Thank you all for your replies. Quite interesting to have different views on the situation.
I use the vpn service so my pfsense is not only used as a fw.
In the meantime I also activated egress filtering. For some of you maybe overkill, but it's also to learn how to use the pfsense (making aliasses and rules, check my fw logs etc..).
@chris4916:
Are you hosting internal services exposed to internet? NO
Do you need remote access to your LAN? YES
Do you need to segregate internal subnets? Isolate guest wifi from LAN… Not today, but could be in the near future.
@chris4916:
all-in-one UTM will do the job with less flexibility but more efficiency… if you don't know how it works behind.
Well apart from protecting my situation, I'd like to learn how it works behind. It's fascinating.
@Harvy66:
Don't forget to teach your children how to be responsible Internet citizens and not get virii. I got a virus once when I was 7, it was from a floppy disk I got from a friend. I have never gotten malware or a virus since.
I absolutely agree on that point too.
@pleriche:
Regarding pfSense I'm a bit of a noob round here but I would humbly suggest that what you need is a UTM rather than a firewall such as pfSense.
I'll have a look at that UTM stuff.
@jahonix:
Personally I would separate my network in trusted and untrusted subnets with the kid's gear being in "untrusted". This way they cannot infect parents stuff.
With vlans, yes this could be an option too. But the "untrusted" part will need access to the "trusted" part. For example: ipad is using application to navigate in the gui of the Kodi Media Player. I'll have to check that.
Again, thank you all for the interesting advises.