OPNsense OverviewUNIXBusinessApplication

OPNsense is the #6 ranked solution in best firewalls. PeerSpot users give OPNsense an average rating of 8.4 out of 10. OPNsense is most commonly compared to pfSense: OPNsense vs pfSense. OPNsense is popular among the large enterprise segment, accounting for 52% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a comms service provider, accounting for 20% of all views.
OPNsense Buyer's Guide

Download the OPNsense Buyer's Guide including reviews and more. Updated: March 2023

What is OPNsense?

OPNsense is a user-friendly, fast-track, open-source FreeBSD-based firewall and routing platform. This software offers features that are generally available from costly commercial firewalls, with the added benefit of open and verifiable sources. The firewall provides users, developers, and organizations with an advantageous environment through transparency. The development of this project is driven by a strong focus on security and code quality.

The solution offers a variety of components, such as:

  • Weekly security updates. These updates provide the user with the ability to reach new emerging threats in a timely manner through small increments.

  • Two major releases every year. These yearly releases are on a fixed release cycle and provide organizations with the ability to plan ahead of an upcoming upgrade.

  • A roadmap of instructions. Each major release provides a guide and a set of clear goals.

A team of professionals developed OPNsense. Other professional and experienced software architects, engineers, and developers are encouraged to join in the development of the solution to make it as successful as possible. OPNsense offers a variety of rich features with each release. Each upgrade is based on FreeBSD for continual, long-term support and utilizes a freshly advanced MVC framework based on Phalcon. OPNsense is committed to helping businesses, school networks, remote offices, hotels, and other markets in keeping their data protected.

OPNsense Core Features

OPNsense continually offers a free, complete, high-end security platform with new releases and features. With each release, OPNsense focuses on providing more unique and better security features in a timely manner. These features include:

  • Captive Portal
  • Built-in reporting and monitoring tools including RRD Graphs
  • Network Flow Monitoring
  • Traffic Shaper
  • Support for Plugins
  • Granular Control Over State Table
  • Dynamic DNS
  • Two-factor authentication throughout the system
  • Netflow Exporter
  • Encrypted Configuration Backup to Google Drive
  • Forward Caching Proxy (transparent) with Blacklist Support
  • Stateful inspection firewall
  • DNS Server & DNS Forwarder
  • High Availability & Hardware Failover (with configuration synchronization & synchronized state tables)
  • DHCP Server and Relay
  • Virtual Private Network (site to site & road warrior, IPsec, OpenVPN & legacy PPTP support)
  • Intrusion Detection and Prevention
  • 802.1Q VLAN support

Reviews from Real Users

OPNsense is a favorite security solution among reviewers for a number of reasons. Two of those reasons include the user-friendliness of the solution, which makes it easy to use, and its ability to easily scale.

For many, a user-friendly solution is essential. FiorindoDi A., a system administration specialist at a tech vendor, says, "The graphic user interface is very good and it is user-friendly, which makes the product easy-to-use."

Peerspot reviewers speak of the scalability of the solution. For example, an anonymous cloud and infrastructure manager at a venture capital and private equity firm reviewer notes, "OPNsense is easy to scale when running on the hardware."

OPNsense Customers

CompuNet Systems GmbH,

Archived OPNsense Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Senior Network Architect at Virtua Technologies
Real User
Cost-effective with good reporting and firewall capabilities, but the SD-WAN needs to be enhanced
Pros and Cons
  • "The most valuable features are reporting, the Sensei plugin, and firewall capabilities."
  • "I would like to see better SD-WAN performance."

What is our primary use case?

I am currently working with OPNsense to see if I can learn it. This product is used in small to medium-sized businesses for security, UTM, and other similar operations. We are a solution provider and this is one of the security solutions that we implement for our clients.

How has it helped my organization?

Offering this solution has provided some of our clients with firewall protection and UTM, which basically just protects them from the internet.

What is most valuable?

The most valuable features are reporting, the Sensei plugin, and firewall capabilities.

What needs improvement?

The vendor should offer compatibility-approved boxes, or at least stock one with OPNsense already installed. This would make it a one-stop-shop, and people would not have to worry about sourcing the hardware separately.

I would like to see better SD-WAN performance. I think that could be a very good bonus because SD-WAN is all the rage these days. That is probably the big thing that people need to improve upon, in terms of combining two, three, or four links.

The interface should continue to improve, which would make things a bit easier. For me, it was already easy, but nonetheless, it is quicker to install a FortiGate firewall.

Buyer's Guide
OPNsense
March 2023
Learn what your peers think about OPNsense. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
690,226 professionals have used our research since 2012.

For how long have I used the solution?

I have been working with OPNsense for approximately one year.

What do I think about the stability of the solution?

This is a very stable product and I've had no issues with it.

What do I think about the scalability of the solution?

This product is very scalable. I always buy hardware that can handle a lot of connections and a lot of users. So, in terms of scalability, all you have to do is upgrade your hardware. Or, it is especially scalable if you use the VM version because you only have to provision more resources.

We regularly have between 20 and 50 users, although sometimes it is as little as 5 or 10.        

How are customer service and support?

I have not been in contact with technical support. So far, everything has been good because I just use Google to find all of the answers and all of my solutions.

Which solution did I use previously and why did I switch?

I primarily work with FortiGate, but I am currently dabbling in OPNSense to see if I can learn it. I've also installed Cisco in the past, as well as Sophos.

FortiGate is a better firewall but that is commercial software that you have to buy a license for. OPNsense is suitable for small to medium-sized businesses. FortiGate is definitely quicker to install because you just buy the appliance. It's also more user-friendly.

If you dabble a bit with OPNsense, it can do about 90% of what FortiGate can do, but FortiGate is more user-friendly. Of course, with OPNsense being open-source, it will always beat FortiGate on price.

I think that with FortiGate, it is easier to log a support call. I haven't really needed technical support for OPNsense, but I know that FortiGate has the score logging facility, whereby you can just quickly log a call. There's also support in South Africa and I know company people that I can just call for help with FortiGate. But with OPNsense, I haven't really had a complicated setup, so for me, it has been okay and it hasn't been an issue.

The SD-WAN is also better on FortiGate. I think that they are heavily focused on security, so they might have better application profiles and other things, such as application threat detections.

Although about 80% of our clients ask for FortiGate, some of our clients ask for Sophos instead. For example, there are some banks and commercial institutions that ask for Sophos.

How was the initial setup?

The initial setup is straightforward and quite simplified. I work in a Linux environment so for me, it will be a bit easier.

What's my experience with pricing, setup cost, and licensing?

OPNsense is an open-source solution and it is free to use. You need only purchase the hardware.

What other advice do I have?

The suitability of this product often depends on the size of the company, although sometimes there are clients that just want FortiGate and they're not open for negotiation. Personally, I like open-source and it's always a bonus if I can get stuff for free.

I would rate this solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Owner and business consultant at networks srl
Real User
Top 5
It allows me to assess our network traffic and has the best user interface
Pros and Cons
  • "The VPN server feature is the most valuable. It is integrated with Radius and AAA for doing accounting and authentication. Insight view is also an important feature for me at this time. It allows me to assess our network traffic. I also like the firewall feature. The BSD kernel has a packet filter. It is one of the most solid frameworks for firewalls. Its user interface is one of the best interfaces I have used."
  • "The only thing that I would like to see improved is the Insight or the NetFlow analysis part. It would be good to have the possibility to dig down on the Insight platform. Right now, we can easily do only a few analyses. If this page becomes more powerful, it surely will be a well-adopted platform."

What is our primary use case?

It is the main firewall for one of our locations. We use it for intrusion detection and prevention. We are using the latest software version, but the hardware is not the latest.

What is most valuable?

The VPN server feature is the most valuable. It is integrated with Radius and AAA for doing accounting and authentication.

Insight view is also an important feature for me at this time. It allows me to assess our network traffic. I also like the firewall feature. The BSD kernel has a packet filter. It is one of the most solid frameworks for firewalls.

Its user interface is one of the best interfaces I have used. 

What needs improvement?

The only thing that I would like to see improved is the Insight or the NetFlow analysis part. It would be good to have the possibility to dig down on the Insight platform. Right now, we can easily do only a few analyses. If this page becomes more powerful, it surely will be a well-adopted platform.

For how long have I used the solution?

I started to use OPNsense about three years ago.

What do I think about the stability of the solution?

It is stable, but for us, it is not yet so reliable. Our server is an old DL120 HP Server, which is from the year 2006. We have ordered another appliance. After we receive the new appliance, it would be more stable for us.

What do I think about the scalability of the solution?

