We use pfSense to protect our customers using IPS and IDS.
We are a government agency and we manage the government network.
We complete the setup and we are protecting our customers.
We use pfSense to protect our customers using IPS and IDS.
We are a government agency and we manage the government network.
We complete the setup and we are protecting our customers.
The most valuable feature is that it's robust.
In terms of resources, utilization assets, CPU utilization, and a lot of memory, it's very good.
The concurrent users are perfect for us.
The router monitoring needs improvement when compared with Sonicwall.
I would like an API that can sync to SolarWinds because we use SolarWinds for our monitoring platform. It would be great to be able to do all of the monitoring from SolarWinds instead of logging into the application to monitor it. It would be a nice feature to have.
I have been using pfSense for less than two years.
In the last two weeks, we moved a few resources to the pfSense and it's been stable.
When compared to SonicWall there were some issues but it could be that SonicWall was doing too much. It was doing almost everything. It was doing IDS, IPS, and contextual training. It may be that it was overwhelmed.
We were using the software base, and then we bought the hardware device. We moved 12 users onto it and we are monitoring it.
Based on the documentation it would not require much to scale up or upgrade. There is no doubt that it is scalable.
Most of the support is online.
We do a lot of reading, and if there is any support or suggestions we quickly do it.
We have not contacted them directly.
They have a lot of resources available on the internet that will guide you in finding your way around.
We use a few different firewalls. We use SonicWall and Huawei firewall along with pfSense.
The initial setup was straightforward. It was easy.
We did not use an integrator. I completed it with one of my colleagues.
Looking at what it does, I think that it is fairly priced.
When we compare to SonicWall, we feel that we are getting the best with pfSense.
Depending on what they want their firewall to do for them. If it is for intrusion detection, and intrusion prevention I would recommend this solution.
In summary, this product is good but I would like to see resources utilization (cpu, hard disk) directly on SolarWinds. A one stop shop for monitoring on SolarWinds. It would be great!
I would rate pfSense a six out of ten.
We use the open source version and we chose the hardware platform.
For pfSense the valuable features are:
We have been using the solution since version 2.1, which was three years ago.
We did not encounter any issues with stability.
We did not encounter any issues with scalability. It depends on the hardware, not the software.
I can't say. We provide our own support to our customers, as we are Linux, FreeBSD and IP specialists.
We used Watchguard and Endian, but pfSense is the most complete for layer 3 firewalls. We split the roles. We use pfSense only for the layer 3 and other products for proxy and reverse proxy (Diladele, Nginx) so we are not dependent of a constructor and easily update each part.
Setup is easy and done in a few steps.
You pay only the support and the price depends on the hardware not the functionalities.
The pfSense product is very powerful in layer 3 but you must add some products to match a viable commercial product which generally has all the functions integrated in one hardware system (proxy, antivirus, etc.).
For us pfSense is better for layer 3. We use MailCleaner for the mail relay, and Diladele for the web proxy. We like to split the functionalities for security reasons.
Before using pfSense:
I always need to open different graphs on different windows of the web browser to have an overview, Therefore, it would be good, if it is possible, to have a customizable, large dashboard. At the moment though, the others options are good because I am a beginner with the pfSense.
I've used it for six months.
No issues encountered.
There was an issue with the Layer 7 filters on an old PC.
No issues encountered.
No previous solution was used.
It's very straightforward, even for beginners. There is documentation and different tutorials and videos available in different languages.
I implemented it myself.
The only cost to set up is the hardware for a standard PC and any ethernet card extensions.
No, as I asked a friend they told me to get pfSense without doing other research.
Don't install pfSense on a machine with only the minimal recommended hardware configuration, but on a better machine.
We use Netgate pfSense for load balancing.
The tools' most valuable feature is load balancing.
Netgate pfSense needs to improve the configuration for a VPN.
I have been working with the product for three months.
I rate the product's stability a nine out of ten.
I rate Netgate pfSense's scalability a seven out of ten.
I have used online documentation and hence haven't contacted the support yet.
I rate the tool's deployment a nine out of ten. Its deployment takes only a few hours to complete.
We did the deployment in-house.
I use the product's free version.
I rate the solution a nine out of ten.
I am using pfSense as a secondary firewall and network management.
The most valuable features of pfSense are the reports, monitoring, filtration, and blocking incoming and outgoing traffic.
The usage reports can be better.
I have been using pfSense for approximately six years.
The solution is stable.
I had 20 to 30 users using the solution.
I have used Sophos and Cyberoam solutions.
The installation is very easy.
I did the implementation of the solution.
I am using the free version of pfSense.
I would recommend this solution to others.
I have been 100% satisfied with the solution.
I rate pfSense an eight out of ten.
We use pfSense for the firewall, VPN server, client-server, and internal network.
pfSense helped us during COVID-19 because we used OpenVPN to connect from home.
I like the Package Manager feature.
The main problem with pfSense is that it lacks adequate ransomware protection. I would also like pfSense to be more robust like Cisco or Fortinet.
I've been using pfSense for two or three years.
The stability is very good.
Scalability is very good. We didn't have to slow down, and we worked with it for months.
The pfSense page, community support, and YouTube tutorials are good.
The initial set up is complex and took two days to deploy.
pfSense is open-source.
I like Fortinet and Sophos as they have more tools to prevent ransomware attacks. Sophos has a client-server, and pfSense doesn't have that. Fortinet and Sophos are under a paid license, and pfSense is open-source and free. This is the main difference.
I would recommend pfSense to potential users. I would tell them to just read the tutorials because they're very useful.
On a scale from one to ten, I would give pfSense a nine.
We have a hosted platform with our client. We've built a VPN site and the solution is deployed as a VM. The client connects to it and it protects anything that's behind it like a regular firewall. Everything we have there is hosted in a data center, all our servers and things that clients connect to. So we're using it as our gateway device. We are customers of pfSense and I'm the owner of our company.
I like the site-to-site VPN and the basic firewall features.
Right now we have to use a lot of third party plugins with other providers that have their own built-in features so I'd like to see layer 7 advanced firewall features included in the solution. It would definitely improve the product.
We've used pfSense over the past three years.
The stability is very good, it's just that it's not as easy to use as SonicWall. There are limits as to who we can put to work on the solution, a limited number of our engineers work with it.
The solution is very scalable. We don't sell pfSense to the end users, we use it ourselves. Our clients have SonicWall but the whole company benefits from the firewall.
We've never used technical support but we're looking into it now and I think it's very comparable to SonicWall.
It's harder to set up pfSense than SonicWall. Only a couple of people in our company can do that.
We are currently using the open source solution so it's free.
There's a learning curve to this solution, it's not as simple to use as some of the other GUI based firewalls. You need to play around with it a bit.
I would rate this solution an eight out of 10.
I tested it for firewall, networks, and network stability and as a VPN access point.
I especially like the VPN part. It works like a charm.
I tried pfSense, and it has a big issue with file system consistency, and this is what drove me to OPNsense. The file system stability is quite a big issue for us. We have a lot of outages related to power issues, and OPNsense is much more stable on this side.
I would like it to be more stable on the file system part. It also has an issue with the ARP publishing, but it's common to BSD, and some providers experience issues with Layer 2 connectivity.
I tested pfSense for six months, but it had quite a lot of networking issues related to latency and ARP publishing. So, I immediately switched to OPNsense.
I'd like to see its stability improved. I know the BSD Kernel is more capable than what pfSense provides at this time.
It's scalable. It implements specific protocols for scalability.
The initial setup is straightforward. It took me about ten to 15 minutes to install it and maybe half an hour for configuration.
I implemented this solution.
I would recommend this solution if there are no power issues. It's stable and performs well, even on older hardware.
On a scale from one to ten, I would give pfSense a nine.