We primarily use pfSense as a firewall. It's a DHCP server.
IT analyst with 1,001-5,000 employees
Free to use with an easy initial setup and good scalability potential
Pros and Cons
- "We've found the stability to be very good overall."
- "The stability of the product is very good; we haven't had any issues, there aren't bugs or glitches, it doesn't crash or freeze, and it's reliable."
- "The access control aspect of the product could be improved."
- "The access control aspect of the product could be improved."
What is our primary use case?
What is most valuable?
The most valuable aspect of the solution is the way it can browse packages on the internet.
The initial setup is very easy.
We've found the stability to be very good overall.
The product can scale if you need it to.
What needs improvement?
The access control aspect of the product could be improved. There should be more control over everything that the user is doing. It should be able to log and report on everything users are doing.
The product no longer complies with new rules in Brazil. Therefore, we need to move off the solution.
For how long have I used the solution?
I have about five years of experience with the solution. It's been a while since we started using it at our organization.
Buyer's Guide
Netgate pfSense
March 2026
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,728 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability of the product is very good. We haven't had any issues. There aren't bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
We've found the solution to have good scalability. If a company needs to expand, it can do so. That shouldn't be a problem.
We have about 10,000 people using the solution. There is a network manager and about ten people that work directly with the solution.
We won't be increasing usage, however. The Brazilian government recently changed some laws and this product is no longer in compliance. That is one of the reasons we are looking at Palo Alto. We are likely moving away from this solution.
How are customer service and support?
While the websites and forums are excellent, we don't have any dealings directly with technical support. Therefore, we can't speak to how they are in terms of their responsiveness or knowledgability.
Which solution did I use previously and why did I switch?
A long time ago, the company did use a different solution. They switched to pfSense. However, now they are moving away from it as well.
We're also using Palo Alto, however, right now, it's just in the demo phase. The solution seems to be better at centralization, which is a big selling point. We have three school campuses and we'd like to configure a solution from one central location that would work for all three campuses. With Palo Alto, it looks like we can achieve this.
On top of that, with Palo Alto, there are more user control products. You can log everything that you are doing on the internet with it.
How was the initial setup?
The initial setup of the solution is very easy. It's straightforward. There isn't any complexity. A company shouldn't have any troubles with the setup.
What's my experience with pricing, setup cost, and licensing?
We are using a free version of the solution. We don't need to pay any licensing fees.
What other advice do I have?
We are just customers. We don't have a business relationship with the company.
I would recommend the solution to small companies. If you are a small company, you can use pfSense without any issues due to the fact that it's a free solution.
I would rate the solution seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at In.sist d.o.o.
Excellent content protection, content inspection, and application level firewall features
Pros and Cons
- "Content protection, content inspection, and the application level firewall."
- "I recommend this product, it's well-balanced, has a longer history than other solutions so it's not lacking in maturity."
- "Could be simplified for new users."
- "When you're connecting, the interface is very difficult for an inexperienced user in the sense of setting everything up, as it all has to be set manually."
What is our primary use case?
We are a solution provider and deploy this product for our customers. We also use it in our organization. We use both Cisco and pfSense but for our customers we mainly use Sophos and pfSense. I'm the CEO of our company.
How has it helped my organization?
The solution has assisted us by preventing unwanted access. If the solution is configured properly, then you'll be protected to some degree, although you may also need other products.
What is most valuable?
Content protection, content inspection, and the application level firewall are all good features.
What needs improvement?
There's always room for improvement. In general terms, for someone who is not familiar with the product I think ease of use could be improved. When you're connecting, the interface is very difficult for an inexperienced user in the sense of setting everything up, as it all has to be set manually. I've also found that the more features you use influences performance and the drop can be drastic when you use advanced features. I want to achieve a certain level of security and at the same time maintain good performance.
The solution is feature rich enough, but one of the things usually outside the UTM system or gateway system is SIEM. It's an advanced system for managing the possibilities and it would be nice to have a kind of interface in the UTM, to enable connectivity with most SIEM systems.
What do I think about the stability of the solution?
pfSense is rated as one of the good solutions in it's field and stability is good.
What do I think about the scalability of the solution?
The solution is scalable to a degree but we never use it for big companies. We use it for mid-range companies. Our company has a data center and we have companies that are hooked to our data center. We're doing this on-premise for our customers so if the customer has an on-prem information system, we will implement the firewall and UTM at their location. We have plans to increase use because we have good feedback for the product and we have good experience with it. So we are increasing use of pfSense. Actually we are moving away from Sophos and more towards pfSense.
