Based on our record, OPNsense seems to be a lot more popular than WireGuard. While we know about 94 links to OPNsense, we've tracked only 9 mentions of WireGuard. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Firmware's like Asuswrt-Merlin or OpenWRT can support dynamic-dns, or you can do like I do and run something like OPNsense in an x86 VM with a NIC passed through, or buy an inexpensive firewall appliance (up to 500mbps/1gbps/10gbps). Source: 5 months ago
The easiest solution is to buy your own router, set it up, disable the router functionality on the Fritzbox 7590 and plug your router into it. It'll be cheaper and easier than a Cisco Firewall, but if you want to go the dedicated firewall route then I would recommenced OPNsense. Source: 5 months ago
BSDs may not have a significant presence on desktops, but they're well known in the networking world for their reliability. They also were the foundation used to build OSes for specific applications. OpnSense and XigmaNAS, for example, are two excellent FreeBSD based applications aimed at firewalling/security and NAS/services. https://opnsense.org/ https://xigmanas.com/xnaswp/. - Source: Hacker News / 10 months ago
For switches? OpenWrt supports a few models toward the lower end, and SONiC support a bunch at the higher-end datacenter ToR market, but none of these options are SME production-ready like Linux servers or OPNsense firewalls. Source: 11 months ago
That’s a stupid policy, and it looks like one of my UDMs is defective. I’m an idiot for not just buying good quality open boxes and putting https://opnsense.org/ on them. 🤦🏻♂️. Source: 11 months ago
Wireguard. Wireguard uses UDP only and runs TCP sockets over UDP. Source: about 1 year ago
Look at Wireguard. I know you don't want Yet Another VPN running alongside your IPSec, but it's less VPN and more encrypted point-to-point UDP. You can set it up on any port you wish, including common ports that might be open on an outbound smart firewall not doing deep packet inspection. That way, it can stay out of the way of your existing IPSec deployment. Source: about 1 year ago
We use Elixir/Erlang for our control plane, and Rust for our data plane, built on the excellent WireGuard® tunneling protocol. Source: about 1 year ago
Both products are based off Wireguard which is available for all new linux distributions. https://wireguard.com . I'm not saying OP's solution is wrong, just curious what the advantages are. Other than potentially simpler client setup, what are the advantages of paying for tailscale. With the opensource tailscale, I'm not sure if you get access to an api you can use to look up the hosts. Source: about 1 year ago
Noise Protocol Framework (used by Wireguard). Source: about 1 year ago
pfSense - pfSense is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN, and more
OpenVPN - OpenVPN - The Open Source VPN
MikroTik RouterOS - The main product of MikroTik is a Linux-based operating system known as MikroTik RouterOS.
ZeroTier - Extremely simple P2P Encrypted VPN
OpenWrt - OpenWrt is an open-source firmware based on Linux for wireless routers
ProtonVPN - ProtonVPN is a security focused FREE VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection.