Steve, thank you.
I read through your post and went at it again after factory resetting the switch and basically putting the OPT interfaces back to how they were when I received the SG5100 from Netgate.
OPT1 (ix0), OPT2 (ix1), OPT3 (ix2), OPT4 (ix3) = added but not enabled
From there I went to Interfaces => VLANs
Define VLAN tag 10 interface ix0 (opt1), VLAN tag 20 interface ix0 (opt1)
Enabled VLAN 10 and VLAN 20. Assigned static IPv4.
Defined DHCP for VLAN 10 set range but added a static IP address for the Cisco switch outside of the pool range. Defined DHCP for VLAN 20, set range.
On another computer connected directly to the Cisco switch, I defined VLAN 10 and 20.
Set port 1 as a trunk. Tagged VLAN 10 and 20.
Set port 8 as access. Untagged for VLAN 20.
Added an IPv4 interface for VLAN 10, DHCP.
Usually this is where I get kicked off but this time after I connected port 1 from the switch to ix0, the switch was listed under DHCP and Online in pfSense. In addition, my other computer that is directly connected to the switch was still connected using the switches default IP address. I’m assuming it’s because VLAN 1 and VLAN 10 are both active on the switch and I have that computer plugged into a port that I didn’t mess around with.
I plugged a device into port 8 and confirmed it got an IP address in the VLAN 20 range.
One issue I found is that I cannot connect to the switch from my laptop that’s on the LAN connection. But I’m guessing that’s probably a firewall issue. I can still connect to the switch directly from my other computer so I can do switch configuration from there.
I’m going to back up the settings on the switch and pfSense before I go any further. I guess for most people getting to where I am now seems trivial. After all, I don’t even know if the device works on port 8 since I just did a simple connectivity test, but after spending the last several weekends setting up, resetting, plugging in, and unplugging, I’m happy that I can finally move onto the next steps.
Thank you very much for your help!