Try our new research platform with insights from 80,000+ expert users
John Lloyd - PeerSpot reviewer
Vice President at Griffin Networks
Reseller
Top 10
Provides a lot of different applications for VPN and multi-way traffic
Pros and Cons
  • "Netgate pfSense has a lot of different applications you can use for VPN and multi-way traffic."
  • "The solution should provide a single pane of glass and a management console for all devices."

What is our primary use case?

We use Netgate pfSense to deploy to our customers.

What is most valuable?

Netgate pfSense has a lot of different applications you can use for VPN and multi-way traffic. It's very simple as far as firewall rules and NAT rules go. It's an overall solid application and product. We don't really have too many RMAs, and there are no monthly fees associated with it.

Netgate pfSense is extremely flexible due to the nature of the multi packages that you can use for different VPNs. You can do the same thing in multiple different ways, and it's very handy when you're trying to troubleshoot problems.

You can add packages to pfSense with Snort and pfBlocker to keep hackers out. We've been using pfSense by creating rules that only allow our IP addresses into those devices. That way, they are never open to the outside world, and we've been doing that for almost 20 years.

Netgate pfSense has a high-availability application called CARP that allows you to put two devices in failover mode.

The visibility that pfSense Plus provides helps us optimize performance because that's all in the updates they push out.

We use pfSense Plus on Amazon EC2 VMs, and it's been pretty good and fairly quick in testing.

What needs improvement?

The solution should provide a single pane of glass and a management console for all devices.

For how long have I used the solution?

I have been using Netgate pfSense for 20 years.

Buyer's Guide
Netgate pfSense
January 2025
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
832,138 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is fairly stable unless there's an environmental issue.

I rate the solution's stability an eight out of ten.

What do I think about the scalability of the solution?

I rate the solution a nine out of ten for scalability.

Which solution did I use previously and why did I switch?

We have previously used SonicWall. SonicWall has all the packages prebuilt. With Netgate pfSense, you have to download and install the packages and then configure everything. These include antivirus and anti-spam, which you have to turn on, but they cost money.

It's really just a configuration setup. SonicWall and Netgate pfSense are two very different firewalls. It's very difficult to compare them other than monthly and yearly licensing versus buying at once.

How was the initial setup?

The solution's initial setup is super easy. I've taught several people with little knowledge of how to do it, and it's been very simple to explain and set up.

What about the implementation team?

From start to finish, the solution's deployment can be done by one person in probably an hour.

What's my experience with pricing, setup cost, and licensing?

I think Netgate needs to charge a nominal fee for the actual software so that it gets paid for because a lot of people skirt the licensing and use the community edition. Netgate should charge something nominal like $50 a year for the community edition to deter people from using it for everything.

What other advice do I have?

Depending on the specifics, adding and configuring features to pfSense could take three or four hours for a RADIUS server with a VPN or less than two minutes to set up a NAT rule.

We were embedded with pfSense in 2023. It took us some time after we deployed the solution to see the benefits.

I have 236 devices in production. Some of the cheaper models are more susceptible to power outages, which cause them to fail. However, some of the more robust models are expensive, but they last for many, many years, and there's very little interaction that we have to do with them.

The only maintenance the solution needs is just updates to the device as required.

New users should do some basic research before configuring Netgate pfSense. There's lots of information about the tool on the web, and it's very easy to get the answers to your questions because somebody's already probably run into that issue. There are tutorials on basic configuration on YouTube.

Overall, I rate the solution an eight out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
IT Consultant and Project Coordinator at GE Consulting
Consultant
Top 20
Customizable and easy to configure with responsive support
Pros and Cons
  • "Users can manage everything under one single pane of glass."
  • "Updating some of the packages can be a bit difficult."

What is our primary use case?

I use the solution in two ways. I deploy it commercially and I use it in my home lab as well. 

How has it helped my organization?

It's very easy to deploy. It's nice when you've used something for a while. You get comfortable with all of the benefits. I know what I'm doing. I'm very familiar with the product.

What is most valuable?

The addition of packages makes it very customizable. The flexibility is very good. Not all firewalls out there have that. Typically, you are tied into three or four different plugins. pfSense, however, allows you to add more than the standard handful others offer. 

It's easy to add features and configure them.

They do improve it consistently, which makes me want to return to it over and over as a solution. 

It just introduced, with the latest revision, the ability to save your backups incrementally as well as go back and make changes. I can go back to a particular backup, and that's quite useful.

The solution does prevent data loss. You can pick up your configuration files consistently, whether you want to do it daily, monthly, hourly, et cetera.

Users can manage everything under one single pane of glass. 

I also use pfSense Plus. It provides good features that help minimize downtime. The updates come quicker to Plus, which is helpful. It also helps optimize performance. Having the pane of glass offers consistency in terms of finding things. The UI is very intuitive.

What needs improvement?

Updating some of the packages can be a bit difficult. It's hard to stay on top of them all. There also might be a bit of a lag on updates.

If they could get to something like Meraki, where I could remotely log in and not have to deploy a package to do that, that would be nice to have. 

It would be helpful if they had more documentation. Some online details seem out of date and you have to spend a lot of time going through forums to uncover what everyone else is doing.

For how long have I used the solution?

I've been using the solution for probably ten years. 

What do I think about the stability of the solution?

The stability is very good. I'd rate it nine out of ten. 

What do I think about the scalability of the solution?

Most of my clients who are users are under 50 users. I handle mostly SMBs. I'd rate scalability eight out of ten.

How are customer service and support?

Technical support is awesome. I haven't dealt with them a ton, however, every time I do, via email, within an hour, they've responded. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've used Cisco Meraki over the years. It's a bit different. There's also a cost factor. 

I've also tried OPNsense. I didn't like the look of it after using pfSense for so long. 

How was the initial setup?

The initial deployment is straightforward. It's awesome. I always bench test it before deployment. I do it through my office, not on-site, to go through the various variables that could make things go sideways. 

The implementation only takes about a day. I can manage the process by myself. I don't need a team. 

A majority of my deployments are for home users.

There's not a lot of maintenance. You just want to keep packages updated when the time comes. 

What was our ROI?

I have witnessed an ROI from a remote perspective. I'm able to remote in for some users and fix any problems that way.

What's my experience with pricing, setup cost, and licensing?

The solution is fairly priced. The total cost of ownership is pretty good. They do offer appliances as well and those are quite cost effective. 

What other advice do I have?

I'm a consultant. 

I'd advise new users to learn at home first and play with pfSense just to get used to it. 

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Netgate pfSense
January 2025
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
832,138 professionals have used our research since 2012.
Hunor Dori - PeerSpot reviewer
Network Engineer at a media company with 51-200 employees
Real User
Improved the traffic visibility of the devices we are monitoring
Pros and Cons
  • "The most valuable features of Netgate pfSense are the ease of use and GUI."
  • "pfSense's dashboard offers basic monitoring, but it lacks centralized management for multiple PSM devices and a unified event interface for various services."

What is our primary use case?

I use Netgate pfSense in my home lab and company. I wanted to learn more about networking so I swapped my ISP router with Netgate pfSense.

How has it helped my organization?

Netgate pfSense is a flexible solution. Netgate has its appliances but if I want to use pfSense somewhere else, I can install it into a virtual machine or on my hardware.

I would rate the ease of adding features to Netgate pfSense eight out of ten.

Netgate pfSense has improved the traffic visibility of the devices we are monitoring. Netgate pfSense has also taught me a lot about networking because I got to use an enterprise-grade firewall.

pfSense Plus helps minimize downtime thanks to its ZFS snapshotting feature. This means if we misconfigure something, we can quickly restore our system to a previous working state, reducing downtime.

Both pfSense Plus and the community edition provide visibility that enables us to make data-driven decisions.

Netgate pfSense has provided a reduction in downtime of 30 percent thanks to its user-friendly configuration process.

What is most valuable?

The most valuable features of Netgate pfSense are the ease of use and GUI. 

What needs improvement?

pfSense's dashboard offers basic monitoring, but it lacks centralized management for multiple PSM devices and a unified event interface for various services. Ideally, I'd like a management interface that can handle multiple PSMs, even if they're in different locations. This interface should provide at least status information and basic management features.

For how long have I used the solution?

I have been using Netgate pfSense for three years.

What do I think about the stability of the solution?

I would rate the stability of Netgate pfSense nine out of ten. While I did encounter some issues earlier on, they have all since been resolved. 

What do I think about the scalability of the solution?

Netgate pfSense is scalable. While we haven't used features like the rack-mounted version or maxed out its capabilities, the system is easily scalable. Upgrading to a more powerful model is simple - just export our settings and import them to the new device.

How are customer service and support?

I had to use the technical support twice and they were extremely quick to respond and deal with my issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

While I previously switched from UniFi to pfSense for its wider range of features, the gap between them has narrowed somewhat. However, pfSense remains a more enterprise-focused option, allowing for granular control over specific network elements useful in complex environments. UniFi, on the other hand, offers a less detailed view.

How was the initial setup?

While the initial setup was mostly straightforward, some specific configurations proved challenging and lacked intuitiveness. To address these, I consulted YouTube videos and Netgate's documentation.

I would rate the ease of the setup process a seven out of ten.

Installing pfSense took a full day.

What about the implementation team?

I implemented pfSense myself.

What was our ROI?

pfSense has definitely paid off for me. It's become a rock-solid foundation for my network. Since the memory leak fixes, it's been incredibly stable and requires minimal maintenance.

What's my experience with pricing, setup cost, and licensing?

While pfSense hardware from Netgate might have a higher upfront cost, I've had very little trouble with it. Plus, buying from them directly helps fund the software's development, making it a worthwhile investment in my eyes.

pfSense offers a reasonable total cost of ownership for me. Since I primarily use it at home, I don't need additional features or paid support. However, compared to commercial options like SonicWall, even support costs seem affordable. It's worth noting that advanced features like Suricato or Snort require additional subscriptions for business use, but overall, pfSense remains a cost-effective solution.

What other advice do I have?

I would rate Netgate pfSense nine out of ten.

pfSense handles both my home lab, suitable for a small household, and our company's branch office with roughly 150 on-site users and 50 remote VPN connections. It also facilitates a site-to-site VPN connection between this branch and our main New York office.

pfSense is low-maintenance. While regular updates are important, I typically won't need to perform much additional maintenance beyond occasional logins to check the dashboard and install those updates.

pfSense is a stable and feature-rich firewall, but it lacks  Layer 7 application filtering, which means you can't easily block specific applications. While I haven't personally needed this feature, it's a known gap in pfSense's functionality.

I recommend pfSense overall to others.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
reviewer2510607 - PeerSpot reviewer
Owner at a tech services company with 11-50 employees
Real User
Flexible, minimizes downtime, and offers good support
Pros and Cons
  • "It helps me make more data-driven decisions."
  • "They could make it easier to configure packages."

What is our primary use case?

I use it as a firewall and router. I use it in a few locations. I have three pfSense products.

What is most valuable?

I like that I can geofence and block different countries from accessing my network.

The flexibility is very good.

I noted the benefits of pfSense within a year. I had it on my VM for a year and then put it into production. 

It's good at blocking malware and DNS attacks. I don't use it for data loss prevention.

The solution gives me a single pane of management. Everything is accessible from the dashboard.

It provides features that help me minimize downtime. I have a WAN, and if any of my WANs go down, it's okay; I have them connected to pfSense. 

It helps me make more data-driven decisions. 

With pfSense, I can optimize performance. 

I don't really need too many features. I just use it as a plain firewall. I like to keep it clean. I don't like to run too many things on it.

What needs improvement?

The configuration can be a little difficult. You need to know the system a little bit. Even now, I do have one in a VM where I test my stuff, and then implement it into production.

They could make it easier to configure packages. They could have a wizard that helps you out a bit more.

For how long have I used the solution?

I've used the solution for more than five years. 

What do I think about the stability of the solution?

I haven't had any issues with stability.

What do I think about the scalability of the solution?

I haven't had issues with scalability. It's easy to back it up and load the backup.

How are customer service and support?

Technical support is fast to respond. However, I did have to eventually pay for them to help me out. I had some problems with the firmware. Someone remote into my appliance and fixed it. They patched it up and now it's working fine. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've used OPNsense and SonicWall previously. 

While pfSense has more features, OPNsense is a lot easier to use. 

How was the initial setup?

I have the solution as an appliance. Deployment for a device is a little bit hard, so it can take a few days. 

Maintenance is required every few days.

What about the implementation team?

I did not have any help from outside consultants. I manage the deployment myself. I was able to eventually figure it out myself via forums. 

What's my experience with pricing, setup cost, and licensing?

I like the fact that there is a free version. I'd like the entire offering to be free. That said, it's 100% worth the cost of ownership.

What other advice do I have?

I use both the paid and community version.

I'd rate the solution eight out of ten.

I would advise new users to test it before implementing it in their environment. 

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
reviewer1493565 - PeerSpot reviewer
Managing Director at a tech services company with 11-50 employees
Reseller
Top 20
Has good DNS and multi-WAN routing capabilities
Pros and Cons
  • "The most valuable feature is the routing capability. We're primarily using the appliance as a router to provide DNS and multi-WAN routing."
  • "The intrusion protection system is provided by a third-party provider that's verified by pfSense. It would be best to have an option for IPS because when you deploy pfSense to a SOC, you have to subscribe to another IPS provider. The IPS should be a default feature. On the other hand, that's also the benefit of pfSense because you can also acquire another IPS solution."

What is our primary use case?

We use our Netgate appliance in our office and resell Netgate appliances and services.

How has it helped my organization?

We realized the benefits of pfSense immediately. For example, we needed to connect two ISP connections to use them simultaneously in the office without separating the network. We immediately saw the benefit upon installation. Otherwise, we would have two different connection lines and need to separate the users between the two networks. With pfSense, we could get that benefit instantly. 

Some applications also deliver benefits over time in addition to the immediate benefit on the routing side of an installation. Eventually, you will see other benefits in creating certain policies that apply to users, such as the firewall's filtering capabilities.

In terms of data loss, the ability to create policies that would be a step toward intrusion prevention or malware blocking would be a secondary benefit. As I understand, pfSense per se is Netgate and we have a data loss feature in itself. As a layer of protection, then that creates a layer of protection against data loss.

PfSense offers single-pane-of-glass management. When you log into the system, you immediately see this dashboard, which shows the resources and utilization of the pfSense device. The most important information is in that dashboard. In our case, we have a standby monitor where IT support would look at it. If something is created there, that gives them an idea of how that something is set up. 

The pfSense Plus edition has features that prevent downtime, such as load balancing. We can automatically route traffic to another ISP should the primary or the secondary be down. It's the most important feature for some of our clients. It prevents downtime because it will automatically route to the active connection. 

We have to go through a step that gives you visibility into certain alarms that indicate a possible security issue. That feature provides visibility into potential network security issues. We run servers with applications that are critical to office operations. When monitoring the network, the server is the priority.  Having clear protection ensures productivity because sometimes issues inside the application impact the use inside the office and those outside the office. PfSense is able to add a layer of protection to these application servers.

What is most valuable?

The most valuable feature is the routing capability. We're primarily using the appliance as a router to provide DNS and multi-WAN routing. Flexibility is also critical. The solution provides flexibility in terms of creating firewall rules. It's extensive, which means you can create several rules with different elements involving firewall policies.

It's easy to add features to pfSense. When I started, I didn't have a networking background, but I was able to follow the materials and learn through hands-on practice. The interface is easy to navigate and understandable.

What needs improvement?

The intrusion protection system is provided by a third-party provider that's verified by pfSense. It would be best to have an option for IPS because when you deploy pfSense to a SOC, you have to subscribe to another IPS provider.  The IPS should be a default feature. On the other hand, that's also the benefit of pfSense because you can also acquire another IPS solution. 

For how long have I used the solution?

We started using Netgate in 2016, so we have used it for almost nine years.

What do I think about the stability of the solution?

I can only think of one instance where stability would be a problem, and that's the power supply. We have tested the hardware for a single power supply, so if it was deployed in a location where the power supply is unstable and without the proper UPS, then it will cause problems. That is not due to pfSense per se. It requires a redundant power supply on the end user side to provide sufficient UPS or some sort of backup. On the software side, I don't recall a major incident where the software got corrupted.

Sometimes, it could get corrupted in the course of maintenance. For example, if the logs are not cleared, and the storage becomes full over time. 

What do I think about the scalability of the solution?

The hardware is not scalable. Normally, we ask clients to project where they will be in two or three years and advise them to buy a model that fits their requirements. If you already have fixed hardware but you haven't factored in the number of users, you will hit a wall. PfSense has some scalability, but it depends on your hardware. 

How are customer service and support?

I rate Netgate support 10 out of 10. When you acquire Netgate hardware, you gain access to online support. We've had some issues that couldn't be resolved, so we had to raise a ticket to online support. The feedback was quick, and we didn't have any major issues left unresolved because the online support was effective.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We deployed certain prescribed network equipment, like the Fortinet firewall. We started using pfSense Community Edition because it's free and highly available, but we saw the benefit of the commercial version, which is more stable, so we decided to upgrade to that. 

How was the initial setup?

When we started, we were already using the community version. It took some time because we have some IT personnel. Sometimes, when we have just hired an IT staff member, and we introduce them to pfSense, I see that they can easily adapt or understand the features and how to manage the firewall. They can install the community version and play with it. The installation is easy and staff can learn it hands-on.

We deployed it in-house, but when we hire some IT support, we require them to have some exposure to pfSense. The pfSense community edition is pretty popular, so we don't have much use for consultants. We provide the service because we understand pfSense.

PfSense is easy to maintain. You only need to modify the configuration when there are additions to the network or you need to change the firewall rules. Other than that, the features and systems don't require much maintenance. 

What's my experience with pricing, setup cost, and licensing?

In the Philippines, most users are small or medium-sized enterprises. Small businesses also need a level of protection, so sometimes, what they need is basic protection. For example, they must protect their ports so they cannot be scanned from outside and layered protection and filtering. They would like something without a recurring cost, which pfSense can provide for basic features. 

PfSense offers solid value for small and medium enterprises, so it's highly applicable. It serves our purpose even in our use case. We have certain critical applications that must be protected, and the pricing is good for us. The good thing about pfSense is that it supports layer three or IPSec VPN at no additional cost. That in itself is a good feature for small and medium enterprises, and we can deploy VPN at no additional cost. We can deploy other applications, adding a layer of VPN without much expense.

What other advice do I have?

I rate Netgate pfSense eight out of 10. 

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Chief Technology Officer at Dcomm
Real User
Top 20
Plug-and-play, easy to use, and responsive support
Pros and Cons
  • "The solution is very stable. Issues are rare unless a box gets hit with a power surge or something."
  • "If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update the, and keep them all central. A management portal would be very nice."

What is our primary use case?

We're using our offices including the main endpoint VPN connections from the main office to our seller offices.

What is most valuable?

The ability to load third-party apps, et cetera,  into the firewall is pretty useful for a commercial-grade router and file, which is very customizable.

Out of the box, it's about 90% plug-and-play. The last piece, you do need to know how you're setting the firewall up for your environment. It varies on what you're trying to do with it. It can be really easy or difficult, depending on your knowledge base for the application.

We were able to witness the benefits of the product pretty much immediately.

Once you've navigated around it, it's pretty self-explanatory as to where to go. Compared to other products out there, it's pretty easy.

What needs improvement?

We do have a sort of single pane of glass for management purposes. You do have to dig around. If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update them, and keep them all central. A management portal would be very nice.

For how long have I used the solution?

I've been using the solution for seven years. 

What do I think about the stability of the solution?

The solution is very stable. Issues are rare unless a box gets hit with a power surge or something. 

What do I think about the scalability of the solution?

I found the solution very scalable. I can load multiple VMs on it and add a second port onto it. Depending on your deployment, it is very scalable. 

How are customer service and support?

I've only contacted support for corrupted systems. If the unit loses power and comes back on every once in a while, the file system gets corrupted, or it won't boot the device, and you have to reimage the whole thing, in those instances, I've had to reach out to them. They are pretty quick. I can get help within an hour even with just the free version. I imagine the paid version has good support. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Ubiquiti, which was not a great solution. We also used something previously to that. Their interface was very clunky. You'd have to go through multiple different routes to get to the same thing that pfSense has on a single drop-down. pfSense has a more user-friendly setup. Plus, it has CLI integration, which is great. You can make configurations in the command prompt too, which is a lot easier.

How was the initial setup?