How are customer service and technical support?
Technical support is well organized. Most of it is in-house, but in the case there's also a we have access to a second level if necessary.
Which solution did I use previously and why did I switch?
We were one of the first companies here making UTMs (before they were known as UTMs). We were the first partner of Cobalt, the first appliance creator. When Cobalt was bought from Sun, we made our first network defender line. It was the first appliance that had a firewall, content inspection, constant protection, intrusion prevention, intrusion detection, antivirus, and mail and web server in one box. Our line was mainly distributed all over the Middle East, Asia, and some parts of Europe. We expanded and worked with companies such as Palo Alto, Cisco, Sophos and pfSense. In some areas pfSense is better than Sophos which didn't make the advances they should have. They now have XG, so they have two totally different products in the same area which is one of the reasons I prefer pfSense.
How was the initial setup?
If you carry out a straightforward setup, then you will have straightforward, basic protection, nothing else. It's more complex if you want other things included. We usually start with some research, carry out a basic setup and make the initial monitoring. From there we make additions based on the results of the complete monitoring. Then it's ongoing monitoring all the time and setting or adjusting to the situation.
What was our ROI?
For any compnay, ROI can be seen even if they look at the basic possibility of a crypto virus or the like. The savings on that would be at least two days of lost work and the cost would be more than the cost of the whole system plus maintenance.
What's my experience with pricing, setup cost, and licensing?
Licensing costs depend on company size. pfSense is an open source solution, so there's a charge for support. We offer a first line of support and a second line if required. Payment depends on the contract, because usually it's only covers the firewall. We offer a contract for the network which includes UTM. There's a hardware cost for HP servers and, again, depending on the size of the company, installation cost is about 500-800 Euro. There's an annual maintenance fee included in the networking agreement.
What other advice do I have?
I recommend this product, it's well-balanced, has a longer history than other solutions so it's not lacking in maturity. There is a lot of online support available via YouTube or blogs but professional support is available if required. I highly recommend taking the support because usually people look at the UTM as something which should be set up in the system and left, but that's not the case with these devices. I strongly suggest making an external agreement with a specialized company to deal with security. Users need to have decent protection, not just protection.
I would rate this solution a nine out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Netgate pfSense
March 2026
Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,728 professionals have used our research since 2012.
Systems Administrator at a tech services company with 51-200 employees
A rock-solid, customizable, and free open-source firewall with useful intrusion detection, clustering, and HA features
Pros and Cons
- "The intrusion detection feature is the most valuable. It is an open-source firewall, so there is a lot of material on it. I also find the open VPN capability very nice. It is pretty customizable. The clustering and the high availability are the two biggest things to be able to get out of a firewall."
- "There is so much stuff you can do with it."
- "Their support could be better in terms of the response time."
- "Their support could be better in terms of the response time."
What is our primary use case?
It is my main firewall into the data center and VPNs for clients. It sets up my DMZ and does a whole bunch of other stuff. I am using the latest version.
How has it helped my organization?
We wouldn't be able to function without it.
What is most valuable?
The intrusion detection feature is the most valuable. It is an open-source firewall, so there is a lot of material on it. I also find the open VPN capability very nice.
It is pretty customizable. The clustering and the high availability are the two biggest things to be able to get out of a firewall.
What needs improvement?
Their support could be better in terms of the response time.
What do I think about the stability of the solution?
It has been pretty rock solid.
What do I think about the scalability of the solution?
Its scalability is good. I have got web users and other kinds of users, so there can be five or thousands of users.
How are customer service and technical support?
I paid for some support with them, and it was pretty good. They just could be a little quicker in responding. They have custom level support, so if you got something complicated, they get you up to the upper tiers, but it takes a little bit longer to do that. Once you get there, the support is good. I would rate them an eight out of ten.
Which solution did I use previously and why did I switch?
I used Fortinet previously, and I used Ubiquiti prior to that. We switched partly because of the cost. It also gave me the ability to do the clustering. I can still maintain my VPNs, connections, and other things. I can take down one of the firewalls for maintenance and bring up the other one and not take down my whole user base.
How was the initial setup?
It was not complex. I was able to do it myself, but we had some problems with some of the protocols, and we had to get one of their coders to get in and look at it. Because of that, it was a little complicated to do the high availability stuff.
What about the implementation team?
I did it myself.
What's my experience with pricing, setup cost, and licensing?
I spent a couple of $1,000 on hardware, and the OS was free. A comparable firewall would cost me probably 20 grand. It saved a lot of money.
What other advice do I have?
I would advise others to go for it. I would recommend this solution. It is a good solution. No other solution can beat the price.
There is so much stuff you can do with it. There are so many features, and I have not even scratched the surface on all of them. If it is something that someone doesn't feel like configuring, you can buy a prebuilt system from them and get support.
I would rate pfSense a nine out of ten because of the cost and flexibility. It has been pretty good.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO and Founder at Indicrypt Systems
Stable, scalable with great extensibility
Pros and Cons
- "Great extensibility of the platform."
- "Failover, URL Filtering, Proxy server, traffic monitoring features inbuilt with SNORT IDS/IPS is all we use and have never faced any problem for over 5 years now."
- "User interface is a little clumsy."
- "The user interface could be improved, it's a bit clumsy and clunky."
What is our primary use case?
We mainly use pfSense at client locations where the client is looking for a free alternative for paid/subscription based Network gateway with enterprise grade features
How has it helped my organization?
Being free and open source, we replaced our network gateway with it. Works well on an old Pentium 4 PC with 1 GB of memory. Failover, URL Filtering, Proxy server, traffic monitoring features inbuilt with SNORT IDS/IPS is all we use and have never faced any problem for over 5 years now.
What is most valuable?
The most valuable feature for our company has been the extensibility of the platform which is great. It's a great solution and I have regularly been supplying it to my clients.
What needs improvement?
The user interface could be improved, it's a bit clumsy and clunky.
For how long have I used the solution?
I've been using this solution for more than seven years.
What do I think about the stability of the solution?
This solution is absolutely stable. With some systems there's a necessity to regularly redo the configurations inside the system. With Pfsense that's not the case. I have no issues with it at all.
What do I think about the scalability of the solution?
The solution is very scalable. It has a failover feature so it's highly skilled.
How are customer service and technical support?
Given that the solution is a free and open source product, it doesn't have any technical support center. We just have the online documentation which is not one of the best, but it's good.
Which solution did I use previously and why did I switch?
I previously used a solution from Cyberoam but we had issues with the licensing. That's the reason we mainly stick to Pfsense open source.
How was the initial setup?
The initial setup is a little complex, of intermediate difficulty. It takes about a day.
In terms of deployment, the entire system has been installed and configured to basically take care of a network of roughly around 35 to 40 computers. We have a dedicated physical machine which has been configured and installed throughout.
What other advice do I have?
My only comment would be to suggest that if you wish to implement the solution read the documentation very carefully.
I would rate this solution a nine out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Support Specialist with 51-200 employees
Very stable, relatively easy to set up, and offers good technical support
Pros and Cons
- "The built-in open VPN and the VPN Client Export are the solution's most valuable aspects."
- "The solution is very stable; we've had zero issues, no bugs or glitches, it doesn't crash or freeze, and it's been reliable."
- "There's a bit of a learning curve during the initial implementation."
- "There's a bit of a learning curve during the initial implementation."
What is our primary use case?
We just use the solution as a straight-up firewall. There is no VPN access or anything like that. We just use it as a straight-up firewall and we run Suricata on it as a defense.
What is most valuable?
The built-in open VPN and the VPN Client Export are the solution's most valuable aspects.
What needs improvement?
I cannot recall any features that are lacking.
There's a bit of a learning curve during the initial implementation.
You do have to pay extra for better customer service.
For how long have I used the solution?
We've been using the solution for about six months. It hasn't been too long.
What do I think about the stability of the solution?
The solution is very stable. We've had zero issues. There aren't bugs or glitches. It doesn't crash or freeze. It's been reliable.
What do I think about the scalability of the solution?
I have not tried scaling, therefore, I can't really comment on how easy or hard it would be to expand the service.
There's only one person in the organization using the solution, and that's me.
How are customer service and technical support?
The tech support is excellent if you have a support subscription. If you didn't have that, you could be lining up for a while. It could be a hit or miss, whether you get someone that's actually going to help you.
However, we have a subscription and therefore our support is always excellent. We're quite satisfied with the level of service we're getting.
