Pros

  • Gives users plenty of control
  • Provides effective security by blocking malicious outgoing connections

Cons

  • Doesn’t give much explanation for certain cryptic connections
  • Takes some effort to train
  • Could provide more options for common connections