wikipedia
Hover over any link to get a description of the article. Please note that search keywords are sometimes hidden within the full article and don't appear in the description or title.