We use our Netgate appliance in our office and resell Netgate appliances and services.
Managing Director at a tech services company with 11-50 employees
Has good DNS and multi-WAN routing capabilities
Pros and Cons
- "The most valuable feature is the routing capability. We're primarily using the appliance as a router to provide DNS and multi-WAN routing."
- "The intrusion protection system is provided by a third-party provider that's verified by pfSense. It would be best to have an option for IPS because when you deploy pfSense to a SOC, you have to subscribe to another IPS provider. The IPS should be a default feature. On the other hand, that's also the benefit of pfSense because you can also acquire another IPS solution."
What is our primary use case?
How has it helped my organization?
We realized the benefits of pfSense immediately. For example, we needed to connect two ISP connections to use them simultaneously in the office without separating the network. We immediately saw the benefit upon installation. Otherwise, we would have two different connection lines and need to separate the users between the two networks. With pfSense, we could get that benefit instantly.
Some applications also deliver benefits over time in addition to the immediate benefit on the routing side of an installation. Eventually, you will see other benefits in creating certain policies that apply to users, such as the firewall's filtering capabilities.
In terms of data loss, the ability to create policies that would be a step toward intrusion prevention or malware blocking would be a secondary benefit. As I understand, pfSense per se is Netgate and we have a data loss feature in itself. As a layer of protection, then that creates a layer of protection against data loss.
PfSense offers single-pane-of-glass management. When you log into the system, you immediately see this dashboard, which shows the resources and utilization of the pfSense device. The most important information is in that dashboard. In our case, we have a standby monitor where IT support would look at it. If something is created there, that gives them an idea of how that something is set up.
The pfSense Plus edition has features that prevent downtime, such as load balancing. We can automatically route traffic to another ISP should the primary or the secondary be down. It's the most important feature for some of our clients. It prevents downtime because it will automatically route to the active connection.
We have to go through a step that gives you visibility into certain alarms that indicate a possible security issue. That feature provides visibility into potential network security issues. We run servers with applications that are critical to office operations. When monitoring the network, the server is the priority. Having clear protection ensures productivity because sometimes issues inside the application impact the use inside the office and those outside the office. PfSense is able to add a layer of protection to these application servers.
What is most valuable?
The most valuable feature is the routing capability. We're primarily using the appliance as a router to provide DNS and multi-WAN routing. Flexibility is also critical. The solution provides flexibility in terms of creating firewall rules. It's extensive, which means you can create several rules with different elements involving firewall policies.
It's easy to add features to pfSense. When I started, I didn't have a networking background, but I was able to follow the materials and learn through hands-on practice. The interface is easy to navigate and understandable.
What needs improvement?
The intrusion protection system is provided by a third-party provider that's verified by pfSense. It would be best to have an option for IPS because when you deploy pfSense to a SOC, you have to subscribe to another IPS provider. The IPS should be a default feature. On the other hand, that's also the benefit of pfSense because you can also acquire another IPS solution.
Buyer's Guide
Netgate pfSense
December 2024
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
We started using Netgate in 2016, so we have used it for almost nine years.
What do I think about the stability of the solution?
I can only think of one instance where stability would be a problem, and that's the power supply. We have tested the hardware for a single power supply, so if it was deployed in a location where the power supply is unstable and without the proper UPS, then it will cause problems. That is not due to pfSense per se. It requires a redundant power supply on the end user side to provide sufficient UPS or some sort of backup. On the software side, I don't recall a major incident where the software got corrupted.
Sometimes, it could get corrupted in the course of maintenance. For example, if the logs are not cleared, and the storage becomes full over time.
What do I think about the scalability of the solution?
The hardware is not scalable. Normally, we ask clients to project where they will be in two or three years and advise them to buy a model that fits their requirements. If you already have fixed hardware but you haven't factored in the number of users, you will hit a wall. PfSense has some scalability, but it depends on your hardware.
How are customer service and support?
I rate Netgate support 10 out of 10. When you acquire Netgate hardware, you gain access to online support. We've had some issues that couldn't be resolved, so we had to raise a ticket to online support. The feedback was quick, and we didn't have any major issues left unresolved because the online support was effective.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We deployed certain prescribed network equipment, like the Fortinet firewall. We started using pfSense Community Edition because it's free and highly available, but we saw the benefit of the commercial version, which is more stable, so we decided to upgrade to that.
