For the LAN I selected (STATIC) with an IP Address of 10.0.0.1/24. My configs on the Brocade router stayed the same.
Vlan 1000: 10.0.0.2/29
Static route: 0.0.0.0 0.0.0.0 10.0.0.1
Yeah, that is wrong. the netmasks should both be /24 or both be /29.
Can you ping 10.0.0.2 from pfSense and 10.0.0.1 from the switch?
Did you create a pfSense gateway for 10.0.0.2?
Did you route 10.2.0.0/24, 10.3.0.0/24, 10.4.0.0/24 to that gateway on pfSense?
Does the firewall rule on your transport interface on pfSense (LAN) allow traffic sourced from those subnets?
Does outbound NAT on WAN contain rules to map those subnets to WAN address?
That's really all that is necessary. Check all those things.
I would, personally, make some design changes:
My transport network would not be associated at all with the networks on the switch. I would make it something random like 172.18.218.224/29. I would probably not use 10.0.0.0/8 for anything, but if I did I would make it something random like 10.253.192.0/18. I would route that supernet to the switch, pass traffic from that supernet on LAN, and add outbound NAT for that supernet on WAN.
That would enable you to add networks 10.253.192.0/24 through 10.253.255.0/24 on the switch at will without making any changes to the firewall. Assuming 64 /24 networks is enough for the project's maximum anticipated requirements.