- Open source
- Proximity security
- Content filtering
IT Support Specialist at Tech Solutions
It has provided us with a low cost security solution but their testing prior to deployment needs to be improved.
What is most valuable?
How has it helped my organization?
It has provided us with a low cost security solution using a quality router at a fraction of the cost of our previous solution.
What needs improvement?
- Testing prior to deployment
- Packages need better support
For how long have I used the solution?
I've used it for eight years.
Buyer's Guide
Netgate pfSense
January 2025
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Rarely as long as the right precautions are taken during migration.
What do I think about the stability of the solution?
Sometimes there are issues with package deployment and one must refer to the forums for support.
What do I think about the scalability of the solution?
Being open source, scalability is not limited. The limits in place, are only set by available resources and time.
How are customer service and support?
Customer Service:
Customer service is available at a rate of $399 for 2 incidents, $899 for 5 incidents and $1,699 for 10 incidents. Most people refer to the forum and/or chat room.
Technical Support:Over 10/10.
Which solution did I use previously and why did I switch?
Yes, I have used many other routers but nothing offers the options pfSense does without spending a fortune. pfSense is constantly being improved on.
I switched due to router limitations and vulnerabilities.
How was the initial setup?
It's straight forward for anyone that's installed an OS before, however, I wouldn't recommend it for the novice.
What about the implementation team?
It has been implemented in house and at client locations. If implemented at client locations it does require some care if Snort (The proximity security system) is used as it needs to be fine tuned and touched up from time to time due to newly found vulnerabilities that cause legitimate sites to be blocked.
What was our ROI?
You can invest as little or as much as you want. Granted, some features require more hardware than others but some end users use old machines that no longer have a purpose.
What's my experience with pricing, setup cost, and licensing?
It's between US$50 to US$1500 depending on the hardware that is used.
Which other solutions did I evaluate?
We also looked at -
- Smoothwall
- Moonwall
- SonicWall
- Netgear
- IPCop
What other advice do I have?
Become familiar with the router before implementing it at customer sites. Realize that basic features require a basic amount of hardware. Advanced features require more RAM and if using an SSD, use the embedded installer to reduce wear and tear on your drive.
I would recommend having the following hardware as a minimum:
- At least 8GB for storage
- 256MB+ RAM
- A dual core 1.8Ghz CPU for single typical Internet connection
- The faster the internet connection, a faster CPU and more RAM are required
- If you run Snort and Squid it is recommended you have between 4GB to 8GB of RAM
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Technology Lead at Mega Trust
Free, effective, and very easy to install
Pros and Cons
- "It is effective. We have not had any problems."
- "We have not had any problems with it, and we also do not have a need for any new features. If anything, its reporting can be better. Sophos has better reporting than pfSense. Sophos has more detailed information. pfSense is not as detailed. It is summarized."
What is our primary use case?
We use it for the backup line for the internet. When the internet is disconnected, we transfer to pfSense.
What is most valuable?
We only use it for the backup internet connection. It is effective. We have not had any problems.
What needs improvement?
We have not had any problems with it, and we also do not have a need for any new features. If anything, its reporting can be better. Sophos has better reporting than pfSense. Sophos has more detailed information. pfSense is not as detailed. It is summarized.
For how long have I used the solution?
I have been using pfSense for six months.
What do I think about the stability of the solution?
It is stable. I would rate it an eight out of ten for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a seven out of ten for scalability.
How are customer service and support?
I have not used their support.
How was the initial setup?
The installation of pfSense is very easy. It took two to three hours.
It is easy to maintain. We did not have to do any maintenance of pfSense since we installed it.
What's my experience with pricing, setup cost, and licensing?
It is free. It is open source.
What other advice do I have?
We have not used the VPN capabilities of pfSense. We also did not have a need to integrate pfSense with any service.
I would rate pfSense a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Netgate pfSense
January 2025
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
Head of Department of operational and compliance at ACE GABON
A very good firewall with excellent VPN and captive portal capabilities
Pros and Cons
- "The most valuable features are the VPN and the capture photo."
- "If a user doesn't have a large amount of experience in Linux systems, they will have problems using this solution. Users need to be highly skilled in troubleshooting competency. Users who do not have such skills will find the product difficult to use."
What is our primary use case?
I use pfSense as a firewall. I use it also as a VPN server and for the captive portal. Those are the main purposes.
How has it helped my organization?
It's difficult to say how it has made a difference in my organization.
What is most valuable?
The most valuable features are the VPN and the captive portal. Captive portal and VPN are easy to deploy.
What needs improvement?
I haven't experienced many problems when dealing with the solution, so I don't know if there are areas that need improvement.
If a user doesn't have a large amount of experience in Linux systems, they will have problems using this solution. Users need to be highly skilled in troubleshooting competency. Users who do not have such skills will find the product difficult to use.
Sometimes if your network goes down, you might experience an issue on the captive portal. This may require a restart and it also may require that you load it again. I'm used to the system, so I know what to do, but it can happen from time to time.
It can be really easy to deal with Technical support. Technical support is avaible every time I call . But sometime if Technical support do not privide you the solution, so you should double check and solve the issue by your self.
For how long have I used the solution?
I've been using the solution for about five or six years.
What do I think about the stability of the solution?
The stability isn't bad, but there can occasionally be bugs within the system. The likelihood is lessened if you follow a few key protocols.
It's important to have a proper license, otherwise, you run the risk of bugs.
It's important to upgrade the solution regularly. This also helps users avoid running into bugs. If you experience a bug, it's a good idea to check the release and make a grid.
Those that have experience in troubleshooting will benefit from their knowledge when using this solution. Sometimes packages will not work and you'll have to be strategic with workarounds.
How are customer service and technical support?
The support can be really difficult to deal with. I wouldn't say that we have been satisfied with them in any way.
How was the initial setup?
It's not very complex to set up. However, it can become complex as you're using it, and when you are learning the systems. In that sense, it might not be straightforward for everyone.
When it comes to using pfSense, you need to have extreme skills in Linux and in troubleshooting. If you don't have any form of troubleshooting competency, it could be very difficult to use, and very hard to set it up.
What about the implementation team?
I'm very proficient in the solution. I managed the implementation on my own. We didn't need to hire a consultant or bring on an integrator or reseller.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution is fair. I've also paid for a license that includes Entreprise support. Our license lasts for two years.
What other advice do I have?
We're just customers. We don't have a special relationship with the solution. We just use it on a regular basis.
I'm not sure if I'm using the latest version of the solution or not.
I'd rate the solution ten out of ten since I've never had any major issues with it.
The biggest thing a new user or company needs to be aware of, however, is that whoever the team is that's using it, they need to be very experienced Linux users. The system will be extremely difficult otherwise.
New users will need patience. However, it is easy to use due to its very good web interface. It's also easy to deploy and the process can be handled quickly. There's no need to have a really big fancy long-winded deployment process. That said, especially if you are using it within a complex Linux environment, you absolutely must have high skills in both Linux and security.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Support Specialist with 51-200 employees
Very stable, relatively easy to set up, and offers good technical support
Pros and Cons
- "The built-in open VPN and the VPN Client Export are the solution's most valuable aspects."
- "There's a bit of a learning curve during the initial implementation."
What is our primary use case?
We just use the solution as a straight-up firewall. There is no VPN access or anything like that. We just use it as a straight-up firewall and we run Suricata on it as a defense.
What is most valuable?
The built-in open VPN and the VPN Client Export are the solution's most valuable aspects.
What needs improvement?
I cannot recall any features that are lacking.
There's a bit of a learning curve during the initial implementation.
You do have to pay extra for better customer service.
For how long have I used the solution?
We've been using the solution for about six months. It hasn't been too long.
What do I think about the stability of the solution?
The solution is very stable. We've had zero issues. There aren't bugs or glitches. It doesn't crash or freeze. It's been reliable.
What do I think about the scalability of the solution?
I have not tried scaling, therefore, I can't really comment on how easy or hard it would be to expand the service.
There's only one person in the organization using the solution, and that's me.
How are customer service and technical support?
The tech support is excellent if you have a support subscription. If you didn't have that, you could be lining up for a while. It could be a hit or miss, whether you get someone that's actually going to help you.
However, we have a subscription and therefore our support is always excellent. We're quite satisfied with the level of service we're getting.
Which solution did I use previously and why did I switch?
Previously, we used Dell SonicWall. There was just a high cost of licensing all the time, and, with having someone go in and troubleshoot for issues as well, it just wasn't cost-effective anymore. pfSense is simply a better solution.