How was the initial setup?
When we started, we were already using the community version. It took some time because we have some IT personnel. Sometimes, when we have just hired an IT staff member, and we introduce them to pfSense, I see that they can easily adapt or understand the features and how to manage the firewall. They can install the community version and play with it. The installation is easy and staff can learn it hands-on.
We deployed it in-house, but when we hire some IT support, we require them to have some exposure to pfSense. The pfSense community edition is pretty popular, so we don't have much use for consultants. We provide the service because we understand pfSense.
PfSense is easy to maintain. You only need to modify the configuration when there are additions to the network or you need to change the firewall rules. Other than that, the features and systems don't require much maintenance.
What's my experience with pricing, setup cost, and licensing?
In the Philippines, most users are small or medium-sized enterprises. Small businesses also need a level of protection, so sometimes, what they need is basic protection. For example, they must protect their ports so they cannot be scanned from outside and layered protection and filtering. They would like something without a recurring cost, which pfSense can provide for basic features.
PfSense offers solid value for small and medium enterprises, so it's highly applicable. It serves our purpose even in our use case. We have certain critical applications that must be protected, and the pricing is good for us. The good thing about pfSense is that it supports layer three or IPSec VPN at no additional cost. That in itself is a good feature for small and medium enterprises, and we can deploy VPN at no additional cost. We can deploy other applications, adding a layer of VPN without much expense.
What other advice do I have?
I rate Netgate pfSense eight out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Jul 14, 2024
Flag as inappropriateHead of IT Department at OLIVESTRONIX NIGERIA LTD
You can deploy it with limited hardware resources
Pros and Cons
- "The firewall sensor is highly effective, and it's easy to deploy. You can deploy pfSense with limited hardware resources. It's not necessary to have an appliance with much RAM to make it work. It's cost-effective and performs well."
- "The solution could be more user-friendly, and the graphical interface needs some work so that someone without an IT background can use the application. I would like the ability to manage the on-premise appliance from the cloud. When I'm not in the office, it would be great to connect to the pfSense server and administer the network remotely."
What is our primary use case?
We're using pfSense as a firewall and for web filtering.
What is most valuable?
The firewall sensor is highly effective, and it's easy to deploy. You can deploy pfSense with limited hardware resources. It's not necessary to have an appliance with much RAM to make it work. It's cost-effective and performs well.
What needs improvement?
The solution could be more user-friendly, and the graphical interface needs some work so that someone without an IT background can use the application. I would like the ability to manage the on-premise appliance from the cloud. When I'm not in the office, it would be great to connect to the pfSense server and administer the network remotely.
For how long have I used the solution?
I've used pfSense for two and a half years.
What do I think about the stability of the solution?
pfSense is stable.
What do I think about the scalability of the solution?
You can scale up pfSense with multiple clusters for higher availability. It has that capability. It gives you that flexibility to set up a hybrid with part of the deployment in the cloud and a mural copy or to grow your network.
Which solution did I use previously and why did I switch?
At my previous company, we used a Cisco firewall and a router, but they kept having issues with the firewall and the device. When I joined this company, we introduced pfSense and haven't had any issues since.
How was the initial setup?
Setting up pfSense is easy, but it depends on your experience level. The average person with an IT background who is grounded in ICT can do install and configure pfSense in 15 to 30 minutes.
What's my experience with pricing, setup cost, and licensing?
PfSense is an open-source product, but you need to buy a license to get some features.
What other advice do I have?
I rate pfSense eight out of 10. It's an open-source solution that you can deploy on data warehouses with various resources. You're not tied to specific hardware. It's easier to manage and use.
Before deploying, you should find out the details about the environment where you will install pfSense. I would recommend pfSense for an enterprise environment with around 1,000 to 2,500 users.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Netgate pfSense
December 2024
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Director De Tecnologias da Information at EPAL-EP
Free to use, flexible, and user-friendly
Pros and Cons
- "The initial setup is not complex."
- "Ultimately, we'd like something stronger, and something that can handle threats better in real-time."
How has it helped my organization?
The product makes our business more secure. It has increased the security of our business. We are using the two solutions. The first one is from Cisco, and the second is from pfSense.
A few months back, we were attacked, however, the attackers used the wrong software. We decided then it was important to start prioritizing our security, which is why we brought on this product.
What is most valuable?
The solution is very flexible.
I find the product very easy to use.
The initial setup is not complex.
The solution has been very stable so far.
We can scale the solution if we need to.
What needs improvement?
The process can be challenging. We do not have one security team. We need a team that can guarantee the security of our company and we're not there yet. We only have the client's equipment, and one guy managing this equipment. This isn't necessarily a problem with the product, it's more about our own internal structure.
Ultimately, we'd like something stronger, and something that can handle threats better in real-time.
For how long have I used the solution?
I've been using the solution for about five years now.
What do I think about the stability of the solution?
The stability has been great so far. there are no bugs or glitches. It doesn't crash or freeze. Its performance has been great.
What do I think about the scalability of the solution?
The scalability of the product is very good. If we want to expand, we can do so.
We have 3,000 people on the solution right now. There are people from various teams that utilize it. It's not just IT.
Which solution did I use previously and why did I switch?
We previously used OpenBSD, a Linux solution.
We switched to this product as it is free and open-source. It also increased the level of security we had on hand, even though OpenBSD was more user-friendly.
How was the initial setup?
When it comes to setting up the solution, it's not a complex process. It's pretty straightforward in general.
The deployment took maybe a month and a half.
We have two teams that handle deployment and maintenance tasks. One team is internal and the other is external. They're mostly engineers and they work together.
What about the implementation team?
We used an outside integrator to help us and we were pretty happy with the results.
What's my experience with pricing, setup cost, and licensing?
We are using the free version of the solution. We are not paying anything for it at this time.
Which other solutions did I evaluate?
We're reading up on other solutions every day. We likely won't stay with this solution. It's good for now, however, we'd like something more robust further down the line.
What other advice do I have?
We are a customer and an end-user.
We're using either version 5.3 or 5.4 at this time.
While this is a good solution, we're looking for something stronger in the future. I'd recommend others also look for something strong, that fits their security needs.
I would rate the solution at a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Managing Director at Midgard IT
Easy to use, simple to set up, and very powerful
Pros and Cons
- "I'm the expert when it comes to Linux systems, however, with the pfSense, due to the web interface, the rest of the staff can actually make changes to it as required without me worrying about whether they've opened up ports incorrectly or not. The ease of use for non-expert staff is very good."
- "We are at the moment looking to use it as a proxy service so that we can limit what websites people go and view and that sort of thing. That's an area I've struggled with a little bit at the moment and it could be a bit easier to set up."
What is our primary use case?
We have a client who's got a number of VMs on a single piece of hardware. They needed to have access over a VPN to those VMs from inside their network. We use pfSense to provide the VPN link using the IPsec.
In others, let's say smaller organizations, we will put a Mini ITX system that then connects into their broadband - typically sort of fiber or something like that - and just gives protection.
The solution also allows us then to manage port forwarding and things like that.
What is most valuable?
The firewall aspect of the solution is very valuable to us. We had so many limitations with the Dre tech, however, it's the firewall and the port forwarding that is the most interesting due to the fact it allows us to restrict IP addresses and move things from different ports and things like that.
I'm the expert when it comes to Linux systems, however, with the pfSense, due to the web interface, the rest of the staff can actually make changes to it as required without me worrying about whether they've opened up ports incorrectly or not. The ease of use for non-expert staff is very good.
The solution is easy to use in general, for everyone.
The product is very powerful.
It's the type of device that does one thing well. There isn't much I would want to change.
What needs improvement?
We are at the moment looking to use it as a proxy service so that we can limit what websites people go and view and that sort of thing. That's an area I've struggled with a little bit at the moment and it could be a bit easier to set up.
The only other thing I might look at would be some sort of antivirus type of aspect to check traffic coming in and out of the network. If they offered unified threat management, that would be an ideal outcome for us.
I have been looking at it as a sort of an appliance, rather than installing it on an actual PC. However, that's for future research first.
For how long have I used the solution?
pfSense is only a small part of what we do. The majority of our systems are full-blown Linux systems and we use that firewall as a system. It's only recently we've started switching some clients to pfSense where we think we need to have slightly different things. Maybe they haven't got a server and this is just replacing their sort of existing TP-link or router, et cetera.
What do I think about the stability of the solution?
I've had no issues with stability whatsoever. I'm quite happy letting it run for days, months, weeks, et cetera. We have no requirements to actively manage it. In terms of performance, we just need to go in and make changes as required by the customer. Other than that, it's set and forget. There are no bugs and glitches to navigate. It doesn't crash or freeze.
What do I think about the scalability of the solution?
It's not been extensively used at the moment as we've already got a Linux server in place. If we can justify it for the customer, we tend to use that. That said, we are looking to increase usage of that as it would say it takes some of the work away from me and allows me to farm that out to the staff.
How are customer service and technical support?
We've never had to use technical support. Therefore, I can't speak to their level of knowledge or how helpful they are. We've always just been able to find the answers we need without their help, and therefore have never really had to use them.
Which solution did I use previously and why did I switch?
We're still using Linux servers that are running IP tables, et cetera. Prior to that, we were using, something called IPCop. Before that, I can't remember what it was. We've always used sort of Linux old BSD-based solutions for our firewalls. That's just what we've always done.
How was the initial setup?
The initial setup is not overly complex or difficult. It is very straightforward. We connect and we just have got a couple of standard procedures to setup once it's complete. We could probably get one up and running between half an hour to an hour. The deployment is fast and the whole process is pretty seamless at this point.
What about the implementation team?
We did not use any integrator or anything like that. We're offering our client's the installation process as part of our services. I find it very, very straightforward, however, that's due to my previous experience with Linux setups.
What's my experience with pricing, setup cost, and licensing?
We use the open-source version, which is free to use.
I say we've always used the community edition as I've never felt a need for support or anything like that and our clients have never insisted on it. I know where to go to look for answers if we run into problems, so paying for that extra support isn't something we need to worry about.
What other advice do I have?
We are just end-users and customers.
I cannot speak to the exact version we are using. Ours may be slightly out of date. We may not be using the absolute latest version. Version 2.51 is available soon and we'll likely upgrade to that.
It's good for where people have outgrown their existing broadband routers, such as the TP-link, the Dre Tech, and that sort of thing. Often, it doesn't justify putting in a full system. We tend to use a Mini ITX PC, multiple LAN network cards, and then install the opensource version and configure it appropriately.
You need to be slightly more tactical than just plugging in a Dre tech or similar Nokia device. I don't think you need to be incredibly technical to set this up.
I like it, I'd recommend it to most people to at least give it a try, and to spend a few hours initially to work their way around it.
I'll definitely give it at least a nine out of ten for its general ease of use for me and my staff. It does pretty much everything that we ask of it and the required resources for the hardware are minimal as well.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Client Solutions Advisor at a tech vendor with 1,001-5,000 employees
Flexible with helpful support and a good user interface
Pros and Cons
- "pfSense provides visibility that enables users to make data-driven decisions. I'd rate the capabilities seven out of ten."
- "Sometimes it's a bit of a challenge to know how to do something when you want to do something, for instance, setting up a point to point VPN."
What is our primary use case?
I use the solution in my home network as the main firewall before all data heads out to the internet. I use it for DNS resolution as well.
How has it helped my organization?
I noticed the benefits of pfSense immediately after deployment. I was able to take complete control of my security to my house, and it gave me all the things that I needed in order to secure my home network.
What is most valuable?
The GUI and the user interface have been very clean, understandable, and feature-rich across the board.
The flexibility of pfSense is great.
It is very easy to add features.
There are features that help to prevent data loss. The rules engine of pfSense, a traditional firewall rule structure, has always been the same.
There's definitely a single pane of glass. There's definitely a lot there in front of you.
pfSense provides visibility that enables users to make data-driven decisions. I'd rate the capabilities seven out of ten.
What needs improvement?
Sometimes it's a bit of a challenge to know how to do something when you want to do something, for instance, setting up a point to point VPN.
Configuration is sometimes a challenge just due to a lack of knowledge on my side. I find that if I don't set up the rules correctly, and this goes to lack of knowledge of being an expert in the firewall space, it's a bit of a challenge sometimes in setting that up.
I would ask them to update it to a more modern interface, as it does look a little tired compared to GUIs today. However, the features are there. A redesign would be greatly appreciated, just from a human engineering aspect.
It might be easier if they separated things out a little bit more instead of putting all the aspects of what pfSense can do for you in a single menu. For instance, they have services, and they have all the services that you could have on your system. It's a lot.
Sometimes I find it difficult to find the data visibility that I would need in the interface to then go make a data-driven decision.
pfSense helps optimize performance. From a performance standpoint, setting up firewall rules does a great job of laying out exactly what those rules are. The layout of the firewall rules makes it easy to create a secure environment on my home network, albeit not very big. However, all the features are within the firewall, and I can create individual rules and organize the rules.
For how long have I used the solution?
I've used the solution for six years.
What do I think about the stability of the solution?
I have never experienced downtime from my pfSense device. I'd rate stability ten out of ten.
What do I think about the scalability of the solution?
The scalability is very good. I'd rate it a ten out of ten.
How are customer service and support?
I contacted technical support when there was a major upgrade a few years back, and I needed some assistance.
The quality was perfect. They were fast and very helpful. Even though I wasn't a paying customer for support, they still gave me great guidance and helped me focus on the issues at hand.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've always had my service provider, Verizon, with their main router, and that router usually has a firewall built into it. I've never used anybody else besides pfSense outside of that.
How was the initial setup?
The initial setup is straightforward. I've done it for my son at college in a matter of two hours, from unboxing to operation. It's easy to deploy a box. I can deploy it by myself.
It does not require any maintenance.
What was our ROI?
The ROI and the TCO are significant. You get a lot of features under one product. However, I don't use it as a router. I only use it for firewall and VPN capabilities and DNS.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing are spot on. It's well below the industry average.
Which other solutions did I evaluate?
I did not look into other options. I knew of pfSense as being a leader in the industry, and that it is utilized by major corporations in large environments. To that end, I assumed it wouldn't hurt for me to have familiarity with the product and use it at home.
What other advice do I have?
I'm an end-user.
I use the Plus version of pfSense. However, I do not pay for support.
I would rate the solution eight out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Aug 4, 2024
Flag as inappropriateNetwork Administrator at Benguet State University
Good community support, easy to use, free, and can be reinstalled in minutes
Pros and Cons
- "It is very easy to use. The interface is quite understandable. There is a good community, and I can take over at any time I want. If there is anything wrong with it, I could just reinstall the whole thing and start all over again, and I'll be up again in less than a few minutes"
- "More documentation would be great, especially on new features because sometimes, when new features come out, you don't get to understand them right off the bat. You have to really spend a lot of time understanding them. So, more documentation would be awesome."
What is our primary use case?
I build my own firewalls, and I use pfSense.
What is most valuable?
It is very easy to use. The interface is quite understandable. There is a good community, and I can take over at any time I want. If there is anything wrong with it, I could just reinstall the whole thing and start all over again, and I'll be up again in less than a few minutes.
What needs improvement?
More documentation would be great, especially on new features because sometimes, when new features come out, you don't get to understand them right off the bat. You have to really spend a lot of time understanding them. So, more documentation would be awesome.
In terms of features, for my use, I don't see anything wrong with it. I basically get what I need from it by default. I build my firewall, so I only rely on the software. On the software side, there is not much to improve right now. So, at this point in time, I don't see anything, but I always welcome any kind of upgrades that they do. I always try them out and see if I can use them in the company or not, but so far, there are no complaints on my end.
For how long have I used the solution?
I have been using this solution for more than eight years.
What do I think about the stability of the solution?
It is a very stable product.
What do I think about the scalability of the solution?
It is quite scalable.
How are customer service and support?
I don't have any experience dealing with technical support directly from the makers of pfSense. I am using its Community Edition. That's why when it comes to technical support, I rely on myself, the community, and the information on the internet, especially from those who are more adept at it than me.
How was the initial setup?
It is quite easy. It is up in a few minutes even though I reinstalled the whole thing. For me, it is as straightforward as it can get. I'm a long-time user, and I don't see any problems with the configuration.
What's my experience with pricing, setup cost, and licensing?
We are using its Community Edition, which is free. My company is a government school, and we don't have much budget.
What other advice do I have?
There is a steep learning curve and you have to spend a lot of time with it to understand how you're going to use it and how you're going to customize it yourself. That's where you're going to have to spend a lot of time, but by the time you're done with everything and you have played with all the features you want, you will understand everything you need. You will always be up in minutes, even if it gets "destroyed" during the night, you can come back to it and reinstall the whole thing, and everything will be good.
I would rate it a 9 out of 10. It cannot get a 10 right now because it changes every day. It might be 10 today, but in a few seconds, it won't be a 10 because the whole internet changes in a few seconds, and the whole way of serving your clients can change in a few seconds. So, it can't get that perfect 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Owner at The Computer Guy
High level protection, fast installation, and good support
Pros and Cons
- "pfSense is a nice product, and I find that there's a lot of information out there. There are some good tutorials on YouTube and other websites with helpful information."
- "pfSense could improve by having a sandboxing feature that I have seen in SonicWall. However, maybe it is available I am not aware of it."
What is most valuable?
pfSense is a nice product, and I find that there's a lot of information out there. There are some good tutorials on YouTube and other websites with helpful information.
What needs improvement?
pfSense could improve by having a sandboxing feature that I have seen in SonicWall. However, maybe it is available I am not aware of it.
For how long have I used the solution?
I have been using pfSense for approximately three years.
Which solution did I use previously and why did I switch?
I have used the SonicWall solution.
How was the initial setup?
Sometimes firewalls can get a little complicated. I think some of the things about the setup could be a little bit clearer. Maybe something like a configuration wizard or something that would guide you on more in-depth projects.
I'm running pfSense on old hardware, it takes all of 10 minutes to install.
What about the implementation team?
I did the implementation of the solution, it is not difficult.
What other advice do I have?
I like pfSense and I have deployed a number of them. I have approximately four of them in the area that I'm using. I have replaced SonicWall with a pfSense unit. It's a more economical way of using a firewall, and the protection it provides is second to none.
Lonnie Buchmann:
I would say give it a serious look. And especially a lot of times when you're in a small business, this is a really good solution that doesn't kill you with all the technology overhead that you deal with nowadays.
I rate pfSense a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
System Administrator at LafuentePaca
A stable and free solution that is easy to maintain and suitable for small businesses
Pros and Cons
- "We can run it on any hardware."
- "The product must provide integration with other solutions."
What is our primary use case?
We use the product as a perimeter firewall.
What is most valuable?
We can run it on any hardware.
What needs improvement?
The product must provide integration with other solutions.
For how long have I used the solution?
We have been using the solution for ten years.
What do I think about the stability of the solution?
The tool is stable.
What do I think about the scalability of the solution?
The tool is not very scalable. That is why we are planning to switch to a different product. The solution is used by one administrator and 75 end users in our organization.
Which solution did I use previously and why did I switch?
I have used SonicWall, Sophos, FortiGate, and Cisco Meraki. The choice of product depends on the context. Netgate pfSense is suitable for small businesses and homes. It is not the best solution for large deployments or branch offices. Sophos and FortiGate would be suitable for large companies.
How was the initial setup?
It is easy to install the tool. We need two weeks to deploy it. One person can deploy the solution. It is also easy to maintain. One person can maintain the solution.
What's my experience with pricing, setup cost, and licensing?
It is an open-source solution.
What other advice do I have?
Overall, I rate the product an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
OPNsense
Cisco Secure Firewall
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Sophos and pfSense?
- How do I choose between Fortinet FortiGate and pfSense?
- How do I deploy anti-spam in pfSense or SonicWall TZ?
- What are the differences between Fortinet FortiGate and pfSense?
- Comparison between Sophos XG and pfSense as firewalls
- What is the difference between PfSense and OPNsense?
- Why is pfSense's firewall better than OPNsense's?
- Which solution do you prefer: pfSense or KerioControl?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet