Uhh...so 8443's open...I'm going to guess you checked both inbound and outbound.
In short the way we do it probably won't work totally for you, but hopefully it can give you some food for thought about the whole communication triangle. When I looked at the two ways to get coverage to our iOS devices externally, I discarded the limited access JSS method...primarily because I don't really have the authority to place any machine in the DMZ here and was told that was not something our network guys wanted to do.
What I did ultimately do was have my production JSS face the outside world. (complete with a good backup scheme) We contacted our outside DNS provider and had them add an entry to make jss.yourorganizationhere.com map to an xxx.xxx.xxx.xxx (a publicly-facing external IP address) that was in our organization's pool.
We then added at NAT entry that forwarded queries made to that external IP address inside the firewall to the internal server. On the firewall side, the only two things for our situation that are important to note are: 1) we don't have a firewall on outbound traffic internally, 2) to make our situation work, the only inbound port we had to allow was 8443 and our firewall guy even placed some firewall rules that will ONLY open traffic on 8443 inbound through the firewall devices trying to access https://jss.yourorganizationhere.com
I am willing to share with you the network diagram I used to persuade our network guys to make firewall changes with you. Being that you are using the DMZ method, it probably isn't relevant, but it does try to document the whole communication model. If interested, I will email you the document that I used to help me get a complete understanding of the process and present to our network guys. I used to be a newspaper artist for a living so it's documented as best as I can. Let me know if it helps anyone. I will note here that I should probably give credit to both JAMF and Apple as both my clipart sources and my research sources.
external image link