NSX Edge Firewall is generally used for N-S traffic, i.e. traffic going out (or coming in) from the NSX environment. Dfw generally is used for E-W traffic, which is the traffic within the NSX environment, but the rules may include N-S traffic or Internet traffic as well as it is deployed at the VM vnic level.
For Internet access, generally it may be a best practice to group the VMs that will have internet access allowed. This could be grouping as an IP Set, VM group or attaching a certain Tag for example "internet". The source SG_Internet_VMs to destination IP any allow service http/https.
There could be two ways for internet traffic matching as this link could be helpful:
NSX rule to represent internet traffic
You would actually create 2 firewall rules, but in a different order. As firewall rules are in a 'first match, first served' basis, you'd want to block the internal traffic first and then allow traffic to the internet. There's no real distinction for the 'internet', as it's all just IP subnets. Here's what it would look like:
1. Block all to 172.16.x.x/10.x.x.x/192.168.x.x (the martian networks and any and all other internal IP subnets you're using for internal use)
2. Allow to 0.0.0.0/0
If your policy has a default deny rule, you can do it in a single rule.
Create a Security Group or IP Set that contains all your "internal" networks and use this in the destination of your allow rule, but make sure you negate the rule.
Universal rules are dFW rules that are replicated across NSX Managers with Cross-vCenter solution. If Cross-vCenter is used, it is useful for centrally managing Internet rules centrally. For a single Site solution global rules instead of Universal could be used.
If the VMs on the Source group is dynamically provisioned, it is not difficult to maintain Internet rules on both Edge and dFW for the Zero Trust Microsegmentation model, although seems more overhead.