pfSense OverviewUNIXBusinessApplication

pfSense is the #3 ranked solution in best firewalls. PeerSpot users give pfSense an average rating of 8.4 out of 10. pfSense is most commonly compared to OPNsense: pfSense vs OPNsense. pfSense is popular among the large enterprise segment, accounting for 51% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a comms service provider, accounting for 15% of all views.
pfSense Buyer's Guide

Download the pfSense Buyer's Guide including reviews and more. Updated: May 2023

What is pfSense?

pfSense is a powerful and reliable network security appliance primarily used for security purposes such as firewall and VPN or traffic shaping, network management, and web filtering. It is commonly used by small businesses and managed service providers to protect their customers' networks and enable remote access through VPNs. 

The solution is praised for its stability, user-friendly interface, scalability potential, open-source nature, free cost, easy installation, firewall capabilities, security features, flexibility, and simplicity. Overall, pfSense is a cost-effective solution for enterprises that need a VPN for their employees.

pfSense Key Features

pfSense has many key features and capabilities, including:

  • Strength and accuracy: pfSense is able to always follow either default or custom rules, making it a stronger firewall than some of its competitors. It also filters traffic separately, whether it’s coming from your internal network of devices or the open internet, allowing you to set different rules and policies for each.

  • Flexibility: pfSense can work both as a basic firewall and as a complete security system because it gives you the flexibility to integrate additional features as code where necessary.

  • Open-source: Because it is open-source, not only is pfSense free to use, but community members can contribute to the code to make it a better software.

  • User-friendly: Usually firewall products are not user-friendly because they often include complex settings, options, and features that require fine-tuning. pfSense’s interface is simple, direct, and easy to use.

  • WireGuard Support: Instead of building your own VPN using pfSense, or settling for a commercial VPN provider, you can directly integrate WireGuard with the pfSense firewall.

  • Speed Management and Fault Tolerance: pfSense’s multi-WAN feature allows your system to continue operating in case components fail.

  • Well-supported: pfSense regularly has security and feature updates. It also has a documentation site and a well-informed and knowledgeable support forum.

Reviews from Real Users

Below is some feedback from PeerSpot Users who are currently using the solution.

Bojan O., CEO at In.sist d.o.o., says, “The classic features, such as content inspection, content protection, and the application-level firewall, are the most important."

Another PeerSpot user, a chef at a media company, explains what he finds most valuable about pfSense: "The plugins or add-ons are most valuable. Sometimes, they are free of charge, and sometimes, you have to pay for them, but you can purchase or download very valuable plugins or add-ons to perform internal testing of your network and simulate a denial-of-service attack or whichever attack you want to simulate. You can also remote and monitor your network and see where the gap is."

T.O., a VP of Business Development at a tech services company, mentions, "What I found most valuable is the cost of the platform, the flexibility of the platform, and the fact that the ongoing fees are not there as they are with the competitor."



pfSense Customers

Nerds On Site Inc., RKC Development Inc., Expertech, Fisher's Technology, Ncisive, Consulting, CPURX, Vaughn's Computer House Calls, Imeretech LLC, Digital Crisis, Carolina Digital Phone, Technigogo Technology Services, The Simple Solution, SwiftecITInc, Rocky Mountain Tech Team, Free Range Geeks, Alaska Computer Geeks, Lark Information Technology, Renaissance Systems Inc., Cutting Edge Computers, Caretech LLC, GoVanguard, Network Touch Ltd, P.C. Solutions.Net, Vision Voice and Data Systems LLC, Montgomery Technologies, Techforce, Concero Networks, ASONInc, CPS Electronics and Consulting, Darkwire.net LLC, IT Specialists, MBS-Net Inc., VOICE1 LLC, Advantage Networking Inc., Powerhouse Systems, Doxa Multimedia Inc., Pro Computer Service, Virtual IT Services, A&J Computers Inc., Envision IT LLC, CommunicaONE Inc., Bone Computer Inc., Amax Engineering Corporation, QPG Ltd. Co., IT 101 Inc., Perfect Cloud Solutions, Applied Technology Group Inc., The Digital Sun Group LLC, Firespring

pfSense Pricing Advice

What users are saying about pfSense pricing:
  • "pfSense is open-source, but the support is something that the customer pays for."
  • "It is about €1,000. It is a one-time payment. I do not have a monthly or yearly subscription. I don't subscribe to any subscription because I hate cloud services. There are no additional costs."
  • "We are using its Community Edition, which is free. My company is a government school, and we don't have much budget."
  • pfSense Reviews

    Filter by:
    Filter Reviews
    Industry
    Loading...
    Filter Unavailable
    Company Size
    Loading...
    Filter Unavailable
    Job Level
    Loading...
    Filter Unavailable
    Rating
    Loading...
    Filter Unavailable
    Considered
    Loading...
    Filter Unavailable
    Order by:
    Loading...
    • Date
    • Highest Rating
    • Lowest Rating
    • Review Length
    Search:
    Showingreviews based on the current filters. Reset all filters
    CEO at In.sist d.o.o.
    Real User
    Top 20
    Feature-rich, well documented, and there is good support available online
    Pros and Cons
    • "The classic features such as content inspection, content protection, and the application-level firewall, are the most important."
    • "Ease of use is a problem for a user who is unfamiliar with this product because, in the interface, everything has to be set manually."

