First make sure that if your switch has the feature, it allows access to it's Webgui from right VLAN (some manufacturers like Zyxel allow you to restrict management access to specific VLAN.
Also if you run opnsense on custom build PC or virtual machine, make sure it's ethernet ports support IEE 802.1q (also known VLAN tagging). Opnsense vlan relies on VLAN tags and without that support, it doesn't work properly.
I have four VLANs configured on my OPNsense router, each with a distinct NIC10 (LAN, 192.168.0.0/24)100 (WAN, IP from ISP)200 (MGMT, 10.10.20.0/24)300 (IoT, 10.10.10.0/24)10 is the PCs, tablets, media devices, etc100 allows the OPNsense VM to move from VM host to VM host while maintaining connection to the world.200 is iLOs, SNMP and netdata traffic, VM movement300 is smart home stuff - cameras, etc.
Also gotta say that I find it odd that WAN is set up as a VLAN…
Based on my knowledge, you need to create static routes.If the physical interfaces of VLANs 200 and 300 have IPs 10.10.20.1/24 and 10.10.10.1/24 then you need to create static route of 10.0.0.1/8 to either 10.10.10.1 or 10.10.20.1Basically you need to specify a gateway which both VLANs are using as gateway to point traffic towards different networksReason why you won't be able to gain access to VLANs from LAN is because VLANs are both in differnet IP space
If the VLANs are created in OPNsense it should work no problem. On my bare metal OPNsense I use two NICs and have four VLANs plus LAN, and have never had to manually specify routes. Maybe a config issue with the VM in your case?