So I bought a Brocade ICX6610 L3 switch which I will use as the interVLAN router in my home network and just have pfsense act as a firewall and a DHCP/DNS server. I stumbled upon this old post of @kapone from the Brocade thread and to do this, I need to have these interfaces in pfsense:
Transit - untagged port
Main, IoT, etc. - tagged ports
The L3 switch's default route points to pfsense interface IP in the transit network. DHCP/DNS will work fine too. However, the routing will be asymmetric.
Forward packet from client is: client -> switch -> pfsense -> internet
Return packet to client is: internet -> pfsense -> client (because pfsense sees the VLANs as directly-connected, bypassing the L3 switch router)
From what I understand, the return packet will still reach the client and won't get rejected but do you guys see any caveats with this? I know asymmetric is bad if the outgoing traffic has a stateful firewall that's different from the stateful firewall that handles the incoming traffic but this is not the case in this setup. Both outgoing and incoming traffic go through the same pfsense firewall so no packet should be dropped.
Transit - untagged port
Main, IoT, etc. - tagged ports
The L3 switch's default route points to pfsense interface IP in the transit network. DHCP/DNS will work fine too. However, the routing will be asymmetric.
Forward packet from client is: client -> switch -> pfsense -> internet
Return packet to client is: internet -> pfsense -> client (because pfsense sees the VLANs as directly-connected, bypassing the L3 switch router)
From what I understand, the return packet will still reach the client and won't get rejected but do you guys see any caveats with this? I know asymmetric is bad if the outgoing traffic has a stateful firewall that's different from the stateful firewall that handles the incoming traffic but this is not the case in this setup. Both outgoing and incoming traffic go through the same pfsense firewall so no packet should be dropped.