I guess you actually have conceptual problem: you can not push IP packet out of router's WAN interface just to get it bounced back so that router's firewall can treat it as if it originated from internet.
Example:
DNS
www.some.domain points to 1.2.3.4
router's WAN IP address: 1.2.3.4
router's DMZ segment address: 192.168.1.1
router's LAN segment address: 10.10.1.1
server in DMZ address: 192.168.1.100
LAN PC address: 10.10.2.2
routers NAT config has ports 80,443 forwarded to server in DMZ
When user from LAN PC requests a web page with URL
https://www.some.domain/mypage.html ...
- browser first resolves FQDN to IP address using whatever DNS service is configured. It gets 1.2.3.4.
- Then it starts TCP connection from 10.10.2.2 to 1.2.3.4. LAN PC's IP stack knows it can not connect server directly (destination IP 1.2.3.4 is outside own subnet), it sends packets to its gateway, which is router's LAN segment.
- When router receives this IP packet on it's LAN interface, it consults routing tables. Sees that 1.2.3.4 is one of its own addresses. So it passes on to ...
- ... it's NAT layer. NAT configuration says 'rewrite dst-address with 192.168.1.100', which router does. (If there wasn't matching NAT rule, router would consult firewall rules for chain=input instead).
- After that it consults firewall rules for chain=forward. If action=accept (explicit or implicit) is found, it ...
- ... consults own routing tables (again). Sees that (new) dst-address is directly reachable via router's DMZ segment interface and passes the packet to server in DMZ.
- In your case router, while checking firewall rules for chain=forward, finds action=deny based on src-address being from your LAN. Making router to drop the packet.
You could get around last bullet by applying src-nat on those packets as well, but that would hide user's IP address from http service, run on DMZ server. Which normally is not wanted.
If you want to allow LAN users to connect to server in DMZ, you need to (selectively) allow connections. You can actually construct similar rules as you have for access from internet ... plus some form of generic hair-pin NAT, combined with appropriate firewall filter rules.
You just can't get connectivity from LAN PCs to DMZ servers without allowing some (limited) communication between those.