To me, the setup is fairly easy. That said, I already knew what I was doing to set it up. If I were coming fresh out into the network and environment, I'd never switch one of the firewalls; there may be a challenge to go through and figure out what the router can do to make the deployment work. When you get the box, you plug it in. There are a lot of features that are ported in that don't come pre-installed. However, they have a complete database listed in their browser. You just go down and pick what services you need. If you don't know what is there, it may take you a while to figure out what the unit is capable of. 

There is no maintenance beyond occasional updates. They don't push those out too often. However, when they do come out, you have to go through them one by one to make sure the update is successful. It would be easier if you could do everything all at once and be done with it.

How long it takes to deploy varies as each office is different. If I'm building three or four VLANs, that's going to take time. In my role, I built one base configuration that contains the VLANs IP servers that I want to use. I've extracted that as a file that I can modify and push to different boxes. So if I get 100 2100 or 4100, it doesn't matter. All I have to do is change the interface names and push it back to the box. So to me, it's pretty fast, and it already has my settings ready to go.

What about the implementation team?

I handled the initial setup myself. 

What's my experience with pricing, setup cost, and licensing?

I use the community version. For configurations and troubleshooting, you do need to pay. I'm not sure what the pricing is for Plus.

What other advice do I have?

I'd rate the solution ten out of ten. 

I'm a customer and end-user. 

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
CTO at Vigon Business Solutions Limited
Real User
Top 20
Offers cost-efficiency for users and a customizable dashboard
Pros and Cons
  • "The solution's most valuable feature is that it is a highly configurable tool."
  • "Maybe Netgate needs to see if a medium-level Netgate pfSense Plus can be created for smaller organizations."

What is our primary use case?

I use the solution in my company since we operate as a managed services provider that provides security solutions to our customers. I was looking for a device that had the required features my customer wanted, and that fit their budget, so Netgate pfSense is a product that clearly fits this space. Our company has started to deploy the tool for our customers.

How has it helped my organization?

In terms of the benefits of the tool for my organization, I am not an end user of the product. My customers use the tool, and what they have been able to achieve using Netgate pfSense is that they are better able to control their spending on internet services. Without Netgate pfSense, users can just take up the whole bandwidth from the network and make it difficult for other people to work, but with the bandwidth control feature, including the built-in functionalities in the solution, you can control what individual IP addresses on the network can do, thereby bringing in more control. My customers have even told their other MSPs how they need to increase their bandwidth, whereas what they needed to do was just control what they already had in Netgate pfSense. Controlling the bandwidth has brought savings to my customers, and it also helped them to have a better user experience with the internet services that they were purchasing.

What is most valuable?

The solution's most valuable feature is that it is a highly configurable tool. The tool has a lot of options, so there is literally nothing you cannot do with it, but you have to know your way around the product.

The problems my company's clients wanted to resolve by implementing Netgate pfSense were that they wanted a provision for enterprise network security, static control over load balancing, and failover. This area is typically the use case for our customers.

If I assess Netgate pfSense's flexibility, I would say that it is a highly configurable tool, which means there are many options. It has a lot of flexibility in terms of configuration. You can write different rule sets for different traffic types and scenarios. On the same firewall, you could have lots of variety in how you want to handle traffic.

If I want to add features to Netgate pfSense, I would say that because the structure is modular, there is an app store where you can download whatever feature sets you want but are not included by default in the tool. The tool also supports many third-party plug-ins. It is possible to add features to the tool.

Netgate pfSense provides a single pane of glass for management with a customizable dashboard. You can customize the dashboard. Any handy modules you want are possible on a dashboard with a single-view window where you can see what is going on, and it is customizable.

The single pane of glass management feature has an impact on operations since it simplifies management because, typically, my company is not on the customers' premises, so we need to have remote access to the firewall. The people who are doing the back-end monitoring have a single view, which makes operations easy because, with one single glance, you can tell if there is a challenge or not in the tool.

Netgate pfSense Plus is what came on the device that my customers purchased by default.

In terms of whether Netgate pfSense Plus helps minimize downtime, I would say that the main difference between Netgate pfSense and Netgate pfSense Plus is the availability of enterprise support. When I have issues or bugs, I have someone to go to and say that something is not working and ask what we can do about it, after which I can get a response. When it comes to Netgate pfSense and Netgate pfSense Plus, the software is almost the same. One of the versions comes with enterprise backing, so I have some support and OEM support instead of relying on the community. I have a proper company I could talk to about any challenges my customers and I may have. The support does help reduce the downtime. I haven't actually had any downtime with the tool on my customers' end. I haven't had any downtime using the tool.