It scales well for our needs. I haven't tried any horizontal or vertical scaling so far.

How are customer service and technical support?

I did not need any technical support.

Which solution did I use previously and why did I switch?

I used pfSense two years ago, but I was not so happy with our system protection. I have also previously used Cisco ASA appliance. It was a 5505 model, but it failed because of the hardware issues. It was prone to hardware failure, and in one month, we lost both firewalls. It was also not so easy to see traffic with Cisco ASA. I could not easily identify traffic issues. 

How was the initial setup?

The initial setup was straightforward. I also have experience with BSD services, so I had no issues at all. It took us half an hour to deploy it for 250 users.

What about the implementation team?

We deployed it ourselves. There was no need for a consultant for the deployment. We have two engineers for its deployment and maintenance.

What's my experience with pricing, setup cost, and licensing?

It is not an expensive product. Basically, I deployed it because it was the fastest solution to satisfy our needs in open source.

What other advice do I have?

We plan to continue using this solution. Right now, we are settling our networks. We plan to expand its usage, but I don't think it will happen until 2022.

It has a good user interface. Its configuration is simple but requires a little planning. It is much simpler than the Cisco ASA configuration.

I would recommend this solution. I would rate OPNsense a nine out of ten. I am happy with it.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
OPNsense
March 2023
Learn what your peers think about OPNsense. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
690,226 professionals have used our research since 2012.
OT/ICS Information Security Specialist at SANS
Real User
A solution that detects and blocks malicious content with good reporting and visibility, but the reliability needs improvement
Pros and Cons
  • "The most valuable features in OPNsense are reporting and visibility."
  • "There are issues with stability and reliability."

What is our primary use case?

The primary use case of this solution is to detect and block malicious traffic, malicious files, and malicious links to protect the internal network from any external malicious website that may contain a virus or malware.

What is most valuable?

The most valuable features in OPNsense are reporting and visibility. 

The visibility is awesome. With the visibility, you can see the data source, data destination, the source port, destination port, protocols, the most used, the malicious files that have been detected and blocked, the countries the customer has visited, and the IPs based on Suricata.

OPNsense also has ClamAV, which is a great tool.

What needs improvement?

I have some issues with OPNsense. I have created a virtual machine that I've lost connection at times and I am not able to connect to the gateway or ping the internet. When I started with OPNsense, it worked right away. It may be an issue with the virtual machine itself. I am currently setting up the protection on all of the virtual machines so they will connect to OPNsense and the internet, or anywhere they need to access.

I have tried to download some malicious files or a virus and it should dump the files and prevent the download, but I don't seem to get any notification or warnings.

It may be an issue with the configuration but I am not sure.

I would like to see improvements made to connectivity and alerting.

I wanted to deploy this solution in our organization and some of the workstations from remote sites but it's not reliable enough to do that yet.

In the next release, I would like to see real traffic monitoring and more visibility. Also, for the antivirus, I would like to see the files protected by ClamAV. 

I would like to see intelligence in OPNsense and have the option to apply it or not.

They need a threat intelligence tool similar to the one they would find with Cisco. It will show you the file hashes, all of the IFCs, the niches, the address information, and more.  With all of this information, you can be proactive and block the malicious file hashes, all of the malicious IP addresses, and the public IP addresses. It should help you be proactive.

It would be helpful to have OPNsense be one of the plugins, and they should include traffic capturing. With Palo Alto, you can monitor and specify which interface you want to monitor, the source IP, or you can specify the network and see the traffic that is coming from the VLAN, the destination, and any files being transferred over the network.

If you apply security profiles you can see the signatures.

For how long have I used the solution?

I have been using OPNsense for five months.

What do I think about the stability of the solution?

There are issues with stability and reliability.

I set up two different virtual machines. I used a virtual box, I installed it and configured higher visibility for both. One was a master and the other a standby. 

I had a virtual machine installed on Windows 10 and put the gateway for it as OPNsense, which was the master. 

I tested and shut down the first one, which is the master. When I check to see if the second one would take over, it failed. 

I couldn't connect to the internet or any destination.

What do I think about the scalability of the solution?

We have not explored the scalability. We are only a small lab with two to three workstations.

I have a colleague working with me, together. We meet weekly to share the progress we have.

I use the enterprise version daily. It's scalable, stable, they have proper documentation and support. We get daily updates from the vendor.

OPNsense is a great tool but it lacks information that you need before deploying it.

How are customer service and technical support?

I have reached out to the community for support, but they haven't seen anything like the issues that I am experiencing. 

I have not contacted OPNsense directly.

How was the initial setup?

The initial setup was straightforward and easy.

It took 30 to 45 minutes to set up and deploy OPNsense.

What about the implementation team?

I did not use a vendor to implement this solution, I did it myself.

What's my experience with pricing, setup cost, and licensing?

OPNsense is a well known open-source tool.

Which other solutions did I evaluate?

I am currently evaluating and searching for open-source enterprise firewalls and doing a comparison of the features between all of them. I am assessing the pros and cons of vendors. 

I am looking for something that will give me a report on the comparison of features, capabilities, the different vendors, and the different open-source solutions that are available.

I am also doing a comparison on Palo Alto, Cisco Firepower, and Fortinet Fortigate.

What other advice do I have?

I don't have any information on the bandwidth and what it can handle, or how many workstations can work with it. This information is very important, but I can't find any resources for this information.

The reporting is amazing. You can export reports, you can set the parameters, and export reports based on your needs.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Vice President at Jagils egypt
Reseller
The interface and the dashboard are the most valuable features
Pros and Cons
  • "The interface and the dashboard are the most valuable features of this solution."
  • "There should be more technical documentation."

What is most valuable?

The interface and the dashboard are the most valuable features of this solution. 

What needs improvement?

There should be more technical documentation. 

For how long have I used the solution?

I have been using it for the last year and a half. 

What do I think about the stability of the solution?

It is stable. 

What do I think about the scalability of the solution?

We have two customers who use this solution and ten people on my team. My clients are enterprise-size. 

How are customer service and technical support?

I am satisfied with the technical support. 

How was the initial setup?

The initial setup is very easy. It took around one hour. It's only getting the licensing and getting started. 

What other advice do I have?

It doesn't need a POC, doing a demo is enough. 

I would rate it a nine out of ten. The documentation about the malware and APT needs improvement to know more about the vulnerabilities. The product information is fine. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Support Engineer at Techaccess Pakistan
Real User
User friendly and easy to deploy but doesn't have next-generation firewall capabilities
Pros and Cons
  • "The solution is good for a basic firewall for a small business or for home use."
  • "The solution would not be suitable for anything large-scale."

What is our primary use case?

The solution is primarily used as a basic firewall. I'm running my WiFi through it.

What is most valuable?

The solution is very user-friendly.

It's easy to manage and deploy.

The solution is good for a basic firewall for a small business or for home use.

What needs improvement?

The solution can't compete with next-generation firewalls.

The solution would not be suitable for anything large-scale.

For how long have I used the solution?

I've been using the solution for a year or two.

What do I think about the stability of the solution?

There are issues with the VPN availability, but overall, the is a pretty smooth connection.

What do I think about the scalability of the solution?

We have two people running the solution and another 50 to 80 people using the solution, so we have a relatively small setup.

The solution is scalable and can be deployed to multiple VMs.

How are customer service and technical support?

I've never reached out to technical support. If I run into problems, I tend to Google queries in order to find solutions.

Which solution did I use previously and why did I switch?

I was not at the company when they had a different solution, so I am unsure as to what it was.

Currently, I'm looking for another firewall and I am working on upgrading. We may use an Ignition firewall in the near future.

I've also deployed a couple of different firewalls in the past, including Huawei.

How was the initial setup?

The solution wasn't too complex, but the VPN setup isn't so reliable. It sometimes misbehaves or malfunctions or breaks down automatically. Occasionally it disconnects and you can't transfer the data from it.

Deployment took about a day or so. It takes maybe five or six hours to get everything up and running.

Since it's a simple firewall, anyone who has basic firewall knowledge can run and maintain it.

What about the implementation team?

I had some help internally from our network team when I was implementing the solution. However, I did not need outside assistance from a consultant or integrator.

What's my experience with pricing, setup cost, and licensing?

We are using a free version of the solution.

What other advice do I have?

I'm just a customer. I'm not a partner or reseller.

I'm not sure which version of the solution our organization is currently using. I understand that it is the most up-to-date version. I updated it two months ago.

The solution is good for a small business or home. I'm not sure what the paid version offers or if it has more security features that would be suitable for larger businesses. The version I'm using works well and is simple. It's more reliable than a router.

I'd rate the solution seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
System Administration Specialist at a tech vendor with 1-10 employees
Real User
An open-source security option that is easy-to-use and has a nice user interface
Pros and Cons
  • "The graphic user interface is very good and it is user-friendly which makes the product easy-to-use."
  • "The ability to set the VPN IP address would be a welcome addition."

What is our primary use case?

We have primarily been using it for testing at our company, but the normal primary use for the product is as a firewall.  

What is most valuable?

The most valuable thing about this product is that it is very easy to use. The graphic user interface is very good and it is user-friendly.  

What needs improvement?

The feature that I would like to see in the next release, I think, would be to improve the VPN (Virtual Private Network) selection. Specifically, I would like to improve the section where you can set the VPN IP address to high availability.  

For how long have I used the solution?

We have been using OPNsense [Stands for: "Open (source) makes sense."] for about one year.  

What do I think about the stability of the solution?

The stability of OPNsense is actually very good.  

What do I think about the scalability of the solution?

The scalability of OPNsense is also very good.  

How are customer service and technical support?

Our experience with technical support has been good. We have a few issues, and if we do we have been satisfied with the support.  

How was the initial setup?

The initial set up was pretty easy. The total time for deployment took just one or two days.  

What's my experience with pricing, setup cost, and licensing?

OPNsense is open source software so at this time it is free for us to use.  

What other advice do I have?

On a scale from one to ten where one is the worst and ten is the best, I would rate OPNsense between and eight or nine-out-of-ten. If I have to choose I would pick nine because it is practically a perfect solution for us.  

I definitely recommend the product to other people who are considering using this as a solution to use it because it is a good solution.  

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1140060 - PeerSpot reviewer
Machine designer at La Poste
Real User
Top 20
A user-friendly solution with an easy configuration and good stability
Pros and Cons
  • "The initial setup is easy. It only takes 15-30 minutes to deploy."

    What is most valuable?

    The solution is easy to use and is accessible. I can also use it without paying. The configuration is very easy, and the website makes it easy to find help if you need it.

    What needs improvement?

    So far, everything is okay. We've just started using the solution.

    As long as they continue to ensure that we are protected, it will be perfect.

    For how long have I used the solution?

    I've been using the solution for one month.

    What do I think about the stability of the solution?

    The stability of the solution is good.

    How are customer service and technical support?

    We haven't had to contact technical support. If we have questions, we're typically able to find answers via the website.

    Which solution did I use previously and why did I switch?

    We did previously use another solution, but I don't recall the name. We didn't like the performance we were getting out of it.

    How was the initial setup?

    The initial setup is easy. It only takes 15-30 minutes to deploy.

    What about the implementation team?

    I handled the implementation myself.

    What other advice do I have?

    We use the private cloud deployment model.

    I would advise others thinking of implementing the solution to be aware of what you have to do to, and to plan it out beforehand. The solution is not for everybody, but it's not difficult to set up or maintain.

    I would rate the solution ten out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Consultant at INCONSYS GmbH
    Reseller
    Has good performance but I want to see a friendlier user interface
    Pros and Cons
    • "The feature I find most valuable, is that the program helped me to realize all the requested functionality that was needed."

      What is our primary use case?

      Our primary use case of this solution is for VPN connections. We are currently supporting an SAP company, which has many customers, and most customers need a site-to-site active set connection for maintaining the SAP systems. We currently have round about 200 VPNs.

      What is most valuable?

      The feature I find most valuable is that the program helped me to realize all the requested functionality that was needed:

      - IPsec VPN connections to remote gateways from various Vendors

      - IPsec VPN connections with SNAT (our local network in use at remote site)

      - IPsec connections with DNAT (remote network in use at our local site)

      - Let's Encrypt certificate for WebGUI

      - SSH Access by Putty to the device

      What needs improvement?

      Something that needs to improve is the translation. This comes into play when you have a remote and a local site and you have to work with two different transfer networks for each direction. What I'm missing is user portal for downloading the configurations for SSL VPN clients. It's still not implemented so it seems that this product is still in a developing process. 

      Sometimes it's a little difficult to find some examples for special scenarios. But we have to keep trying and I believe it is possible. It's quite a suitable possibility to use it for VPN connections.

      The monitoring is a little complicated and I have tried to use a plug-in, but it's quite complicated to configure. I had to write my own script.