    What is our primary use case?

    We are solution providers and this is one of the products that we deploy for our customers. We replaced old Cisco ASA with pfSense and it proves as a good choice

    How has it helped my organization?

    pfSense prevents unwanted access. If you configured things properly then you'll be protected to the distant level. There is still a need for products like a SIEM, but the UTMs like pfSense or Sophos, prevent most of the problems. PfSense has a lot of add on possibilities

    What is most valuable?

    The classic features such as content inspection, content protection, and the application-level firewall, and  VPN  Are most common..

    This is a feature-rich product.

    The documentation is good.

    What needs improvement?

    Ease of use is a problem for a user who is unfamiliar with this product because, in the interface, everything has to be set manually. It would be more user-friendly if things were set automatically. 

    The drop in performance can be drastic when you use more advanced techniques. There is some trade-off between having a certain level of security and maintaining acceptable performance.

    One of the things that are usually outside of the UTM, or system on the gateway, is the SIEM. It is an advanced system for managing the possibility of threats. It is not normally part of such devices but it would be nice if the pfSense interface were integrated with it.

    Buyer's Guide
    pfSense
    May 2023
    Learn what your peers think about pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
    708,461 professionals have used our research since 2012.

    For how long have I used the solution?

    We have more than three xears of experience with pfSense.

    What do I think about the stability of the solution?

    The stability of pfSense is standard. It is rated as one of the good solutions in this area.

    What do I think about the scalability of the solution?

    This product is scalable to some point, although we have never used it for large companies. We use it for small to medium-sized organizations. For big companies, we more often implement Palo Alto.

    In our company, we have a data center and some of our clients are hooked to it. This is something that we have on-premises for our customers.

    We have plans to increase our usage with pfSense because we have had good feedback from our customers. In fact, with the good experience we have had, our sales have been slightly increasing. Our sales are shifting from Sophos to pfSense.

    How are customer service and support?

    The technical support is organized well. We do most of the technical support for our customers in-house but there is a second level of outside support available. It is okay. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We currently resell products from both pfSense and Sophos. In some areas, pfSense is better than Sophos. I have been a bit disappointed with Sophos because I know their history, and I don't think that they have advanced as well as they should have in that time. Also, they have two different products, being XG and UTM. This is another reason that I prefer pfSense, at least a little bit, over Sophos.

    In the past, we were the developers of a product called Network Defender, but it has reached end-of-life. We were pioneers in the area and were one of the first who was making UTMs. The name "UTM" didn't exist at that point. We were partners with Cobalt, who was the first appliance creator. Their appliances include web servers and email servers. When Cobalt was bought by Sun, we made our first Network Defender line. That became the first appliance, which had firewall content inspection, content protection, intrusion prevention, intrusion detection, antivirus, and email and web servers at that time, all in one box.

    From that point on, we had our line, which was distributed all over the Middle East, Asia, and some parts of Europe. We then worked with Palo Alto, we were a Cisco partner the entire time, and we work with both Sophos and pfSense.


    How was the initial setup?

    The initial setup is complex. If you have a straightforward setup then you will have straightforward, basic protection and nothing else.

    It takes a few months to adjust where you start by setting it up, and then you have to monitor it and see what's happening. It's ongoing work because, after this, you have to keep monitoring and adjusting to the situation. This is part of the service that we perform for our customers.

    What about the implementation team?

    We are the integrators for our customers and deploy with our in-house team. We have people in the company who are specialized in this area.

    What was our ROI?

    The return on investment depends on the predicted cost of failures of the system, or intrusion of the system, which is hard to give a straight answer on. In part, this is because different companies put a different value on their data.

    For example, with medicine, if somebody were to steal the data related to the latest CORONA vaccine then the cost would be tremendous. On the other hand, if there is a company that is making chairs, stealing the design of the chair probably wouldn't be as high when compared to an application in medicine. So, there is not a straight answer for that.

    Return on investment, in any case, I think for every company, this is a must. Put in a straightforward way, they can count just the possibilities of having an attack on their system with a cryptovirus. If they can save their data from attackers then it would save them at least two days of not working plus the cost of recovery, which would be much more than the cost of the system and maintenance.

    What's my experience with pricing, setup cost, and licensing?

    The price of the licensing depends on the size of the deployment. pfSense is open-source, but the support is something that the customer pays for. We charge them for the first line of support and if they want, they can purchase the second line of support. Typically, they take the first-line option.

    The term of licensing also depends on the contract. The firewall doesn't always have a contract but rather, there is a contract in place for the network, which includes UTM.

    In addition to the licensing fees, there are costs for hardware, installation, and maintenance. We use HPE servers, and the cost depends on how large the installation is. The price of setup is approximately €500 to €800, which also includes the initial monitoring.

    The maintenance cost isn't really included in the network fees.

    For smaller companies, we charge them a few hours a month for monitoring. It takes longer if the client is bigger.

    Which other solutions did I evaluate?

    Palo Alto, Fortiner, Sopbos

    What other advice do I have?

    It is important to remember that you can't just leave the device to do everything. You still have to know what you're doing.

    I recommend the product. It's well-balanced and one with a long history, so it doesn't have child's diseases. There is a lot of online support available online, which they can consult themselves. But, in the case that they need support, they can hire a professional support line and that is highly recommended.

    I say this because usually, people look at the UTM as something that should be put in the system, set up, and left alone. But, this is not the case with this type of solution. Therefore, I strongly suggest making an outside agreement with a specialized company that will take care of their security from that point on.

    The biggest lesson that I have learned from using this kind of product is that you can't assume that the internet is a big place and nobody will find you. There is always a good possibility that robots will search your system for holes, and they are probably doing so this instant. This means that users should be aware and have decent protection.

    In summary, this is a good product but there is always room for improvement.

    I would rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Harish (Kumar) - PeerSpot reviewer
    Harish (Kumar)Cyber Security and IT Head at Aeren
    Top 5LeaderboardReal User

    We just deployed pfSense Plus on Netgate hardware. It looks complex in configuration. Thanks for the detailed review. 

    Chef at a media company with 11-50 employees
    Real User
    Top 20
    Supports NAT configurations, has many plugins, and is perfect for small networks
    Pros and Cons
    • "The plugins or add-ons are most valuable. Sometimes, they are free of charge, and sometimes, you have to pay for them, but you can purchase or download very valuable plugins or add-ons to perform internal testing of your network and simulate a denial-of-service attack or whichever attack you want to simulate. You can also remote and monitor your network and see where the gap is. Did you forget a printer port? Most attacks at the moment are happening through printers, and they can tell you immediately that you forgot to close the port of the printer. There are more than one million printers that are in danger, and everybody knows that hackers are using them to enter the network. So, you can download plugins to protect your network."
    • "There could be a way to remote to it through a mobile app. You can always browse through your browser on your mobile phone or tablet, but it would be good to have a dedicated app. I understand that iOS and Android developers are expensive, but there should be a mobile app."

    What is our primary use case?

    I use it as a firewall and also as a router because you can address what you want to do with it. It can do network advanced translation (NAT).

    It is sitting on my own server. It is on a remote server on a private network.

    How has it helped my organization?

    It is very simple to use. I'm working faster now. I don't have to configure a switch and sync some VLANs on the switch. I can concentrate more on my work because I know that pfSense is guarding my network. It improves my workflow a lot. 

    What is most valuable?

    The plugins or add-ons are most valuable. Sometimes, they are free of charge, and sometimes, you have to pay for them, but you can purchase or download very valuable plugins or add-ons to perform internal testing of your network and simulate a denial-of-service attack or whichever attack you want to simulate. You can also remote and monitor your network and see where the gap is. Did you forget a printer port? Most attacks at the moment are happening through printers, and they can tell you immediately that you forgot to close the port of the printer. There are more than one million printers that are in danger, and everybody knows that hackers are using them to enter the network. So, you can download plugins to protect your network.

    It is not only a firewall; it can also do some routing or network advanced translation (NAT), which makes it very powerful.

    It is very simple to use. As long as you understand the basics or fundamentals of networking, you can manage everything very quickly with it.

    What needs improvement?

    The web is evolving every day. So, the product should be constantly improved with more regular updates. Things are constantly changing. There are obsolete protocols, and then there are new protocols. For my own use, it is not an issue, but for somebody who is more at the forefront of internet browsing, it could be a problem.

    There could be a way to remote to it through a mobile app. You can always browse through your browser on your mobile phone or tablet, but it would be good to have a dedicated app. I understand that iOS and Android developers are expensive, but there should be a mobile app.

    For how long have I used the solution?

    I have been using this solution since May.

    What do I think about the stability of the solution?

