Senior Network Engineer at American School of Dubai
Real User
Top 10
2024-01-24T12:22:21Z
Jan 24, 2024
Our most common use cases are for our corporate firewalls, and currently, I'm using it as our school firewall. So it's our perimeter firewall. So, we're running three firewalls on our network. So we have separate networks each because we have, like, different use cases. So we're running three at the moment. We've been running it for six years now, and so far, it's been good.
Director of Information Technology at MASFinancials
Real User
Top 5
2024-01-24T11:34:00Z
Jan 24, 2024
I use pfSense for various reasons, including implementing IPsec technology due to having limited branches. I use a VPN for secure connections, control the Internet or network flow, employ it as an NTP server, facilitate conference calls, and set up VLANs. I use it to run a proxy server.
I have used Netgate pfSense for a range of purposes. Initially, I employed it for VPN connections, mainly for personal and professional use. I also relied on it to maintain network equipment in a professional context. In the professional sphere, I have experience with both pfSense and Juniper, but eventually, I decided to phase out Juniper due to its high costs, especially for updates and the addition of new functionalities. pfSense's cost-effectiveness and the flexibility to transition to new hardware while retaining configurations made it a preferred choice. pfSense also stands out in terms of its rapid algorithm evolution compared to competitors like Juniper. Its scalability is another advantage, where adding a new box or reconfiguring can boost the firewall's capacity. On a personal note, I use Netgate pfSense to connect to my equipment at the data center. Currently, I have a highly available installation that requires two instances of pfSense. While I considered pfSense for this setup, I had to assess whether OpenSense might offer better features for future requirements before delving deeper into pfSense.
Acting Manager IT at National Insurance Company Limited
Real User
2021-12-07T09:31:38Z
Dec 7, 2021
We have one Head Office and two main offices and other small branches. We want to secure our network from external and internal threats and block all unnecessary ports. We want to create a WAN with firewalls installed at all other offices and branches to connect to Head Office directly.
We are an MSP. We have some customers who have on-prem networks, and they want to have their networks protected by a firewall. They are quite small customers with 10 to 50 users. We use pfSense in order to protect our customers' network, to make some network automation, and especially to make VPNs to some remote branches to enable remote users to get access to the enterprise network. It is deployed on a private cloud and on-prem.
My primary use case is for controlling incoming traffic from various countries and blocking IP addresses if necessary. I'm the company director and a user of pfSense.
NOC Manager at a tech services company with 51-200 employees
Real User
2021-06-01T13:31:58Z
Jun 1, 2021
We use pfSense to protect our customers using IPS and IDS. We are a government agency and we manage the government network. We complete the setup and we are protecting our customers.
I use it as a firewall and also as a router because you can address what you want to do with it. It can do network advanced translation (NAT). It is sitting on my own server. It is on a remote server on a private network.
VP of Business Development at a tech services company with 1-10 employees
Real User
2021-11-16T04:08:00Z
Nov 16, 2021
We had been hit by crypto, and with our existing firewall infrastructure, we found out it didn't have geofiltering without an additional cost. That's still written from SonicWall and I think you have to pay extra for that. pfSense came with geofiltering and with logging as well, which I believe you have to pay extra for with SonicWall. So we didn't realize this until we got hit. We implemented GoIP filtering, and we also activated and stored the log files from within the firewall. I think there are some other feature sets that we used as well. The device seemed to be a little bit simpler to manage and configure through the interface. Of course with it being open source, we were able to stay current with that without having to incur annual purchasing or annual licensing fees like we do with SonicWall.
National IT Coordenator at a government with 51-200 employees
Real User
2021-11-01T19:41:01Z
Nov 1, 2021
I use pfSense as a proxy and a firewall to monitor all the traffic to my network. It allows me to shape the traffic and eliminate bottlenecks that cause the network to slow down. You can use pfSense to catch some websites or make the network faster because we have applications connected remotely all over the country. We need to have a network with a reliable speed and no hiccups on the way because all our applications are on-premise, and the entire country goes to the same data center to get information.
Vice President - Engineering & Delivery at a tech services company with 51-200 employees
Real User
2021-08-30T15:53:57Z
Aug 30, 2021
We are a small business and we use pfSense as our interface for the WAN. We use it for a Firewall and to ensure that all devices are operating. It provides our basic network routing needs, reporting on usage, such as IDS, and for managing individuals on network devices for controlling bandwidth and destinations.
Technical Presales Consultant/ Engineer at Ingram Micro
MSP
Top 5
2021-08-03T13:24:11Z
Aug 3, 2021
This solution is for my personal use, I've had a hobby of using it for a long time. I use it to protect my home network. Nothing is bulletproof but I'm happy to have a firewall at home scanning the ins and outs of my network so that I have a degree of security.
We have a client who's got a number of VMs on a single piece of hardware. They needed to have access over a VPN to those VMs from inside their network. We use pfSense to provide the VPN link using the IPsec. In others, let's say smaller organizations, we will put a Mini ITX system that then connects into their broadband - typically sort of fiber or something like that - and just gives protection. The solution also allows us then to manage port forwarding and things like that.
Software Applications Manager at a engineering company with 201-500 employees
Real User
2021-04-05T14:23:30Z
Apr 5, 2021
I primarily use the solution for monitoring and learning about how to operate a firewall. I also use it for monitoring my home network as well as adblocking.
Solution Architect, Managed Services & System Integration at Transmeet Technologies
Real User
2021-03-10T21:41:25Z
Mar 10, 2021
I mostly use basic firewall services like blocking unwanted traffic and I use the geolocation tools to predict where potential attacks could come from. That's the main purpose, to protect our business network using pfSense. Within our organization, with a single installation, about 500 users are covered.
We have all sorts of users. We have admins, we have the finance guys, and we have salespeople using it. We created a captive portal for our teams as well as a guest portal. So in general, we are more or less happy. Right now, I use it not only for intrusion detection but also for ETLs. We are a telephony integrator. We use it for applications and radius, etc. I use it as much more than a firewall. I use it for telephony applications as a certificate authority.
I was working for a firm that has 70 employees. They are mostly working from home, so I needed a very well-structured VPN for remote working. We put it on Supermicro, and it worked fine, and it was above their needs.
We are a solution provider and deploy this product for our customers. We also use it in our organization. We use both Cisco and pfSense but for our customers we mainly use Sophos and pfSense. I'm the CEO of our company.
Systems Administrator at a tech services company with 51-200 employees
Real User
2020-12-19T10:27:54Z
Dec 19, 2020
It is my main firewall into the data center and VPNs for clients. It sets up my DMZ and does a whole bunch of other stuff. I am using the latest version.
We just use the solution as a straight-up firewall. There is no VPN access or anything like that. We just use it as a straight-up firewall and we run Suricata on it as a defense.
Our main business is for WiFi networks. Customers also ask us for simple firewalls, and we use pfSense to add a firewall to provide the complete solution. We are working with the latest version of pfSense.
Senior System Engineer at a financial services firm with 1,001-5,000 employees
Real User
2020-11-05T18:00:00Z
Nov 5, 2020
We have internet limitations here in Sudan. The financial institutions that I am working with do not have a lot of services on the internet. It is difficult but at the same time, we are safer and are not faced with any kind of compromised data. This solution is suitable for small businesses and charity organizations. Security is not just about the firewall, you need policies and procedures in place.
Owner at a tech services company with 11-50 employees
Real User
2020-07-13T06:55:46Z
Jul 13, 2020
We have a hosted platform with our client. We've built a VPN site and the solution is deployed as a VM. The client connects to it and it protects anything that's behind it like a regular firewall. Everything we have there is hosted in a data center, all our servers and things that clients connect to. So we're using it as our gateway device. We are customers of pfSense and I'm the owner of our company.
We mainly use pfSense at client locations where the client is looking for a free alternative for paid/subscription based Network gateway with enterprise grade features
The solution pretty much is our only firewall security at the moment. It handles the integration with our active directory and makes sure that all communications are channeled through a secure network.
I had an appliance that died six months ago. Then I didn't want that hardware anymore, so I bought two new servers. A single power supply but dual on a network with three times four network cards. On that, I installed the pfSense (Community Edition). From inside to outside, I have about 15 to 20 node servers and users going outside. From outside to inside, I have only three tech support people, myself and two other ones. With regard to clients using the platform from outside to inside, on the servers inside, I have about 1000.
My primary use case for pfSense is as a firewall. We also use it for intrusion detection, intrusion prevention, website filtering, and quality of service (QoS).
IT Manager & Sr. Application Programmer with 11-50 employees
Real User
2018-11-14T21:32:00Z
Nov 14, 2018
We use this at all of our locations as our edge device, IPSec site-to-site VPN functionality between our offices and our AWS EC2. No matter what is thrown at this, the system handles it like a champ. We have both dedicated hardware and virtualized versions running in our infrastructure. So far we haven't found a reason why we need to spend thousands for an appliance like Cisco ASA when this handles all of our needs.
* We only use our pfSense as a stateful packet inspection firewall. * We have around 10 VLAN interfaces with many allow/block policies, VIPs, and NATs. * Running on VMware as a virtual machine.
In the past, we had different locations in different countries, and in every location, we had the same pfSense firewall. Therefore, the connection between our different locations was good and manageable. However, in the last two years, we have had only one location here in Belgium, thus the performance of the pfSense has been good, and we can manage great with the open ports and the closed ports, but now a firewall has to be a little bit more than just that.
pfSense is a powerful and reliable network security appliance primarily used for security purposes such as firewall and VPN or traffic shaping, network management, and web filtering. It is commonly used by small businesses and managed service providers to protect their customers' networks and enable remote access through VPNs.
The solution is praised for its stability, user-friendly interface, scalability potential, open-source nature, free cost, easy installation, firewall...
We use it for the backup line for the internet. When the internet is disconnected, we transfer to pfSense.
I am using it for personal use.
Our most common use cases are for our corporate firewalls, and currently, I'm using it as our school firewall. So it's our perimeter firewall. So, we're running three firewalls on our network. So we have separate networks each because we have, like, different use cases. So we're running three at the moment. We've been running it for six years now, and so far, it's been good.
I use pfSense for various reasons, including implementing IPsec technology due to having limited branches. I use a VPN for secure connections, control the Internet or network flow, employ it as an NTP server, facilitate conference calls, and set up VLANs. I use it to run a proxy server.
We use Netgate pfSense for load balancing.
I install Netgate pfSense in various locations. It is also used for monitoring traffic and acting as a proxy.
I have used Netgate pfSense for a range of purposes. Initially, I employed it for VPN connections, mainly for personal and professional use. I also relied on it to maintain network equipment in a professional context. In the professional sphere, I have experience with both pfSense and Juniper, but eventually, I decided to phase out Juniper due to its high costs, especially for updates and the addition of new functionalities. pfSense's cost-effectiveness and the flexibility to transition to new hardware while retaining configurations made it a preferred choice. pfSense also stands out in terms of its rapid algorithm evolution compared to competitors like Juniper. Its scalability is another advantage, where adding a new box or reconfiguring can boost the firewall's capacity. On a personal note, I use Netgate pfSense to connect to my equipment at the data center. Currently, I have a highly available installation that requires two instances of pfSense. While I considered pfSense for this setup, I had to assess whether OpenSense might offer better features for future requirements before delving deeper into pfSense.
I use the product to test firewalls and VPN solutions.
We use the product as a perimeter firewall.
I am using pfSense as a firewall and VPN gateway.
We're using pfSense as a firewall and for web filtering.
We use it for its firewall features and VPN.
I primarily install and test the solution. I'm not an expert in the solution; I mainly put them in place.
We have one Head Office and two main offices and other small branches. We want to secure our network from external and internal threats and block all unnecessary ports. We want to create a WAN with firewalls installed at all other offices and branches to connect to Head Office directly.
We are an MSP. We have some customers who have on-prem networks, and they want to have their networks protected by a firewall. They are quite small customers with 10 to 50 users. We use pfSense in order to protect our customers' network, to make some network automation, and especially to make VPNs to some remote branches to enable remote users to get access to the enterprise network. It is deployed on a private cloud and on-prem.
I use pfSense for OpenVPN and DNS.
I use pfSense to provide firewall and VPN services for small businesses. I have a handful of clients using it now and a new one in the works.
We are using pfSense as a personal firewall for our systems and network protection.
We use pfSense as a firewall in the healthcare sector, education sector, and banking sector.
My primary use case is for controlling incoming traffic from various countries and blocking IP addresses if necessary. I'm the company director and a user of pfSense.
We use pfSense to protect our customers using IPS and IDS. We are a government agency and we manage the government network. We complete the setup and we are protecting our customers.
We are using the solution for a firewall and other operations, such as traffic shaping.
This solution can be used for a firewall, VPN, and VLAN.
We primarily use the solution for security purposes. We use it for a firewall.
We have solutions from 10 to 5,000 users. One person alone can manage the firewall.
I build my own firewalls, and I use pfSense.
pfSense is used as our firewall and router.
I use it as a firewall and also as a router because you can address what you want to do with it. It can do network advanced translation (NAT). It is sitting on my own server. It is on a remote server on a private network.
Our primary use case for this solution is Endpoint Advanced. I have set it up for the firewall and the open VPN connections.
We had been hit by crypto, and with our existing firewall infrastructure, we found out it didn't have geofiltering without an additional cost. That's still written from SonicWall and I think you have to pay extra for that. pfSense came with geofiltering and with logging as well, which I believe you have to pay extra for with SonicWall. So we didn't realize this until we got hit. We implemented GoIP filtering, and we also activated and stored the log files from within the firewall. I think there are some other feature sets that we used as well. The device seemed to be a little bit simpler to manage and configure through the interface. Of course with it being open source, we were able to stay current with that without having to incur annual purchasing or annual licensing fees like we do with SonicWall.
I use pfSense as a proxy and a firewall to monitor all the traffic to my network. It allows me to shape the traffic and eliminate bottlenecks that cause the network to slow down. You can use pfSense to catch some websites or make the network faster because we have applications connected remotely all over the country. We need to have a network with a reliable speed and no hiccups on the way because all our applications are on-premise, and the entire country goes to the same data center to get information.
We primarily use the solution to help our customers with firewall integration.
I am using pfSense as a secondary firewall and network management.
We are a small business and we use pfSense as our interface for the WAN. We use it for a Firewall and to ensure that all devices are operating. It provides our basic network routing needs, reporting on usage, such as IDS, and for managing individuals on network devices for controlling bandwidth and destinations.
This solution is for my personal use, I've had a hobby of using it for a long time. I use it to protect my home network. Nothing is bulletproof but I'm happy to have a firewall at home scanning the ins and outs of my network so that I have a degree of security.
We use pfSense as a firewall and proxy server. We use it to apply different restrictions for different users from some data locations.
I tested it for firewall, networks, and network stability and as a VPN access point.
We have a client who's got a number of VMs on a single piece of hardware. They needed to have access over a VPN to those VMs from inside their network. We use pfSense to provide the VPN link using the IPsec. In others, let's say smaller organizations, we will put a Mini ITX system that then connects into their broadband - typically sort of fiber or something like that - and just gives protection. The solution also allows us then to manage port forwarding and things like that.
We use the solution for a Firewall and a VPN.
I primarily use the solution for monitoring and learning about how to operate a firewall. I also use it for monitoring my home network as well as adblocking.
We primarily use the solution for security. It's a firewall.
I mostly use basic firewall services like blocking unwanted traffic and I use the geolocation tools to predict where potential attacks could come from. That's the main purpose, to protect our business network using pfSense. Within our organization, with a single installation, about 500 users are covered.
We have all sorts of users. We have admins, we have the finance guys, and we have salespeople using it. We created a captive portal for our teams as well as a guest portal. So in general, we are more or less happy. Right now, I use it not only for intrusion detection but also for ETLs. We are a telephony integrator. We use it for applications and radius, etc. I use it as much more than a firewall. I use it for telephony applications as a certificate authority.
I was working for a firm that has 70 employees. They are mostly working from home, so I needed a very well-structured VPN for remote working. We put it on Supermicro, and it worked fine, and it was above their needs.
We use the solution for blocking websites, banking, and malware.
We primarily use pfSense as a firewall. It's a DHCP server.
We use pfSense for the firewall, VPN server, client-server, and internal network.
We are a solution provider and deploy this product for our customers. We also use it in our organization. We use both Cisco and pfSense but for our customers we mainly use Sophos and pfSense. I'm the CEO of our company.
We are solution providers and this is one of the products that we deploy for our customers. This is not a product that we use ourselves.
The primary use case of this solution is to protect our business network.
It is my main firewall into the data center and VPNs for clients. It sets up my DMZ and does a whole bunch of other stuff. I am using the latest version.
We just use the solution as a straight-up firewall. There is no VPN access or anything like that. We just use it as a straight-up firewall and we run Suricata on it as a defense.
Our main business is for WiFi networks. Customers also ask us for simple firewalls, and we use pfSense to add a firewall to provide the complete solution. We are working with the latest version of pfSense.
I use pfSense for the security of my company.
We use it for small businesses, and most of my clients are using pfSense.
Typically, we implement this solution on an enterprise-level for our clients and set it up for them as required.
I use the product for many enterprise clients, including building construction, government, and education.
We have internet limitations here in Sudan. The financial institutions that I am working with do not have a lot of services on the internet. It is difficult but at the same time, we are safer and are not faced with any kind of compromised data. This solution is suitable for small businesses and charity organizations. Security is not just about the firewall, you need policies and procedures in place.
We primarily use the solution basically for the firewall, UTM content versioning, bandwidth shaping, routing, and IPS.
We have a hosted platform with our client. We've built a VPN site and the solution is deployed as a VM. The client connects to it and it protects anything that's behind it like a regular firewall. Everything we have there is hosted in a data center, all our servers and things that clients connect to. So we're using it as our gateway device. We are customers of pfSense and I'm the owner of our company.
We mainly use pfSense at client locations where the client is looking for a free alternative for paid/subscription based Network gateway with enterprise grade features
The solution pretty much is our only firewall security at the moment. It handles the integration with our active directory and makes sure that all communications are channeled through a secure network.
We use pfSense for our firewall protection.
I use pfSense as a firewall. I use it also as a VPN server and for the captive portal. Those are the main purposes.
At a custom company with several locations.
We use this solution as our firewall, proxy, IDS, IPS, and VPN.
Our primary uses for this solution are as a network firewall and a VPN Server.
We use pfSense as our firewall.
I had an appliance that died six months ago. Then I didn't want that hardware anymore, so I bought two new servers. A single power supply but dual on a network with three times four network cards. On that, I installed the pfSense (Community Edition). From inside to outside, I have about 15 to 20 node servers and users going outside. From outside to inside, I have only three tech support people, myself and two other ones. With regard to clients using the platform from outside to inside, on the servers inside, I have about 1000.
My primary use case for pfSense is as a firewall. We also use it for intrusion detection, intrusion prevention, website filtering, and quality of service (QoS).
We use this at all of our locations as our edge device, IPSec site-to-site VPN functionality between our offices and our AWS EC2. No matter what is thrown at this, the system handles it like a champ. We have both dedicated hardware and virtualized versions running in our infrastructure. So far we haven't found a reason why we need to spend thousands for an appliance like Cisco ASA when this handles all of our needs.
* We only use our pfSense as a stateful packet inspection firewall. * We have around 10 VLAN interfaces with many allow/block policies, VIPs, and NATs. * Running on VMware as a virtual machine.
* Firewalling * Routing * DHCP * Transparent proxy * DNS cache * VPN, etc.
We have mainly been using for our internet workstations.
In the past, we had different locations in different countries, and in every location, we had the same pfSense firewall. Therefore, the connection between our different locations was good and manageable. However, in the last two years, we have had only one location here in Belgium, thus the performance of the pfSense has been good, and we can manage great with the open ports and the closed ports, but now a firewall has to be a little bit more than just that.