In terms of whether Netgate pfSense provides visibility that enables my company's clients or me to make data-driven decisions if we don't speak of specific use cases, I would say that it is typically a next-generation firewall that does bandwidth control and provides IPS and IDS features. For instance, if my customers wanted to have an idea of how much internet traffic they are using, then Netgate pfSense would give you graphs that you can export and do further analysis. I don't think the tool's use cases are tied to data or data analysis.

What needs improvement?

I can’t get any area where improvements are needed in the tool off the top of my head. I haven't had any challenges I couldn't resolve between myself and the support. Maybe Netgate needs to see if a medium-level Netgate pfSense Plus can be created for smaller organizations.

Most of what I need is already in the tool. If there is any need associated with it, I will be sure to report it to the support team.

For how long have I used the solution?

I have been using Netgate pfSense for two and a half years. My company serves as an MSP for Netgate pfSense.

What do I think about the stability of the solution?

The only area to consider is that sometimes when there is an upgrade, there may be some changes. But when you have uploaded a stable version of the firmware, the operating system, I think it is a very stable tool. I have not had any issues around stability. Stability-wise, I rate the solution a seven out of ten.

What do I think about the scalability of the solution?

I deal with clients in areas such as residential, government organizations, and medium-scale businesses. I have one customer in each category, which includes small, medium, and large businesses.

Normally, when it comes to the size of hardware before you make a purchase, due diligence is required to see that the device would be able to handle the current requirements and have some room for growth. With the solution itself, I don't see the need to discuss questions related to its scalability because that would be a function of the hardware and the size of the network where you are deploying the tool. Typically, if you have a huge network, you need to make sure that you have the equipment that can handle that volume of traffic from the on-site. The scalability aspect is not really a good assessment criterion to use to measure the tool. If I put things into a certain context and say that we have a network that has around 100 people, then you don't put up a device that can manage 100 people. Instead, you need to get a device that can manage 150 to 200 people, and then you can create room for growth. If you don't follow these steps, you will have to change the device after some time.

How are customer service and support?

The solution's technical support team is okay. They respond quickly. I have only had the need to place two support calls in all of my dealings so far, and they were able to figure out my issues and resolve them very quickly. I rate the technical support a seven to eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

In our company, we typically deploy a mix of security products that we prefer. At our organization, we have Sophos, Fortinet, and Netgate pfSense. Sophos, Fortinet, and Netgate pfSense are pretty standard. Netgate pfSense has all of the features that Sophos and Fortinet have, but what is more, it can be used without having to have separate licensing. Netgate pfSense really beats the other tools hands down in terms of price because there are no individual license costs for the features that you want to use. In Sophos, certain features require separate licensing. Netgate pfSense's advantages over other tools in price make it a top choice over the others. In our company, we have some customers who are particular about products, and for such customers, we provide them with what they request. For those who don't mind trying something different, Netgate pfSense is our default choice.

How was the initial setup?

The product's initial setup phase is straightforward. The complexities in the deployment are produced by customers who do not know exactly what they want. Some customers have requirements, and my company needs to sit with them and streamline certain areas. The integration and the configuration are not the challenges associated with the tool.

The solution is deployed on an on-premises model.

Typically, if all the configuration information is available, the tool can be deployed in a maximum of two to three days. One can have the standard installation done. The deployment procedure can be done assuming one day for the configuration and the second day for rack mounting. The process is quick when the customer has all of the information they want configured in hand. For some of them, the tool is typically deployed over a period of a few weeks because they don't know or have not decided how they want to implement a particular feature. Still, it would not be a delay from Netgate pfSense's end but rather a delay from the customer side.

What's my experience with pricing, setup cost, and licensing?

I would not call it a cheap tool, but it is very cost-efficient. I don't see any product that gives you the same functionality within the same price brackets offered by Netgate pfSense. There is hardly any need to go to the open-source firewalls, especially with the ones that are coming back, and there are no enterprise security products in the price range that Netgate pfSense falls under.

If I assess the total cost of ownership of Netgate pfSense, I rate it as an eight or nine out of ten.

What other advice do I have?

I don't use Netgate pfSense Plus on Amazon EC2 VMs, and I haven't had a customer who wanted to deploy the tool on the cloud. Most of them purchase and install their hardware directly from Netgate.

The maintenance of the tool's equipment is done once or twice a year just to blow out some dust and make sure it looks physically okay, which is nothing outside of what the regular network devices require. It doesn't require any special maintenance.

I would recommend Netgate pfSense because it is one of the products that my company markets to our customers.

As I have existing customers that use the solution, they serve as a reference point for my new customer. I tell others that I have deployed Netgate pfSense in a few official organizations, their use, and the problems that it has solved for them. I have case studies to speak about. If someone wants to go for a proof of concept, it is something that is doable.

I rate the tool an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
Flag as inappropriate
PeerSpot user
Luke Miller - PeerSpot reviewer
Lead Systems Architect at a manufacturing company with 51-200 employees
Real User
Top 10
Gives us metrics about how the firewalls perform in terms of CPU and memory
Pros and Cons
  • "The stability has been great. We've rarely had any issues that have caused a failover. When we do, the failover has made it. I don't think we've experienced any real impact from it that caused any product issues."
  • "PfSense has the bare necessities essentially, but it isn't an advanced firewall that protects against layer 7 attacks or DDoS. It's not on the same level as Palo Alto, for instance. You can add some higher-level security features, but it doesn't do that out of the box. Maybe there's another thing we can add to it, but it feels like it's not catching more advanced attacks."

What is our primary use case?

We use pfSense as the primary firewall for our data center. 

How has it helped my organization?

We have a high availability setup, so we have had no downtime. PfSense gives us metrics about how the firewalls perform in terms of CPU, memory, etc., but I don't think it tells us how to address it. If we have an issue, we can always open a support ticket.

What is most valuable?

I find pfSense easy to use and configure. We have a high-availability pair, so if one has issues, it will failover to the other automatically. Overall, it's been pretty easy to build VPN tunnels and functions like that.

What needs improvement?

I don't think pfSense is as good about monitoring as it could be. There are logs, but they're kind of hard to get to. You need to send it to a log monitoring system. It's good about monitoring and learning this. You'll get an alert if there's an issue with the firewall itself, but it's not detecting security attacks. 

PfSense has the bare necessities essentially, but it isn't an advanced firewall that protects against layer 7 attacks or DDoS. It's not on the same level as Palo Alto, for instance. You can add some higher-level security features, but it doesn't do that out of the box. Maybe there's another functoin we can add to it, but it feels like it's not catching more advanced attacks.

For how long have I used the solution?

We've used pfSense for around five years.

What do I think about the stability of the solution?

The stability has been great. We've rarely had any issues that have caused a failover. When we do, the failover has made it. I don't think we've experienced any real impact from it that caused any product issues. 

What do I think about the scalability of the solution?

While we've added more IP addresses and traffic, there are some limits to its scalability. We've run into this before with graphical issues. We opened a ticket about that, and they said they found a bug that they were looking into. 

I think we're going to get close to reaching a limit with the mid-to-lower-end models at some point. The scalability is good but probably not great.

How are customer service and support?

Their response has been excellent. Sometimes we've opened a ticket, and we've gotten a response back right, other times it took an hour or so. They're responsive now. 

In terms of the quality of their answers, they have been good to great. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

At previous companies,  I have worked with Cisco and Palo Alto firewalls. Palo Alto is probably a better firewall because it does more blocking. It's also quite a bit more expensive. For what you get, a Netgate pfSense solution is a highly cost-effective firewall.

How was the initial setup?

It was in place when I joined the company, so I wasn't involved in the deployment. It requires some maintenance, like adding new firewall rules or VPN connections. We also upgrade it once or twice a year. 

What's my experience with pricing, setup cost, and licensing?

Including the support costs and the hardware, I think pfSense is reasonably priced. It's very affordable. The total cost of ownership is favorable. We've had a hardware device that lasted over five years, and they're still doing well. We're able to buy at least software support for them.

What other advice do I have?

I rate Netgate pfSense seven out of 10. If you have an enterprise environment, I recommend having two for high availability. Make sure you purchase and keep up with the software support in case there are any issues. Those are the two biggest things that helped us out. 

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Product Categories
Firewalls
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros sharing their opinions.