In a domestic situation, any MX device may not be suitable as ISPs in an increasing number of nations are switching to dynamic IPv6 addressing for home subscribers whilst continuing to offer multiplay (voice, internet, mobile, premium video content based on multicast IPTV) subscriptions.
MX appliances are not yet IPv6 ready and simply don't handle the most commonly encountered variety of multicast IPTV distribution, despite the Linux code being freely available.
I get round this situation by using a third party security appliance ahead of the MX and connecting the MX Internet port to one of the LAN ports on the other security appliance. This works, is not expensive (pick the right device), and helps keep the goats (smart TVs, A/V kit, IoT devices, the Guest WiFi, etc) away from the secure portion of the network.
In practice this approach is very efficient. Goats (Smart 4K TV monitors and A/V kit) are only attached to Sheep (secure workstations) using HDMI, which plug and plays.I prefer to keep old smart phones to control the Chromecast features which are built into most of the monitors and A/V systems.
We use a security model that is like an onion, interaction between the "skins" is strictly controlled. Overall, we have ended up with networks that are more resilient, flexible and secure than if we had relied upon a single security appliance.