I swapped out the Sonicwall TZ-150w for my Forebox x5 Edge. Set firebox to IP of 192.168.1.3. Firebox ports are WAN1, WAN2, OPT, and lan ports 0-6 so I have my cable modem on WAN1 and patch cable going from port0 to lan1 on my wrt54gs. I have my main rig on lan2 on my wrt54gs. Set wrt54gs to static WAN IP 192.168.1.2, subnet mask 255.255.255.0, gateway 192.168.1.3, LAN IP 192.168.1.1 same as before for convenience. I disabled DHCP server on the wrt54gs and set the operating mode to router. I also enabled dynamic routing for LAN and WLAN on the wrt54gs, not sure if I needed to or what that even does.
Success! All my LAN and WLAN devices behind the wrt54gs have internet connectivity, everything works just like it did before.
Now I get to play around with that OPT port on the firebox. That port = optional network, a second network. There is also a page in the firebox config specifically for rules between trusted(ports 0-6) and optional(opt) networks which is exactly what I was needing.
ETA: The server is plugged in to the OPT port. Optional network is set to 10.0.0.1 ./ 255.255.255.0 with an IP range of 10.0.0.10-100. ESXi automatically renewed the IP which is now 10.0.0.10. I can ping the server from my main rig so the firebox is allowing connectivity that way. I need to restrict everything between the two networks except for my rig > that network so I can use the vSphere client.
I also have internet connectivity in my mint VM on the server. Looks like I have accomplished my mission. Edited by johnny.dot.exe - 10/26/13 at 2:48pm