From experience, do not use pfSense as your router and DHCP server. Keep pfSense unaware of your VLANs. Use a point-to-point VLAN if pfSense is virtualized -OR- dedicate a port/lag to pfSense if it's a physical device.
Use your L3 switch as your internal router and pfSense as your edge router/firewall/NAT only so it will only receive internet-bound traffic.
With the ICX64R (L3) firmware, you will want to add a router-interface (ve) to each of the VLANs that need to be routed at all. Give each VE an IP address and appropriate subnet, and use that IP address as any connected device's Default Gateway (aka next-hop) address on each VLAN respectively.
Look up my post history and you'll find a good detailed post on how I have a similar setup with some good helpful info in this very thread.
Use your L3 switch as your internal router and pfSense as your edge router/firewall/NAT only so it will only receive internet-bound traffic.
With the ICX64R (L3) firmware, you will want to add a router-interface (ve) to each of the VLANs that need to be routed at all. Give each VE an IP address and appropriate subnet, and use that IP address as any connected device's Default Gateway (aka next-hop) address on each VLAN respectively.
Look up my post history and you'll find a good detailed post on how I have a similar setup with some good helpful info in this very thread.