I would personally set up a DMZ if I have servers that need Internet a permanent connection
or IoT devices that are sniffing my network and then snitching all home to the vendor server.
It could be also a nice place for smart TV, game consoles and/or internet radios or many IoT
devices, for sure that can be also done with an extra multimedia VLAN for sure, so nothing
wrong with it if they are all not disturbing the rest of the LAN.
I would the entire local area network divide into several VLANs and this by using a small switch
either Layer3 or Layer2, likes needed and/or wished. Cisco SG220/SG250 or SG350 series are
here one of the best you can get your hands on, they are starting with 10 Ports and ending up
with 48 port models, likes you need it. This is based on my own opinion and nature and surely
not a must be. If you need a switch you may get also the benefit from that, if your entire
network load is to high, based on what ever, the switch is saturated and if this all will be
connected to your firewall directly this one will be freezing!
I would set up:
pfSense 192.168.1.0/24
VLAN1 - management VLAN - 192.168.1.0/24
VLAN10 - IoT devices - 192.168.3.0/24
VLAN20 - private wired devices - 192.168.4.0/24
VLAN30 - office - 192.168.0.5/24
VLAN40 - WiFi guest - 192.168.6.0/24
VLAN50 - WiFi private - 192.168.7.0/24
VLAN60 - children (each) - 192.168.8.0/24
ect…...
wired devices over OpenLDAP on a small MinnowTurBot or Raspberry PI 3.0 with Debian Linux or TurnKey Linux
wireless devices (guests) over the Captive Portal w/ voucher system
wireless devices (private) over FreeRadius Server 3.0 w/ certificates
OpenDNS Account if children are in that house hold and then matching to their age
pfBlockerNG & DNSBL + TLD might be also nice to use, but a Squid Proxy with user auth. might be
better together with SquidGuard & SARGE to get knowledge who is surfing where! (Children)