Based on our record, pfSense should be more popular than ferm. It has been mentiond 10 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
I remember hating shorewall and similar ones because, well, I know iptables, and I know exactly what I want so using anything that tries to abstract it into it's own approach is torture as I need to take the rules I want and translate it to whatever mediocre paradigm shorewall (or ufw, or near-any other firewall manager in the wild) decided to put on top of iptables. I ended up using ferm... - Source: Hacker News / 9 months ago
I'm a big fan of ferm. Many major distros have it readily available as a package, and it makes for beautifully readable firewall definitions. Source: about 1 year ago
The last time I needed to do complex iptables stuff, I found FERM really helpful. The structured config language greatly reduces the amount of boilerplate code you have to type, while still having a pretty direct mapping to the emitted iptables rules. A bit like compiling sass to css. Source: about 2 years ago
Also just about last thing I want is to deploy another configuration management system alongside the system that manages everything else on machine. Currently we just use Puppet to deploy ferm rules (which is best described as "iptables+", naming convention and such are still iptables-like but a lot of macros/syntax sugar around it). Source: almost 3 years ago
Https://pfsense.org (netgate hardware is used in businesses). Source: about 1 year ago
I am having trouble seeing available packages, updating pkg, or getting a response from pfsense.org. Is anyone else seeing this or am I going to spend the rest of my day chasing bugs? Source: over 1 year ago
From the PIA Client to pfsense.org PING pfsense.org (208.123.73.69) from 10.6.112.128: 56 data bytes 64 bytes from 208.123.73.69: icmp_seq=0 ttl=49 time=49.455 ms 64 bytes from 208.123.73.69: icmp_seq=1 ttl=49 time=51.927 ms 64 bytes from 208.123.73.69: icmp_seq=2 ttl=49 time=49.333 ms 64 bytes from 208.123.73.69: icmp_seq=3 ttl=49 time=49.133 ms 64 bytes from 208.123.73.69: icmp_seq=4 ttl=49 time=49.027 ms ... Source: over 1 year ago
The above setup is critical to a reliable system. I'd use enterprise quality routers for a store and home connection. I personally use https://pfsense.org but there are many to choose from and several open source. Source: over 1 year ago
What I would do is put that thing in DMZ and install a good router behind it like https://www.pfsense.org. No affiliation, just been my router for many years. There's also it's sibling https://opnsense.org. There are many, just get a enterprise quality router. Source: over 1 year ago
ufw - Ufw stands for Uncomplicated Firewall, and is program for managing a netfilter firewall.
MikroTik RouterOS - The main product of MikroTik is a Linux-based operating system known as MikroTik RouterOS.
Advanced Policy Firewall - Server-based firewall.
OPNsense - OPNsense® you next open source firewall. Free Download. High-end Security Made Easy™. Offers Intrusion Prevention, Captive Portal, Traffic Shaping and more.
Shorewall - The Shoreline Firewall, more commonly known as “Shorewall”, is high-level tool for configuring...
OpenWrt - OpenWrt is an open-source firmware based on Linux for wireless routers