Daniel,
It's strongly recommended to put your DMZ on a unique interface of your Firewall.
The standard setup will be one interface for the Internet, One interface for the Private network (Internal) and one interface for the DMZ.
As for your catalyst5500. You mentionned 3 VLANs, I recommend 3 different Switch indepently connected from each other. Why ? Well a switch visible from the Internet could be attacked and reconfigure to bypass the firewall and jump right in the internal.
For the most secure configuration, only run a reverse cable between your ISP router and the Firewall. This way a DOS can't be done on a switch in front of the FW. Your only point of failure before your enforcement point will be your ISP's router of which you do not have responsability.
You can always put a cheap HUB between the ISP's router and the FW for management and testing purposes, but this is about it.