How was the initial setup?
The initial setup has a bit of a learning curve. It's not complex per se. It just takes some getting used to. After the initial deployment, the other six or seven were easy. I could just copy the configuration of the other ones, change some IP addresses, and I was basically done.
What's my experience with pricing, setup cost, and licensing?
There aren't monthly or yearly licensing costs.
What other advice do I have?
We're just cusomers. We don't have a business relationship with pfSense.
We're using the latest stable version of the solution.
I would 100% recommend the solution to others. On a scale from one to ten, I'd give it a ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Systems Manager at CORNARE
Great pricing, good documentation, and offers very good integration capabilities
Pros and Cons
- "The documentation is very good."
- "The technical support needs to be improved."
What is our primary use case?
I use the product for many enterprise clients, including building construction, government, and education.
What is most valuable?
The documentation is very good.
The pricing is okay. It's not too expensive.
The integration capabilities are great. The product can integrate well with Check Point and Fortinet. They make it a very easy process.
It's very good at defending our company.
What needs improvement?
It would be ideal if the solution could integrate with Snort and OpenVPN.
The technical support needs to be improved.
For how long have I used the solution?
I've been using the solution for ten years at this point.
How are customer service and technical support?
The technical support is not great. It's very slow. Sometimes it will take four days in order to connect with them, which is actually a decent timeframe for them.
Their documentation, however, is pretty good.
How was the initial setup?
The initial setup is not complex. It's pretty straightforward. The onboarding process is pretty good. They make everything very, very easy. People shouldn't have any issues with implementation.
What's my experience with pricing, setup cost, and licensing?
We've found the pricing to be very fair. It's actually pretty low. The licensing is very inexpensive.
Which other solutions did I evaluate?
We looked at Fortinet and CheckPoint in relation to how they work with Linux.
In the case of Fortinet, the content filter is a URL content filter. It's very different and it's complex to use.
What other advice do I have?
We're a pfSense partner.
I'd rate the solution ten out of ten. It's been very good to work with.
I would recommend the solution. pfSense is superior in terms of defending against attacks.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Systems Administrator at a tech services company with 51-200 employees
A rock-solid, customizable, and free open-source firewall with useful intrusion detection, clustering, and HA features
Pros and Cons
- "The intrusion detection feature is the most valuable. It is an open-source firewall, so there is a lot of material on it. I also find the open VPN capability very nice. It is pretty customizable. The clustering and the high availability are the two biggest things to be able to get out of a firewall."
- "Their support could be better in terms of the response time."
What is our primary use case?
It is my main firewall into the data center and VPNs for clients. It sets up my DMZ and does a whole bunch of other stuff. I am using the latest version.
How has it helped my organization?
We wouldn't be able to function without it.
What is most valuable?
The intrusion detection feature is the most valuable. It is an open-source firewall, so there is a lot of material on it. I also find the open VPN capability very nice.
It is pretty customizable. The clustering and the high availability are the two biggest things to be able to get out of a firewall.
What needs improvement?
Their support could be better in terms of the response time.
What do I think about the stability of the solution?
It has been pretty rock solid.
What do I think about the scalability of the solution?
Its scalability is good. I have got web users and other kinds of users, so there can be five or thousands of users.
How are customer service and technical support?
I paid for some support with them, and it was pretty good. They just could be a little quicker in responding. They have custom level support, so if you got something complicated, they get you up to the upper tiers, but it takes a little bit longer to do that. Once you get there, the support is good. I would rate them an eight out of ten.
Which solution did I use previously and why did I switch?
I used Fortinet previously, and I used Ubiquiti prior to that. We switched partly because of the cost. It also gave me the ability to do the clustering. I can still maintain my VPNs, connections, and other things. I can take down one of the firewalls for maintenance and bring up the other one and not take down my whole user base.
How was the initial setup?
It was not complex. I was able to do it myself, but we had some problems with some of the protocols, and we had to get one of their coders to get in and look at it. Because of that, it was a little complicated to do the high availability stuff.
What about the implementation team?
I did it myself.
What's my experience with pricing, setup cost, and licensing?
I spent a couple of $1,000 on hardware, and the OS was free. A comparable firewall would cost me probably 20 grand. It saved a lot of money.