    It is very stable as long as you don't change the winning theme. When it is working, leave it working. My rule number one is one computer, one function. So, pfSense does that one function, and I don't try to use it for anything else. I could do some File Transfer Protocol or things like that, but it is not made for them. I don't restart it and move it. I only do the security updates and change the username and password very often.

    What do I think about the scalability of the solution?

    I don't require much scalability. It is fine for a small-scale company with about 30 devices, such as printers, computers, etc. I'm only working with a few people, and I don't have any traffic problems, but a company with 50 or 60 users could have problems with it. Currently, there are four to five users, and I'm providing multimedia services to four to five people. 

    It is being used extensively. Sometimes, its usage is 50 times a day, and sometimes, there is no usage. I don't work on it on a daily basis. It also depends on the project I'm working on. We have plans to increase its usage.

    How are customer service and support?

    Their support is good.

    Which solution did I use previously and why did I switch?

    I didn't use any other solution previously. I didn't have a need for it. Only in May, I had the need to deploy my own service.

    How was the initial setup?

    It is easy to set up if you understand the protocols. If you understand the theory of what is a firewall and what is a router, its initial setup is straightforward.

    Its deployment took one week. The strategy was simple. It involved blocking certain traffic, allowing certain traffic, and making ACL or a list of undesired operations such as cookies so that if it is impossible to sniff, and there is complete security. If someone is trying to enter, I immediately get a message on my phone, whether I am in the county or abroad. I immediately get a message saying that somebody is trying to enter, and I am able to counterattack immediately. That's a big advantage of it.

    What about the implementation team?

    I did it on my own with the advice of some of my friends who have much deeper knowledge than me. It is also very well-documented on the web, and there is a big community.

    I am also taking care of its maintenance. I don't have any maintenance except that sometimes, the server on which this solution is implemented has issues. Its maintenance mainly involves regularly checking the systems.

    What was our ROI?

    There is a big return on investment because FortiGate is 60 to 70 times more expensive, which could be a big problem for me. It is more expensive than my car. I have a small budget and a small car.

    What's my experience with pricing, setup cost, and licensing?

    It is about €1,000. It is a one-time payment. I do not have a monthly or yearly subscription. I don't subscribe to any subscription because I hate cloud services.

    There are no additional costs.

    What other advice do I have?

    I would advise others to try it and see if it is good for them. It is a very good product for me, but that might not be the case for other users. There are so many solutions, but I'm really happy with it. For my scale, it is good. If you are Amazon or a company with one million connections every minute, don't ever use this. It is not made for that. It is perfect for small-scale networks.

    I would rate it a nine out of 10. It needs more regular updates, so I can't rate it a 10, but it is very easy to use, stable, and solid. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    pfSense
    May 2023
    Learn what your peers think about pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
    708,461 professionals have used our research since 2012.
    VP of Business Development at a tech services company with 1-10 employees
    Real User
    Top 20
    Great flexibility without the ongoing fees
    Pros and Cons
    • "What I found most valuable is the cost of the platform, the flexibility of the platform, and the fact that the ongoing fees are not there as they are with the competitor. Some people may think you're taking a risk with using Opensource. I think it just provides the end user, specifically for us small, medium business providers of services, the flexibility we need at the right cost to provide them a higher end, almost enterprise type service."
    • "In terms of areas of improvement, the interface seemed like it had a lot. The GUI interface that I had gotten into was rather elaborate. I don't know if they could zero in on some markets and potentially for small, medium businesses specifically, give them a stripped-down version of the GUI for pfSense."

    What is our primary use case?

    We had been hit by crypto, and with our existing firewall infrastructure, we found out it didn't have geofiltering without an additional cost. That's still written from SonicWall and I think you have to pay extra for that. pfSense came with geofiltering and with logging as well, which I believe you have to pay extra for with SonicWall. So we didn't realize this until we got hit. We implemented GoIP filtering, and we also activated and stored the log files from within the firewall. I think there are some other feature sets that we used as well. The device seemed to be a little bit simpler to manage and configure through the interface. Of course with it being open source, we were able to stay current with that without having to incur annual purchasing or annual licensing fees like we do with SonicWall.

    What is most valuable?

    What I found most valuable is the cost of the platform, the flexibility of the platform, and the fact that the ongoing fees are not there as they are with the competitor. Some people may think you're taking a risk with using open source. I think it just provides the end-user, specifically for us small, medium business providers of services, the flexibility we need at the right cost to provide them a higher-end, almost enterprise-type service. 

    What needs improvement?

    In terms of areas of improvement, the interface seemed like it had a lot. The GUI interface that I had gotten into was rather elaborate. I don't know if they could zero in on some markets and potentially for small, medium businesses specifically, give them a stripped-down version of the GUI for pfSense.

    For how long have I used the solution?

    I've used this solution for about a year. 

    What do I think about the scalability of the solution?

    You could scale the pfSense platform to multiple users and bandwidth. With SonicWall, you have to go get a different version of their product because they're going to tie their firmware to their version. pfSense doesn't do that. It seemed to me like the scale of pfSense is easier and it was a non-sales interactive requirement to scale the offering versus with SonicWall.

    How are customer service and support?

    Technical support was through an online chat. I don't remember us running into any snags. 

    How was the initial setup?

    The initial setup is pretty straightforward if you have your ducks in a row if you understand the IP engineering and design, and you understand some of the protocols that you want to introduce into the environment. I think one of the biggest things that it allowed us to do also was remote desktop or remote access. We filtered out remote management. We shut those ports down within pfSense, and that seemed pretty straightforward. I think the GUI has a little too much information out there, but if you're a senior engineer, you're going to love all the information because it makes sense to you. If you're a junior or a freshman engineer, you're not going to mind it either because you can use it to teach yourself how to take advantage of that information that's there. 

    On the front end of this, I thought it was rather intuitive.

    What was our ROI?

    With a firewall, typically we only charge between $25 and $75 a year to manage the firewall. That allows us to keep our price points low, and with minimal administrative overhead, we can maximize our profits.

    What's my experience with pricing, setup cost, and licensing?

    When compared to other solutions like SonicWall, SonicWall has a built-in administrative burden where you have to go back and make sure your client understands they're going to get hit with another annual fee to keep that device up to date. pfSense is not like that. pfSense is not like that in the sense that if you go out and get the latest update of firmware or software, you're going to get the latest and greatest. You don't have to remember to go to the client and remind them they're going to be charged another fee next year to keep their license current. I hope they keep that model.

    What other advice do I have?

    If you're a junior or even a beginner engineer, jumping into the interface for pfSense could be overwhelming. There are going to be things in there you just have never heard or seen before, which isn't a bad thing.

    On the front end, I would take advantage of any courses that are out there, any introductions to it. It's very intuitive and there are a lot of forums out there that you can go watch and educate yourself on. If you are not that advanced of a network engineer, I think it's a great solution for you because you can go out to some peers and get a lot of direction and guidance from them to set it up in a small environment. The only other thing I would do is just compare. You always have to understand what your customers' needs are. Make sure you understand what your customer's needs are and that it's going to fit into their environment and their budget. I don't know why it wouldn't, but that'd be about the only advice I'd give is just make sure that it is definitely a fit for your customer base. I'm fairly confident, small and medium businesses should be a very good fit. I've been in the enterprise space as well. There may be some things on the enterprise level that you just can't do with pfSense and you might want to go to some other solution set, but I think it's very competitive.

    I'd rate this solution a nine, even if I was an experienced engineer because it's easy to have and easy to maintain.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Acting Manager IT at National Insurance Company Limited
    Real User
    Top 20
    The GUI is helpful, but it's not user-friendly.
    Pros and Cons
    • "The GUI is easy to understand."
    • "Also, the GUI is helpful, but it's not user-friendly. It's complicated. It should be more intuitive for the average user and have an excellent graphical view. Of course, the user will typically know about network administration, but it still should be easy to understand."

    What is our primary use case?

    We have one Head Office and two main offices and other small branches. We want to secure our network from external and internal threats and block all unnecessary ports. We want to create a WAN with firewalls installed at all other offices and branches to connect to Head Office directly.

    How has it helped my organization?

    Overall, our experience with pfSense has been good. We're satisfied with what we're doing, but we have to move forward. It's covering what we require now, but maybe we might need something else in the future. For example, we are implementing ISO 2701, and the regulators could demand something else for compliance if they conduct an audit. And if we're following the policies required by ISO 2701 best practices, then perhaps we need to implement new hardware too because we can't do everything with our existing hardware infrastructure. 

    For instance, say I want to block USB access, but I don't have the software. Currently, we use our antivirus software, which is a proper endpoint management tool. We can use it to modify the Windows registry and block everything, I can do whatever I want with the PC on the endpoints. We need to have that, but not everything works without the hardware infrastructure. 

    What is most valuable?

    The GUI is easy to understand. 

    What needs improvement?

    We had one issue with hardware support. The department head who was managing the solution became the director of the company, but he still has administrator access. And usually, whenever a WAN goes down, we always have a backup, but the hardware doesn't support more than one WAN. And then, if he wants to switch, he doesn't know how to reconfigure it. So we have to wait for the ISP to resume their services, which is not professional.

    Also, the GUI is helpful, but it's not user-friendly. It's complicated. It should be more intuitive for the average user and have an excellent graphical view. Of course, the user will typically know about network administration, but it still should be easy to understand. A user should be able to find the feature they're looking for easily, but pfSense isn't so good in that sense.

    For how long have I used the solution?

    We're using a flavor of pfSense. It's called XNET. It's a flavor of the pfSense main pfSense build because it's open-source, but it's basically similar to the pfSense build, and we've been using it since 2008.

    What do I think about the stability of the solution?

    Not very stable.

    What do I think about the scalability of the solution?

    Scalable but only if one has expertise of open source configuration of software such as pfsense.

    How are customer service and support?

    Customer support for any open source product is mostly based on the individuals who have expert knowledge while otherwise we have to resort to other internet sources.

    Which solution did I use previously and why did I switch?

    I've used TMG by Microsoft, and it's much easier to manage domains and websites. For example, pfSense has IP-based blocking, but websites like YouTube and Facebook keep using different IPs. TMG blocks the actual domain name. That is one downside to pfSense I've noticed as a basic user.

    How was the initial setup?

    It was complex and done by the vendor.

    What about the implementation team?

    We implemented it through a vendor who had build upon the pfsense open source to create a package titled Xnet firewall.

    What was our ROI?

    We only paid for the hardware and savings were quite high.

    What's my experience with pricing, setup cost, and licensing?

    This is a good option. If a vendor is trying to sell Fortinet and Sangfor, but the customer's requirements are basic, they'll have a hard time convincing someone who believes in free, open-source software that pfSense is not suitable for them. The only cost is the hardware. But pfSense doesn't have after-sales support or some of the other features you might find in a commercial solution. 

    Which other solutions did I evaluate?

    I've heard that Fortinet is slightly more expensive than Sangfor. Then again, if Sangfor comes into the picture, maybe you would consider Sangfor.

    What other advice do I have?

    I rate pfSense six out of 10. We want a product that has at least two WANs as well as fault tolerance or load balancing features, which pfSense also has, but we don't have the hardware or support. That's why we need to switch. However, if cost is a big issue, then I recommend pfSense for customers who can't afford a paid hardware and software solution. That was our issue because we're a government company, so our assets belong to the government. We have to think about where we want to spend money because it's the taxpayers' money. If your management doesn't understand the need to invest in IT, then you can consider this alternative.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Bojan Oremuz - PeerSpot reviewer
    Bojan OremuzCEO at In.sist d.o.o.
    Top 20Real User

    Actually, pfSense has a pretty logical GUI. Compared to Sophos or Cisco it is easy to understand. Generally, with every security device, you have to know what you are doing.

    Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees
    MSP
    Top 5Leaderboard
    Provides good security as well as scanning and filtering traffic; web interface could be enhanced
    Pros and Cons
    • "A free firewall that is a good network security appliance."
    • "Web interface could be enhanced and more user friendly."

    What is our primary use case?

    This solution is for my personal use, I've had a hobby of using it for a long time. I use it to protect my home network. Nothing is bulletproof but I'm happy to have a firewall at home scanning the ins and outs of my network so that I have a degree of security.

    What is most valuable?

    pfSense is a free firewall that you can download and install on your own hardware and establish a VPN for it. If you have remote users who need to connect securely, pfSense can do that. The solution has multiple use cases. It's good for scanning and filtering traffic. It's a good network security appliance which you can install on your own hardware or on their hardware. Some companies will invest in a really big firewall for their main branch, and will install pfSense in remote sites because they don't see the value of buying an expensive firewall for each branch.

    What needs improvement?

    I'd really love to see the web interface enhanced. It's good but it could be clearer and more straightforward. As a FreeBSD fan, I'd love to see a BSD license code, rather than a GPL license code. I'd also love to see a Sandbox and more security features. pfSense is a mature product, but if you compare it to other products in the market, you realize that pfSense is a little behind. 

    For how long have I used the solution?

    I've been using this solution for five years. 

    What do I think about the stability of the solution?

    This solution is stable. 

    What do I think about the scalability of the solution?

    The solution is scalable, it has the HA options that other firewalls also have. It's a software-defined solution, so you can pretty much put it inside a virtual machine and scale it up. Or you can load balance, or have an HA set up between two pfSense proxies, it's all possible.

    How are customer service and technical support?

    I don't have contact with technical support. If you have an issue, you can go to the online community and wait for someone to respond. There's no SLAs for that. The only way I would have access to their support is if I actually purchased a Netgate appliance.

    Which solution did I use previously and why did I switch?

    I've previously used vendor-based firewalls, like Sophos. They have Sophos XG and Sophos XG, UTMs. Those are the firewalls that I have the most expertise with and I also have some experience with Fortinet. pfSense is normally installed on x86 hardware which uses CISC architecture, a complex instruction set that runs on laptops and computers. They generally make calculations much slower than what we call risk architecture. As a result, firewalls with a risk-based architecture or reduced instruction set architecture are preferred because they provide better throughput. That's the case with FortiGate. They are very well known in the market to have the highest IPS throughput and that's one of the major factors for choosing a firewall.

    How was the initial setup?

    The initial setup is very easy, it takes about 15 minutes. 

    What other advice do I have?

    I would recommend this solution, it's one of those technologies anyone should at least try out. If you want to protect your home network, and don't want to invest in a firewall, pfSense will do the job. It's good for home use and for small businesses or remote sites of large companies. It's a good strategy because it's generally more critical to invest in defending your main data centers. It's important to choose the hardware wisely, make sure it's compatible. Netgate, the company sponsoring pfSense, manufactures hardware that is really optimized towards it. For small or medium businesses it's not a big deal. But for enterprises, this is important. 

    I rate this solution a seven out of 10.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buford Laruan - PeerSpot reviewer
    Network Administrator at Benguet State University
    Real User
    Top 10
    Good community support, easy to use, free, and can be reinstalled in minutes
    Pros and Cons
    • "It is very easy to use. The interface is quite understandable. There is a good community, and I can take over at any time I want. If there is anything wrong with it, I could just reinstall the whole thing and start all over again, and I'll be up again in less than a few minutes"
    • "More documentation would be great, especially on new features because sometimes, when new features come out, you don't get to understand them right off the bat. You have to really spend a lot of time understanding them. So, more documentation would be awesome."

    What is our primary use case?

    I build my own firewalls, and I use pfSense.

    What is most valuable?

    It is very easy to use. The interface is quite understandable. There is a good community, and I can take over at any time I want. If there is anything wrong with it, I could just reinstall the whole thing and start all over again, and I'll be up again in less than a few minutes.

    What needs improvement?

    More documentation would be great, especially on new features because sometimes, when new features come out, you don't get to understand them right off the bat. You have to really spend a lot of time understanding them. So, more documentation would be awesome.

    In terms of features, for my use, I don't see anything wrong with it. I basically get what I need from it by default. I build my firewall, so I only rely on the software. On the software side, there is not much to improve right now. So, at this point in time, I don't see anything, but I always welcome any kind of upgrades that they do. I always try them out and see if I can use them in the company or not, but so far, there are no complaints on my end.

    For how long have I used the solution?

    I have been using this solution for more than eight years.

    What do I think about the stability of the solution?

    It is a very stable product.

    What do I think about the scalability of the solution?

    It is quite scalable.

    How are customer service and support?

    I don't have any experience dealing with technical support directly from the makers of pfSense. I am using its Community Edition. That's why when it comes to technical support, I rely on myself, the community, and the information on the internet, especially from those who are more adept at it than me.

    How was the initial setup?

    It is quite easy. It is up in a few minutes even though I reinstalled the whole thing. For me, it is as straightforward as it can get. I'm a long-time user, and I don't see any problems with the configuration.

    What's my experience with pricing, setup cost, and licensing?

    We are using its Community Edition, which is free. My company is a government school, and we don't have much budget.

    What other advice do I have?

    There is a steep learning curve and you have to spend a lot of time with it to understand how you're going to use it and how you're going to customize it yourself. That's where you're going to have to spend a lot of time, but by the time you're done with everything and you have played with all the features you want, you will understand everything you need. You will always be up in minutes, even if it gets "destroyed" during the night, you can come back to it and reinstall the whole thing, and everything will be good.

    I would rate it a 9 out of 10. It cannot get a 10 right now because it changes every day. It might be 10 today, but in a few seconds, it won't be a 10 because the whole internet changes in a few seconds, and the whole way of serving your clients can change in a few seconds. So, it can't get that perfect 10. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Principal at a tech services company with 1-10 employees
    Real User
    Top 20
    You plug it in, set it up, and it works
    Pros and Cons
    • "What I like about pfSense is that it works well and runs on an inexpensive appliance."
    • "I would like to see pfSense integrate WireGuard. Currently, pfSense uses OpenVPN, and there's nothing wrong with it, but WireGuard is a lot leaner and meaner."

    What is our primary use case?

    I use pfSense to provide firewall and VPN services for small businesses. I have a handful of clients using it now and a new one in the works. 

    What is most valuable?

    What I like about pfSense is that it works well and runs on an inexpensive appliance. It's a minimal Intel system that has no fan and is all solid-state. It doesn't have a fan because it doesn't do enough to get hot. It's a box about the size of a Discman. I can download the pfSense software at no cost then connect a keyboard, mouse, monitor, and USB flash drive to the appliance. It's built on top of BSD and managed with a web server. And it's effortless to manage.

    What needs improvement?

    I would like to see pfSense integrate WireGuard. Currently, pfSense uses OpenVPN, and there's nothing wrong with it, but WireGuard is a lot leaner and meaner. Unfortunately, it's not ready for pfSense, which is built on BSD, and WireGuard is not yet integrated with BSD. The issue is that pfSense is waiting for BSD to add WireGuard support. Once WireGuard is supported on BSD, you can bet pfSense will adopt it. 

    What do I think about the stability of the solution?

    I've never had any problems with stability. You plug it in, set it up, and it works.

    What do I think about the scalability of the solution?

    I know a peer who set up pfSense in a Catholic parish school. It's not thousands of devices, but there are several devices in the parish office, the rectory, and throughout the school, as well as three different VPNs. There's a fourth VPN connection to the IT Director's house, where he manages most of it. So that's four locations with VPNs, and that's the biggest one I know. All you have to do is buy a big enough appliance. You can use the minimum appliance in the rectory, where there's a handful of computers, but you need a step up from that in the school, where there are a lot more computers to connect. And I think even the parish office, which is a handful of people, uses the minimum appliance.

    How are customer service and support?

    I've never needed support. You can find anything you need to know in the pfSense knowledge base online or in the documentation.

    How was the initial setup?

    You only need a couple of minutes to install pfSense, then it just sits and works. You boot the USB drive and install it. After that, there's no more management. Any IT professional can easily set it up. Business owners who don't know anything about technology might have a hard time, but the average IT person can do it with no problem. There's good documentation online.

    What's my experience with pricing, setup cost, and licensing?

    The pfSense software is open source, so you only have to pay $90 a year for support. Of course, I could be wrong on that. It was that much when I looked into it a year ago. It might've gone up or down since then. You can buy the minimum appliance for under $300. It has two ethernet ports, one for your WAN and one for your LAN. 

    What other advice do I have?

    I rate pfSense 10 out of 10. The appliance is inexpensive, and the software costs nothing. You plug it in and it works.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Director De Tecnologias da Information at EPAL-EP
    Real User
    Free to use, flexible, and user-friendly
    Pros and Cons
    • "The initial setup is not complex."
    • "Ultimately, we'd like something stronger, and something that can handle threats better in real-time."

    How has it helped my organization?

    The product makes our business more secure. It has increased the security of our business. We are using the two solutions. The first one is from Cisco, and the second is from pfSense.

    A few months back, we were attacked, however, the attackers used the wrong software. We decided then it was important to start prioritizing our security, which is why we brought on this product. 

    What is most valuable?

    The solution is very flexible.

    I find the product very easy to use. 

    The initial setup is not complex. 

    The solution has been very stable so far.

    We can scale the solution if we need to.

    What needs improvement?

    The process can be challenging. We do not have one security team. We need a team that can guarantee the security of our company and we're not there yet. We only have the client's equipment, and one guy managing this equipment. This isn't necessarily a problem with the product, it's more about our own internal structure. 

    Ultimately, we'd like something stronger, and something that can handle threats better in real-time. 

    For how long have I used the solution?

    I've been using the solution for about five years now. 

    What do I think about the stability of the solution?

    The stability has been great so far. there are no bugs or glitches. It doesn't crash or freeze. Its performance has been great.

    What do I think about the scalability of the solution?

    The scalability of the product is very good. If we want to expand, we can do so. 

    We have 3,000 people on the solution right now. There are people from various teams that utilize it. It's not just IT. 

    Which solution did I use previously and why did I switch?

    We previously used OpenBSD, a Linux solution. 

    We switched to this product as it is free and open-source. It also increased the level of security we had on hand, even though OpenBSD was more user-friendly. 

    How was the initial setup?

    When it comes to setting up the solution, it's not a complex process. It's pretty straightforward in general. 

    The deployment took maybe a month and a half. 

    We have two teams that handle deployment and maintenance tasks. One team is internal and the other is external. They're mostly engineers and they work together. 

    What about the implementation team?

    We used an outside integrator to help us and we were pretty happy with the results. 

    What's my experience with pricing, setup cost, and licensing?

    We are using the free version of the solution. We are not paying anything for it at this time. 

    Which other solutions did I evaluate?

    We're reading up on other solutions every day. We likely won't stay with this solution. It's good for now, however, we'd like something more robust further down the line. 

    What other advice do I have?

    We are a customer and an end-user. 

    We're using either version 5.3 or 5.4 at this time. 

    While this is a good solution, we're looking for something stronger in the future. I'd recommend others also look for something strong, that fits their security needs. 

    I would rate the solution at a nine out of ten. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free pfSense Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2023
    Product Categories
    Firewalls
    Buyer's Guide
    Download our free pfSense Report and get advice and tips from experienced pros sharing their opinions.