striving4 :
Thank you so much for your help. I’m not an IT person so I’d like to ask you to spell some of this out more specifically if you have the inclination. Is this how your idea would work? Comcast coax from to street to modem; Ethernet from modem to pfSense switch (something like the SG-3100, which will need programming to create the 3 networks); pfSense switch to three PoE switches (one for each network (brand/model recommendations appreciated)); Ethernet cables from the PoE switches out to the rooms; each of the 3 networks will have its own wifi router in one of the rooms (plugged into one of the Ethernet runs and powered by the switch (again, brand/model recommendations appreciated)). I don’t think this is the most economical approach but I gather you like it for the firewall service. Thanks again.
You will need one interface for the WAN and at least one other on the LAN, if you have a managed switch you can just create the required Vlans on the Pfsense box as virtual interfaces on the 1 physical LAN NIC basically creating a trunk, you can then assign access ports for each vlan on the L3 switch. It depends which route you wish to go down. If you are using dumb switches you are going to need a physical interface for each network as you suggested above. Bare in mind that out the box some configuration will be required even for basic connectivity (DHCP scope for each vlan, firewall rules and assigning gateways) but there are lots of tutorials on Pfsense.
Do not use wireless routers use access points (layer 2 devices) no routing.
MODEM------PFSENSE ROUTER---------MANAGED SWITCH-----------WIFI AP / HOSTS
You for example can create 4 vlans. (100/200/300/400)
These can all be assigned to the physical NIC (192.168.100.0/192.168.200.0/192.168.300.0/192.168.400.0)
DHCP range on a /24 192.168.100.20 - 192.168.100.254 vlan100 192.168.200.20 - 192.168.200.254 vlan200
192.168.300.20 - 192.168.300.254 vlan300 192.168.400.20 - 192.168.400.254 vlan400
The default gateway will be the same for all, the single WAN.
1 port on the managed switch will be assigned as a trunk port with allowed vlans 100/200/300/400 this attaches to the LAN port on the Pfsense box.
The other ports on the managed switch can then be assigned as access ports for any of the vlans ports 2-5 vlan100 ports6-9 vlan200 etc etc
You can allow routing between vlans or not, by default no hosts on any vlans can talk across the vlans.
Your APs powered off the switch can be given a fixed IP for management purposes below xxx.xxx.xxx.20 (below the DHCP scopes) and then attached to the access port for the required vlan.
I hope that makes sense