What other advice do I have?
I would advise others to go for it. I would recommend this solution. It is a good solution. No other solution can beat the price.
There is so much stuff you can do with it. There are so many features, and I have not even scratched the surface on all of them. If it is something that someone doesn't feel like configuring, you can buy a prebuilt system from them and get support.
I would rate pfSense a nine out of ten because of the cost and flexibility. It has been pretty good.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Great flexibility without the ongoing fees
Pros and Cons
- "What I found most valuable is the cost of the platform, the flexibility of the platform, and the fact that the ongoing fees are not there as they are with the competitor. Some people may think you're taking a risk with using Opensource. I think it just provides the end user, specifically for us small, medium business providers of services, the flexibility we need at the right cost to provide them a higher end, almost enterprise type service."
- "In terms of areas of improvement, the interface seemed like it had a lot. The GUI interface that I had gotten into was rather elaborate. I don't know if they could zero in on some markets and potentially for small, medium businesses specifically, give them a stripped-down version of the GUI for pfSense."
What is our primary use case?
We had been hit by crypto, and with our existing firewall infrastructure, we found out it didn't have geofiltering without an additional cost. That's still written from SonicWall and I think you have to pay extra for that. pfSense came with geofiltering and with logging as well, which I believe you have to pay extra for with SonicWall. So we didn't realize this until we got hit. We implemented GoIP filtering, and we also activated and stored the log files from within the firewall. I think there are some other feature sets that we used as well. The device seemed to be a little bit simpler to manage and configure through the interface. Of course with it being open source, we were able to stay current with that without having to incur annual purchasing or annual licensing fees like we do with SonicWall.
What is most valuable?
What I found most valuable is the cost of the platform, the flexibility of the platform, and the fact that the ongoing fees are not there as they are with the competitor. Some people may think you're taking a risk with using open source. I think it just provides the end-user, specifically for us small, medium business providers of services, the flexibility we need at the right cost to provide them a higher-end, almost enterprise-type service.
What needs improvement?
In terms of areas of improvement, the interface seemed like it had a lot. The GUI interface that I had gotten into was rather elaborate. I don't know if they could zero in on some markets and potentially for small, medium businesses specifically, give them a stripped-down version of the GUI for pfSense.
For how long have I used the solution?
I've used this solution for about a year.
What do I think about the scalability of the solution?
You could scale the pfSense platform to multiple users and bandwidth. With SonicWall, you have to go get a different version of their product because they're going to tie their firmware to their version. pfSense doesn't do that. It seemed to me like the scale of pfSense is easier and it was a non-sales interactive requirement to scale the offering versus with SonicWall.
How are customer service and support?
Technical support was through an online chat. I don't remember us running into any snags.
How was the initial setup?
The initial setup is pretty straightforward if you have your ducks in a row if you understand the IP engineering and design, and you understand some of the protocols that you want to introduce into the environment. I think one of the biggest things that it allowed us to do also was remote desktop or remote access. We filtered out remote management. We shut those ports down within pfSense, and that seemed pretty straightforward. I think the GUI has a little too much information out there, but if you're a senior engineer, you're going to love all the information because it makes sense to you. If you're a junior or a freshman engineer, you're not going to mind it either because you can use it to teach yourself how to take advantage of that information that's there.
On the front end of this, I thought it was rather intuitive.
What was our ROI?
With a firewall, typically we only charge between $25 and $75 a year to manage the firewall. That allows us to keep our price points low, and with minimal administrative overhead, we can maximize our profits.
What's my experience with pricing, setup cost, and licensing?
When compared to other solutions like SonicWall, SonicWall has a built-in administrative burden where you have to go back and make sure your client understands they're going to get hit with another annual fee to keep that device up to date. pfSense is not like that. pfSense is not like that in the sense that if you go out and get the latest update of firmware or software, you're going to get the latest and greatest. You don't have to remember to go to the client and remind them they're going to be charged another fee next year to keep their license current. I hope they keep that model.
What other advice do I have?
If you're a junior or even a beginner engineer, jumping into the interface for pfSense could be overwhelming. There are going to be things in there you just have never heard or seen before, which isn't a bad thing.