Which solution did I use previously and why did I switch?
Previously, we used Dell SonicWall. There was just a high cost of licensing all the time, and, with having someone go in and troubleshoot for issues as well, it just wasn't cost-effective anymore. pfSense is simply a better solution.
How was the initial setup?
The initial setup has a bit of a learning curve. It's not complex per se. It just takes some getting used to. After the initial deployment, the other six or seven were easy. I could just copy the configuration of the other ones, change some IP addresses, and I was basically done.
What's my experience with pricing, setup cost, and licensing?
There aren't monthly or yearly licensing costs.
What other advice do I have?
We're just cusomers. We don't have a business relationship with pfSense.
We're using the latest stable version of the solution.
I would 100% recommend the solution to others. On a scale from one to ten, I'd give it a ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
General Manager at Galgus
Open source, easy to deploy, and works really well
Pros and Cons
- "One of the advantages of pfSense is that it is very easy to work with. It is a very good open-source solution, and it works really well. pfSense provides a complete package. For some features, it could be the first solution in the world. It is a very good alternative in the market for a firewall solution. You don't need to go to Cisco or other brands with expensive firewalls. pfSense also allows us to offer some support services."
- "pfSense provides a complete package, for some features it could be the first solution in the world, and it is a very good alternative in the market for a firewall solution so you don't need to go to Cisco or other brands with expensive firewalls."
- "There is more demand for UTMs than a simple firewall. pfSense should support real-time features for handling the latest viruses and threats. It should support real-time checks and real-time status of threats. Some other vendors, such as Fortinet, already offer this type of capability. Such capability will be good for bringing pfSense at the same level as other solutions."
- "There is more demand for UTMs than a simple firewall. pfSense should support real-time features for handling the latest viruses and threats."
What is our primary use case?
Our main business is for WiFi networks. Customers also ask us for simple firewalls, and we use pfSense to add a firewall to provide the complete solution. We are working with the latest version of pfSense.
What is most valuable?
One of the advantages of pfSense is that it is very easy to work with. It is a very good open-source solution, and it works really well.
pfSense provides a complete package. For some features, it could be the first solution in the world. It is a very good alternative in the market for a firewall solution. You don't need to go to Cisco or other brands with expensive firewalls. pfSense also allows us to offer some support services.
What needs improvement?
There is more demand for UTMs than a simple firewall. pfSense should support real-time features for handling the latest viruses and threats. It should support real-time checks and real-time status of threats. Some other vendors, such as Fortinet, already offer this type of capability. Such capability will be good for bringing pfSense at the same level as other solutions.
For how long have I used the solution?
I have been using pfSense for about four or five months.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is easily scalable. It is more of a hardware thing than a software thing.
How was the initial setup?
It is easy to deploy. Our real deployments are for WiFi networks, and then we add one or two firewalls to protect the network. For a small network, it can take one week. For a more complex network, it could be two or three months. We have a few upcoming projects which would require severe thousand firewalls, and it would take us more than a year.
What's my experience with pricing, setup cost, and licensing?
It is open source.
What other advice do I have?
I would recommend pfSense, but it depends on the requirements. There could be other vendors who offer more services than pfSense. For example, Fortinet is a very good brand, and it offers services in a different way. Fortinet also offers more services, but it is very expensive. If you don't need some specific services, pfSense is an excellent solution.
I would rate pfSense a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Principal at a tech services company with 1-10 employees
A great solution that just works and is fast and affordable
Pros and Cons
- "It works. I put pfSense in, and it works. I can't think of any trouble I ever had with it. It runs on heat-sensitive appliances. They don't need a fan, so they don't overheat. It is affordable, fast, and very high-speed. It is built on BSD Unix, and it pretty much runs on any Intel processor."
- "It is affordable, fast, and very high-speed."
- "I've never tried it in large environments. All my clients are small businesses with a handful of employees, so I am not sure how it works in large environments. I keep up with recent versions, and there's nothing I'm waiting for, and nothing breaks when I get a new version."
- "I've never tried it in large environments. All my clients are small businesses with a handful of employees, so I am not sure how it works in large environments."
What is our primary use case?
We use it for small businesses, and most of my clients are using pfSense.
What is most valuable?
It works. I put pfSense in, and it works. I can't think of any trouble I ever had with it. It runs on heat-sensitive appliances. They don't need a fan, so they don't overheat.
It is affordable, fast, and very high-speed. It is built on BSD Unix, and it pretty much runs on any Intel processor.
What needs improvement?
I've never tried it in large environments. All my clients are small businesses with a handful of employees, so I am not sure how it works in large environments. I keep up with recent versions, and there's nothing I'm waiting for, and nothing breaks when I get a new version.
For how long have I used the solution?
I have been using this solution for maybe five years.
What do I think about the stability of the solution?
It just works.
What do I think about the scalability of the solution?
I've never challenged it. All of my clients are small businesses. It is open-source software, and it runs on whatever appliance you run it on, so whatever computer you run it on, it'll scale up pretty high.
How are customer service and technical support?
Their technical support is excellent. They do have good support service. I don't use it because I've never had any problems with it, but the people I know who use it in bigger environments love it. You can even search their knowledge base and learn anything you want to know pretty quickly.
Which solution did I use previously and why did I switch?
Some of my businesses just use the built-in firewall in the ISP modem. I replaced an old SonicWall that couldn't keep up with a faster internet service. I've replaced a couple of Cisco solutions that were just getting old to run modern software, but the hardware was working. They just died of old age, and I replaced them with pfSense. It has been great. I'm sure a lot of people know how to configure Cisco solutions, but I don't. pfSense is very easy to configure.
How was the initial setup?
It was very simple. You download and boot a USB stick or a CD to install it. From then on, it is managed by its own webpage. The deployment takes a few minutes.
What's my experience with pricing, setup cost, and licensing?
It has almost zero cost, and it is open to us. It runs on a small appliance just for a couple of 100 bucks, and I've never had an appliance burn out on me yet.
What other advice do I have?
It is just great. Give it a try. It just works.
I would rate pfSense a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Defensive Security & BlueTeam at Global Research CO
Offers a nice interface and good technical support and has a nice load balancer
Pros and Cons
- "It's a good solution for end-users. It's pretty easy to work with."
- "This product is the very best."
- "The solution could use better reporting. They need to offer more of it in general. Right now, the graphics aren't the best. If you need to provide a report to a manager, for example, it doesn't look great. They need to make it easier to understand and give users the ability to customize them."
- "The solution could use better reporting. They need to offer more of it in general."
What is our primary use case?
Typically, we implement this solution on an enterprise-level for our clients and set it up for them as required.
What is most valuable?
The solution offers good value.
The captive portal on the product is excellent.
The solution has a very nice load balancer.
It's a good solution for end-users. It's pretty easy to work with.
The user interface is very nice. It's easy to navigate around the solution.
Technical support is very helpful.
What needs improvement?
The solution could use better reporting. They need to offer more of it in general. Right now, the graphics aren't the best. If you need to provide a report to a manager, for example, it doesn't look great. They need to make it easier to understand and give users the ability to customize them.
For how long have I used the solution?
I've been working with the solution for enterprise-level organizations for four or five years at this point.
What do I think about the scalability of the solution?
Our clients use the solution across 100-200 computers. Some of the implementations are sizeable.
How are customer service and technical support?
I've dealt with technical support in the past and have found them to be helpful and responsive. we have been satisfied so far with the level of support provided. They are easy to work with.
How was the initial setup?
We implement the solution for our clients, so we have a good sense of what is expected.
What about the implementation team?
As an implementer, our company can handle the initial setup for our clients.
What other advice do I have?
We implement the solution for our clients. I've personally implemented the solution on five projects so far.
We work with the latest version of the solution, typically.
Our companies are typically mid-level enterprises.
This product is the very best. Overall, I would give it a rating of ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Sophos Firewall
OPNsense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Cisco Meraki MX
Check Point Harmony SASE (formerly Perimeter 81)
Azure Firewall
SonicWall TZ
Check Point CloudGuard Network Security
Fortinet FortiGate-VM
Juniper SRX Series Firewall
Palo Alto Networks VM-Series
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Sophos and pfSense?
- How do I choose between Fortinet FortiGate and pfSense?
- How do I deploy anti-spam in pfSense or SonicWall TZ?
- What are the differences between Fortinet FortiGate and pfSense?
- Comparison between Sophos XG and pfSense as firewalls
- What is the difference between PfSense and OPNsense?
- Why is pfSense's firewall better than OPNsense's?
- Which solution do you prefer: pfSense or KerioControl?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet











