Not sure if I did it the right way or the wrong way, but I have mine running with all the devices that I don' t control, but with wireless/LAN configured to be blocked to access the Internet (TV, media player, NAS, etc.). When I want to firmware update any of them than I can still temporarily enable only to access the specific remote sites and than disable it again.
Also have access enabled for PC and mobile devices but with web filter turned on and some of the categories disabled.
SSL offload is also configured to log the encrypted traffic and filter for inapporpriate access and safe search turned on for the kids' devices.
Also enabled specific access only, not all services. Most of the time you need only HTTP/HTTPS/SMTP/IMAP/SSH access. If I need anything else, than I find out first why, then enable it if I really need to.
Another thing was I used Geolocation to disable access from specific countries as I found many strange traffic patterns in the log coming from places that I unlikely will visit in the future anyway.
Full access blocked to all cloud providers, too (including the infamous iCloud from all devices on the home network).
All the mobile devices configured to have access over wireless only, not paying for any data plan. For mobile calls still my trusty Nokia 3310 is the best, not some fancy (and chatty) smartphone.
It might sound a bit extreme and like being a control nazi for only a home network, but what' s the point to have a firewall at home if not to have a better understanding and control over what' s happening on your LAN and to protect your own privacy.
Otherwise you can use a dumb modem to connect to your ISP and don' t bother about what exactly happening on your LAN, right?