On the front end, I would take advantage of any courses that are out there, any introductions to it. It's very intuitive and there are a lot of forums out there that you can go watch and educate yourself on. If you are not that advanced of a network engineer, I think it's a great solution for you because you can go out to some peers and get a lot of direction and guidance from them to set it up in a small environment. The only other thing I would do is just compare. You always have to understand what your customers' needs are. Make sure you understand what your customer's needs are and that it's going to fit into their environment and their budget. I don't know why it wouldn't, but that'd be about the only advice I'd give is just make sure that it is definitely a fit for your customer base. I'm fairly confident, small and medium businesses should be a very good fit. I've been in the enterprise space as well. There may be some things on the enterprise level that you just can't do with pfSense and you might want to go to some other solution set, but I think it's very competitive.
I'd rate this solution a nine, even if I was an experienced engineer because it's easy to have and easy to maintain.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees
Provides good security as well as scanning and filtering traffic; web interface could be enhanced
Pros and Cons
- "A free firewall that is a good network security appliance."
- "Web interface could be enhanced and more user friendly."
What is our primary use case?
This solution is for my personal use, I've had a hobby of using it for a long time. I use it to protect my home network. Nothing is bulletproof but I'm happy to have a firewall at home scanning the ins and outs of my network so that I have a degree of security.
What is most valuable?
pfSense is a free firewall that you can download and install on your own hardware and establish a VPN for it. If you have remote users who need to connect securely, pfSense can do that. The solution has multiple use cases. It's good for scanning and filtering traffic. It's a good network security appliance which you can install on your own hardware or on their hardware. Some companies will invest in a really big firewall for their main branch, and will install pfSense in remote sites because they don't see the value of buying an expensive firewall for each branch.
What needs improvement?
I'd really love to see the web interface enhanced. It's good but it could be clearer and more straightforward. As a FreeBSD fan, I'd love to see a BSD license code, rather than a GPL license code. I'd also love to see a Sandbox and more security features. pfSense is a mature product, but if you compare it to other products in the market, you realize that pfSense is a little behind.
For how long have I used the solution?
I've been using this solution for five years.
What do I think about the stability of the solution?
This solution is stable.
What do I think about the scalability of the solution?
The solution is scalable, it has the HA options that other firewalls also have. It's a software-defined solution, so you can pretty much put it inside a virtual machine and scale it up. Or you can load balance, or have an HA set up between two pfSense proxies, it's all possible.
How are customer service and technical support?
I don't have contact with technical support. If you have an issue, you can go to the online community and wait for someone to respond. There's no SLAs for that. The only way I would have access to their support is if I actually purchased a Netgate appliance.
Which solution did I use previously and why did I switch?
I've previously used vendor-based firewalls, like Sophos. They have Sophos XG and Sophos XG, UTMs. Those are the firewalls that I have the most expertise with and I also have some experience with Fortinet. pfSense is normally installed on x86 hardware which uses CISC architecture, a complex instruction set that runs on laptops and computers. They generally make calculations much slower than what we call risk architecture. As a result, firewalls with a risk-based architecture or reduced instruction set architecture are preferred because they provide better throughput. That's the case with FortiGate. They are very well known in the market to have the highest IPS throughput and that's one of the major factors for choosing a firewall.
How was the initial setup?
The initial setup is very easy, it takes about 15 minutes.
What other advice do I have?
I would recommend this solution, it's one of those technologies anyone should at least try out. If you want to protect your home network, and don't want to invest in a firewall, pfSense will do the job. It's good for home use and for small businesses or remote sites of large companies. It's a good strategy because it's generally more critical to invest in defending your main data centers. It's important to choose the hardware wisely, make sure it's compatible. Netgate, the company sponsoring pfSense, manufactures hardware that is really optimized towards it. For small or medium businesses it's not a big deal. But for enterprises, this is important.
I rate this solution a seven out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
OPNsense
Cisco Secure Firewall
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
Untangle NG Firewall
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Sophos and pfSense?
- How do I choose between Fortinet FortiGate and pfSense?
- How do I deploy anti-spam in pfSense or SonicWall TZ?
- What are the differences between Fortinet FortiGate and pfSense?
- Comparison between Sophos XG and pfSense as firewalls
- What is the difference between PfSense and OPNsense?
- Why is pfSense's firewall better than OPNsense's?
- Which solution do you prefer: pfSense or KerioControl?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet