You are technically correct in saying that you do not need to open your web interface all of the time, the ACME plugin can also take over the port just for the prolongation of certificates. However, the certificates can only be issued for "official" domains and thus, your web interface must be accessible via that name from the LAN side.The alternative to NAT reflection and opening up the web interfaces would then be to have an internal DNS override for that domain.
Also, right on point w/r to "not secure" vs. "still encrypted". It is quite a leap for a browser to say accessing an RFC1918 IP via https is "not secure", where in most cases, it sure is. I went with #3, mainly because of that: I can even issue a certificate for '*', knowing that the devices that use my own CA are under my own control in my network.Matter-of-fact, when you do https inspection in order to look at the content of your web traffic in your firewall, you have to do something like this anyway. However, I would advise to really understand what you are doing.