      With the VPN solutions, it is possible  to cover up all the scenarios which we have. For instance, if you have a customer and your local network is already in use, you have to work with source nat. It is possible and it works. Another issue that customers sometimes have Networks, which are already in use on out local site. It means you have to work with a destination nat but it is possible to create. 

      I would, therefore, like to see the monitoring of the firewall being easier to configure, or to have more templates for this so that you can download the configurations for each scenario and get more detailed descriptions like how all the available plug-ins are performing.

      What do I think about the stability of the solution?

      I am currently running it on Hyper-V and so far I have had no problems. It is currently stable enough.

      What do I think about the scalability of the solution?

      We have 250 people in our company using this program who are able to run the SAP systems with side-to-side connections between the company and the customers. We have six people for deployment and maintenance. I am responsible for the networking. 

      How are customer service and technical support?

      There is no technical team in the Netherlands, but so far I fixed my own issues by reading up on the internet.

      Which solution did I use previously and why did I switch?

      We are using several VPN gateways. We are using our primary solutions in our company, making all the IT for the complete caller group. The caller group has around about 1,600 people in 10 companies. They are part of this group. We have one, main office and several branch offices.

      We are using Juniper SSG Firewalls for Site2Site IPsec connections to customers and this Equipment is working really good. Unfortunately this devices will be running out og supprot soon, so we have to look for some alternatives.

      The central equipment we use is Sophos UTM/SG and Sophos XG configured as high availability. The branch offices are connected by Sophos RED and we mainly use Sophos RED 50 with the AP 55 access points configured as WPA2 Enterprise. For central management, everything is managed in the main office. We are using SMTP proxy with anti-span and anti-virus on SG solutions. This is the only one that doesn't work because we have a problem in that our exchange users are too many, and there are too many accounts - this fact caused the Appache runnig out of ressources.

      An example would be if you have one workstation with two smartphones, and each person has maybe three or four sessions opened on the exchange. If you have 1,400 accounts, you can reach 8,000 sessions. If the Appache message scoreboard is full is comming up, no further users can connect. We have contacted Sophos support to solve this but they were not able to do this - the only effect was a correction of the sizing guide from Sophos. 

      How was the initial setup?

      The setup was straightforward and the only mistake you can make is not to log in at the installer during the setup. I made this mistake once and configured a lot of features. After doing this I could not save the configurations on a disc. Generally, it was quite easy to install and to configure. 

      The initial deployment took about two hours but figuring out how it works in detail and to run a roundabout took two or three days. 

      What's my experience with pricing, setup cost, and licensing?

      There are no licensing costs for OPNsense.

      Which other solutions did I evaluate?

      We had to evaluate other solutions because our primary solution was Juniper SRX, but we were not happy with the features. So we had no other choice and we were forced to look for something else. We use the Sophos XG firewall because we can configure it directly from Azure

      We found the OPNsense solution interesting because there are no costs. In Azure, you only pay for the virtual machine. 

      What other advice do I have?

      My advice would be to compare all the solutions because they all offer something different. Find out what's available and get a feeling for the product and look at the configurations on the firewall. 

      In the next version, I would like a friendlier user interface where the users can look at and download the configurations for the OPNsense clients.

      My rating for this solution is a seven out of ten.

      Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
      PeerSpot user
      Founding Partner, General Manager at emsteknoloji
      Real User
      User-friendly, has a lot of reports and easy settings
      Pros and Cons
      • "I find the solution to be user-friendly. It has a lot of reports and easy settings."
      • "On the customer-side, because I'm a small business, I need a cheaper or free solution option."

      What is most valuable?

      I find the solution to be user-friendly. It has a lot of reports and easy settings.

      What needs improvement?

      On the customer-side, because I'm a small business, I need a cheaper or free solution option. 

      To scale, you need a different package application. It's not compatible with pfSense. Maybe there should be a different package or a different setup, but it's a problem. I need a little package because I'm a small business.

      It would be nice if the solution offered virtual servers in the future. Compatible mutual servers with firewall specifications.

      For how long have I used the solution?

      I've been using the solution for 6 months.

      What do I think about the stability of the solution?

      The solution is stable. There are about 10 people using this solution.

      What do I think about the scalability of the solution?

      This solution is scalable. I may scale in the future.

      How are customer service and technical support?

      I don't contact technical support. I don't need to.

      Which solution did I use previously and why did I switch?

      I compared pfSense vs OPNSense. I used to use pfSense. I switched because OPNSense is modern and new. The graphic interface is good. And sometimes pfSense is not stable. Sometimes it breaks the line and stops.

      How was the initial setup?

      The initial setup was easy. Deployment took about one day, maybe two. I do the deployment and handle the maintenance myself, so you only need one person to manage it.

      What about the implementation team?

      I did the implementation myself.

      What's my experience with pricing, setup cost, and licensing?

      It costs about $1000.

      What other advice do I have?

      I would rate this solution 10 out of 10.

      Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
      PeerSpot user
      CIO at a tech vendor with 1-10 employees
      Real User
      Solved problems with VPN support for a small office network and is easy to use
      Pros and Cons
      • "We can open a new VPN connection easily. It's much easier than with Fortinet in our experience."
      • "OPNsense showed me some problems when using it in different environments. The problem is integration with a virtual server."

      What is our primary use case?

      Our primary use case for this solution is using it as a VPN to connect our data centers and our offices with Windows servers. 

      Also, we use OPNsense as a general firewall for protocol warnings on IIS.

      How has it helped my organization?

      OPNsense has been useful. It's easy to use. We can open a new VPN connection easily. It's much easier than with Fortinet in our experience. It is open source licensed. 

      Open source software operates well. It's a good product. It's what FortiGate was with licensing. You need new licenses for it now. OPNsense is much more flexible.

      What is most valuable?

      The feature that we found most valuable is the flexibility. It has nothing to do with operating the firewall. It's that we can program it the way we want. 

      There is no need to fight with the user interface.

      What needs improvement?

      In our experience, OPNsense showed me some problems when using it in different environments. The problem is integration with a virtual server. 

      In general, OPNsense is sweet, pretty, and neat. It's still in development. I expect the next release in the fall. Maybe they are going to polish it more.

      I would love a buy a new VPN. We experience problems with the old one. In high variables, it shuts off. We want to switch to a new one.

      For how long have I used the solution?

      We have been using OPNsense one year and a half.

      What do I think about the stability of the solution?

      With the stability of this solution, we have had no problems except with high availability when we switch remote machines on.

      Sometimes, it disconnects the VPN. That's the only problem we have experienced so far.

      What do I think about the scalability of the solution?

      We don't have too much traffic. With our traffic, it's working great. We don't expect to have a very big traffic load. Directly within our offices, maybe 20 or 30 people. 

      For the internet server, they are using our service. We have people on 100 home VPN connections. The final users are in the thousands. We are using it in all our offices.

      We only use OPNsense now. We migrated from FortiGate. We removed all FortiGate software. That is the only problem we had using the tool.

      How are customer service and technical support?

      We did not require any help from the support team.

      Which solution did I use previously and why did I switch?

      Previously, we used the Fortinet FortiGate switch because of the devices we have. They were limited to maybe 100-200 MB and were slowing down very drastically with Fortinet. 

      For many different reasons and because I need to do IP implementation that was not very compatible with our VPN, we switched. Now we have no problem integrating the VPN. 

      We switched to this open source solution and so far we are happy with it.

      How was the initial setup?

      The initial set up was very easy. We had it working in one week or so. It was pretty fast.

      What about the implementation team?

      We did the initial setup only by ourselves.

      What's my experience with pricing, setup cost, and licensing?

      We are not paying any licensing fees. OPNsense is completely free for us.

      Which other solutions did I evaluate?

      We evaluated other products for defense similar to OPNsense. We weren't happy with the whole difference. We were happy with the company behind OPNsense. 

      We will pay for OPNsense if required, but that is the main reason we chose it.

      What other advice do I have?

      My first advice is to check the recommendations. They have online information to spec it out in general. OPNsense is a great tool for problem-solving with a VPN. It's very nice.

      On a scale of one to ten, I would rate this product an 8. It still needs to mature. It's new, only two years or three in the market. They are doing great improvements. They still need to fix little things with the high availability and the user interface. That needs to be polished, but they are doing a great job.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      Buyer's Guide
      Download our free OPNsense Report and get advice and tips from experienced pros sharing their opinions.
      Updated: March 2023
      Product Categories
      Firewalls
      Buyer's Guide
      Download our free OPNsense Report and get advice and tips from experienced pros sharing their opinions.