Our primary use case for this solution is using it as a VPN to connect our data centers and our offices with Windows servers.
Also, we use OPNsense as a general firewall for protocol warnings on IIS.
Our primary use case for this solution is using it as a VPN to connect our data centers and our offices with Windows servers.
Also, we use OPNsense as a general firewall for protocol warnings on IIS.
OPNsense has been useful. It's easy to use. We can open a new VPN connection easily. It's much easier than with Fortinet in our experience. It is open source licensed.
Open source software operates well. It's a good product. It's what FortiGate was with licensing. You need new licenses for it now. OPNsense is much more flexible.
The feature that we found most valuable is the flexibility. It has nothing to do with operating the firewall. It's that we can program it the way we want.
There is no need to fight with the user interface.
In our experience, OPNsense showed me some problems when using it in different environments. The problem is integration with a virtual server.
In general, OPNsense is sweet, pretty, and neat. It's still in development. I expect the next release in the fall. Maybe they are going to polish it more.
I would love a buy a new VPN. We experience problems with the old one. In high variables, it shuts off. We want to switch to a new one.
With the stability of this solution, we have had no problems except with high availability when we switch remote machines on.
Sometimes, it disconnects the VPN. That's the only problem we have experienced so far.
We don't have too much traffic. With our traffic, it's working great. We don't expect to have a very big traffic load. Directly within our offices, maybe 20 or 30 people.
For the internet server, they are using our service. We have people on 100 home VPN connections. The final users are in the thousands. We are using it in all our offices.
We only use OPNsense now. We migrated from FortiGate. We removed all FortiGate software. That is the only problem we had using the tool.
We did not require any help from the support team.
Previously, we used the Fortinet FortiGate switch because of the devices we have. They were limited to maybe 100-200 MB and were slowing down very drastically with Fortinet.
For many different reasons and because I need to do IP implementation that was not very compatible with our VPN, we switched. Now we have no problem integrating the VPN.
We switched to this open source solution and so far we are happy with it.
The initial set up was very easy. We had it working in one week or so. It was pretty fast.
We did the initial setup only by ourselves.
We are not paying any licensing fees. OPNsense is completely free for us.
We evaluated other products for defense similar to OPNsense. We weren't happy with the whole difference. We were happy with the company behind OPNsense.
We will pay for OPNsense if required, but that is the main reason we chose it.
My first advice is to check the recommendations. They have online information to spec it out in general. OPNsense is a great tool for problem-solving with a VPN. It's very nice.
On a scale of one to ten, I would rate this product an 8. It still needs to mature. It's new, only two years or three in the market. They are doing great improvements. They still need to fix little things with the high availability and the user interface. That needs to be polished, but they are doing a great job.
I use OPNsense primarily for network security. It involves basic firewall operations and GeoIP location functionalities. I've got multiple versions running, some on hardware purchased and some on VPSs.
The most valuable features include the basic firewall functionality and the GeoIP location services. OPNsense is very stable, easy to upgrade, and maintain. I can work efficiently, knowing it does what it needs to do.
OPNsense should improve its performance in handling large volumes of voice traffic. It needs more support for Vigoroute and extensive VPN technologies. Enhancing its performance for significant amounts of data traffic would make it closer to a perfect solution.
I've been working with OPNsense for about five years.
I rate OPNsense's stability as very high. I would give it a nine out of ten. The only challenge faced was its inadequacy to manage large voice traffic effectively, even with dedicated hardware. It couldn't keep up with the packet per second for voice load, requiring a revert in our setup.
OPNsense struggles to handle large volumes of voice traffic, indicating scalability issues in that specific use case.
I haven't used technical support. I rely on forums and manage the setup independently.
The only other similar product I can compare is FortiGate. Overall, I find OPNsense more user-friendly.
I consider the pricing of OPNsense to be high when compared with other market products. However, as a free firewall product, it is one of the best available currently.
I only evaluated FortiGate alongside OPNsense, as they are the two offerings from my company.
For small to medium businesses, I recommend OPNsense. I'd rate it eight point five out of ten.
I mostly rely on the solution's network intrusion detection and prevention system, along with other systems, CMs, and log management. We are currently satisfied with the solution's threat intelligence. It's a pretty much in-house developed solution because it's in a Wazuh server. We have several scripts around it, allowing us to improve our posture on threats.
SD-WAN (software-defined wide area network) is integrated into some restricted service providers for OPNSense.
I pretty much like the solution's APIs, but it's somehow limited. I would like the APIs to be more mature and more developed and have more options to automate threat hunting. Also, I would like to see more drill-down possibilities.
We have to rely on specific hardware for the in-depth analysis of NetFlow. Although we have an interface on OPNsense, it's not as easy to use on the security side as other solutions.
I have been using OPNsense since 2016.
I rate the solution ten out of ten for stability.
OPNsense is an extremely scalable solution. I played on one network with CARP, and I was pretty happy with what I achieved there.
Before OPNsense, we worked with the Cisco ASA 5505 product for three years. Although it included the FirePOWER part, it was quite a poor experience.
OPNsense has helped reduce the speed of threat detection and containment from 50 minutes to 15 minutes.
I have quite a background in Berkeley Software Distribution (BSD) systems. I was looking into BSD, especially for the packet filter side. While evaluating, OPNsense was the most solid solution. I was also considering pfSense as my first option, but it is not so strong on the file system side.
OPNsense is a strong and solid solution that is easy to interact with. I don't see much on the new generation of firewalls, and only a few solutions are available for OPNsense. OPNsense handles network traffic much faster during peak loads because it's on dedicated hardware. I would recommend OPNsense when no specific topic prevents me from recommending OpenSense.
Overall, I rate the solution an eight out of ten.
I'm using it as a proxy in several scenarios.
There are a lot of features I like. One of the most valuable features is the network checking. Additionally, the firewall and web filtering functionalities are highly useful.
There are some add-ons that need enhancements to make management easier for users, especially the reporting features. Some reports don't show the level of detail I'm looking for, and I've had trouble installing certain add-ons, especially for Internet bandwidth shaping within my company. So, this is an area of improvement for me.
I have been using OPNsense for more than six years. I currently use the latest version.
I would rate stability a seven out of ten. I've encountered some instability after a recent update.
It just doesn't respond, so I have to restart it over and over again to try to figure out what the problem is. I haven't been able to find the problem yet.
I would rate the scalability a nine out of ten. There is room for improvement.
In my organization, there are 400 users, and OPNsense serves as our gateway and proxy for all of them. Therefore, all the users go through the gateway.
The initial setup is very easy. The installation just takes minutes, but setting up everything may take a couple of hours.
It's reasonably priced. It's not expensive.
Overall, I would rate the solution an eight out of ten. I just want to say that it's the best open-source firewall. Strongly recommended.
I use it for firewall purposes and OpenVPN. Another use is to protect the servers inside my company.
I am using its latest version. It is deployed on my own server.
It has an open license. It works very well, and there is an update every month.
Its interface should be a little bit better.
I have been using this solution for three years.
It is stable. A month ago, I had an issue for two weeks, but other than that, it has been stable.
I don't need scalability. It is a small company. It is a small network. I just need a small firewall at the entrance of the network. I don't need to expand it.
In terms of its users, it is the firewall to protect the company, and I am the only one to touch this product.
I have never contacted their support.
I used another one a long time ago. I don't remember the name. I went for this because it has an open license and a lot of people use it. I don't remember why, but I prefer this one over pfSense.
It is not so difficult to set up. You need to know the minimum things. I do it myself, and I am not an IT person. It is not my job.
It is open source and free.
I can recommend this product but only to people who are able to use it. It is not for everybody. You need to know how to manage it.
I would rate it a 10 out of 10.
It is a firewall.
The VPN has helped us a lot.
It has firewall and VPN capabilities, which are very valuable features.
The scalability needs improvement.
I have been working with OPNsense for the past five years.
I would rate the stability a six out of ten because we've encountered issues with OPNsense when establishing a side-to-side VPN using IPSec.
I would rate the scalability a five out of ten.
The configuration and access VPN functionality in OPNsense are satisfactory and work well. Currently, I prefer using Azure Firewall for my firewall needs, even though it might not be the absolute best option. My preference is due to a lack of experience with other Windows-based solutions.
The deployment process takes almost an hour. The installation process involves several steps. First, you need to install the software. Then, configure the interfaces as needed. After that, establish the necessary rules for the software to function correctly. Finally, configure the VPN settings to ensure secure communication. I rate the solution a seven out of ten.
I would rate the pricing a three out of ten.
It's easy to configure, and it's good. I rate it a seven out of ten.
The tool's integration is more like a button press.
pfSense has better performance and quicker updates.
I have been working with the product for six months.
The tool is more stable than pfSense because it has the drivers for my network card, Realtek. I didn't know at the time because manufacturers sometimes don't advertise what network cards they come with. I bought a computer with Realtek, and pfSense says immediately, out of the box, that it doesn't work with Realtek cards. OPNsense is the same, but it does have a way of installing the Realtek drivers, which gives you a lot more stability overall on the system.
I didn't contact the tool's technical team yet.
The tool's deployment is easy. Apart from Cisco firewalls and Fortinet, if we talk about Untangle, pfSense, OPNsense, and so on, they are fairly quick to set up. It's not something you spend too much time on. It's a firewall, so you can spend months tweaking the system. If you know what you're doing, you can spend forever on logs, checking and tweaking the system because there's always a new update or feature coming up. Then you start playing with them, tweaking settings, checking logs, blocking or unblocking different things.
You can stay in that loop forever. But for a startup, the initial configuration is fairly easy and quick. It can be completed in 30 minutes.
I've used the free version. My computer with two network cards at home allows me to try as many different software options as I want. I did pay for the license, but it was for the Zenarmor license, which is the packet inspection tool. They use AI for packet inspection, which integrates with OPNsense and pfSense.
I'm not using OPNsense at the moment. I work with many different technologies and keep testing various setups. Currently, I've gone fully customized. I'm using a Linux server configured as my router and firewall, and I'm using Zenarmor for packet inspection.
This setup allowed me to easily configure SSL VPN and port forwarding for specific ports, which isn't as straightforward with other systems. I've tried several, including Untangle, pfSense, and OPNsense, but found them somewhat restrictive.
OpenSense is quite good. I like it. It has many services and is somewhat similar to the WatchGuard system. I honestly have no complaints; it was a very good experience. It's easy to set up, especially if you know what you're doing. It also offers a nice library of add-ons.
However, if you have appliances with Intel network cards, I would probably go for pfSense instead. Firmware updates and other updates come a bit faster, making it a more reliable service than OPNsense.
Everything that comes up on OPNsense appears first on pfSense. Some features are not yet available on OPNsense, and they haven't announced a release date. However, I'm confident they will eventually release these features, as they have previously done.
Ultimately, choosing between pfSense and OPNsense is more of a personal preference since they are very similar. Both are FreeBSD systems, operating in similar situations and offering comparable functionality.
Now, I'm just using a Linux server. I can monitor the system, reboot the card, install Apache, and redirect web servers within my home directly to the firewall. This eliminates the need for third-party boxes or other connected computers, allowing me to do everything in the same box. It gives me a lot more freedom.
That's the main reason I stopped using the other systems. I used OPNsense for about six months, which shows I've tried various solutions to find the best one. Despite all the good things I'm saying about OPNsense, I did stay with it longer than pfSense.
I traveled to China, so I used my home as my VPN instead of paying for one. They block VPN services in China, so I was using OpenVPN at home. OpenVPN is a known service, but it gets blocked there. The only way to do it was through SSL VPN, which worked fine. But, talking about OPNsense, everything was working fine. I had no problems. I just had to move away because I needed to use port 443 for something else on my web server, and I can't have a web server together with other stuff. It's a bit more complicated to configure because I use Nginx and Apache, too. You can install these tools on OPNsense, but I found it more complicated than just going onto the command line and doing it.
If you want to use something like OPNsense for FreeBSD, use pfSense instead. Unless, obviously, like me, the person in question has some hardware incompatibility with pfSense. Only then would I go for OPNsense. Because, I mean, they're the same systems, but pfSense is a bit better in terms of overall performance, and security updates come quicker and more often.
I rate the overall product an eight out of ten.
I am currently working with OPNsense to see if I can learn it. This product is used in small to medium-sized businesses for security, UTM, and other similar operations. We are a solution provider and this is one of the security solutions that we implement for our clients.
Offering this solution has provided some of our clients with firewall protection and UTM, which basically just protects them from the internet.
The most valuable features are reporting, the Sensei plugin, and firewall capabilities.
The vendor should offer compatibility-approved boxes, or at least stock one with OPNsense already installed. This would make it a one-stop-shop, and people would not have to worry about sourcing the hardware separately.
I would like to see better SD-WAN performance. I think that could be a very good bonus because SD-WAN is all the rage these days. That is probably the big thing that people need to improve upon, in terms of combining two, three, or four links.
The interface should continue to improve, which would make things a bit easier. For me, it was already easy, but nonetheless, it is quicker to install a FortiGate firewall.
I have been working with OPNsense for approximately one year.
This is a very stable product and I've had no issues with it.
This product is very scalable. I always buy hardware that can handle a lot of connections and a lot of users. So, in terms of scalability, all you have to do is upgrade your hardware. Or, it is especially scalable if you use the VM version because you only have to provision more resources.
We regularly have between 20 and 50 users, although sometimes it is as little as 5 or 10.
I have not been in contact with technical support. So far, everything has been good because I just use Google to find all of the answers and all of my solutions.
I primarily work with FortiGate, but I am currently dabbling in OPNSense to see if I can learn it. I've also installed Cisco in the past, as well as Sophos.
FortiGate is a better firewall but that is commercial software that you have to buy a license for. OPNsense is suitable for small to medium-sized businesses. FortiGate is definitely quicker to install because you just buy the appliance. It's also more user-friendly.
If you dabble a bit with OPNsense, it can do about 90% of what FortiGate can do, but FortiGate is more user-friendly. Of course, with OPNsense being open-source, it will always beat FortiGate on price.
I think that with FortiGate, it is easier to log a support call. I haven't really needed technical support for OPNsense, but I know that FortiGate has the score logging facility, whereby you can just quickly log a call. There's also support in South Africa and I know company people that I can just call for help with FortiGate. But with OPNsense, I haven't really had a complicated setup, so for me, it has been okay and it hasn't been an issue.
The SD-WAN is also better on FortiGate. I think that they are heavily focused on security, so they might have better application profiles and other things, such as application threat detections.
Although about 80% of our clients ask for FortiGate, some of our clients ask for Sophos instead. For example, there are some banks and commercial institutions that ask for Sophos.
The initial setup is straightforward and quite simplified. I work in a Linux environment so for me, it will be a bit easier.
OPNsense is an open-source solution and it is free to use. You need only purchase the hardware.
The suitability of this product often depends on the size of the company, although sometimes there are clients that just want FortiGate and they're not open for negotiation. Personally, I like open-source and it's always a bonus if I can get stuff for free.
I would rate this solution a seven out of ten.