pfSense might be a bit more popular than WireGuard. We know about 10 links to it since March 2021 and only 9 links to WireGuard. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Wireguard. Wireguard uses UDP only and runs TCP sockets over UDP. Source: about 1 year ago
Look at Wireguard. I know you don't want Yet Another VPN running alongside your IPSec, but it's less VPN and more encrypted point-to-point UDP. You can set it up on any port you wish, including common ports that might be open on an outbound smart firewall not doing deep packet inspection. That way, it can stay out of the way of your existing IPSec deployment. Source: about 1 year ago
We use Elixir/Erlang for our control plane, and Rust for our data plane, built on the excellent WireGuard® tunneling protocol. Source: about 1 year ago
Both products are based off Wireguard which is available for all new linux distributions. https://wireguard.com . I'm not saying OP's solution is wrong, just curious what the advantages are. Other than potentially simpler client setup, what are the advantages of paying for tailscale. With the opensource tailscale, I'm not sure if you get access to an api you can use to look up the hosts. Source: about 1 year ago
Noise Protocol Framework (used by Wireguard). Source: about 1 year ago
Https://pfsense.org (netgate hardware is used in businesses). Source: about 1 year ago
I am having trouble seeing available packages, updating pkg, or getting a response from pfsense.org. Is anyone else seeing this or am I going to spend the rest of my day chasing bugs? Source: over 1 year ago
From the PIA Client to pfsense.org PING pfsense.org (208.123.73.69) from 10.6.112.128: 56 data bytes 64 bytes from 208.123.73.69: icmp_seq=0 ttl=49 time=49.455 ms 64 bytes from 208.123.73.69: icmp_seq=1 ttl=49 time=51.927 ms 64 bytes from 208.123.73.69: icmp_seq=2 ttl=49 time=49.333 ms 64 bytes from 208.123.73.69: icmp_seq=3 ttl=49 time=49.133 ms 64 bytes from 208.123.73.69: icmp_seq=4 ttl=49 time=49.027 ms ... Source: over 1 year ago
The above setup is critical to a reliable system. I'd use enterprise quality routers for a store and home connection. I personally use https://pfsense.org but there are many to choose from and several open source. Source: over 1 year ago
What I would do is put that thing in DMZ and install a good router behind it like https://www.pfsense.org. No affiliation, just been my router for many years. There's also it's sibling https://opnsense.org. There are many, just get a enterprise quality router. Source: over 1 year ago
OpenVPN - OpenVPN - The Open Source VPN
MikroTik RouterOS - The main product of MikroTik is a Linux-based operating system known as MikroTik RouterOS.
ZeroTier - Extremely simple P2P Encrypted VPN
OPNsense - OPNsense® you next open source firewall. Free Download. High-end Security Made Easy™. Offers Intrusion Prevention, Captive Portal, Traffic Shaping and more.
ProtonVPN - ProtonVPN is a security focused FREE VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection.
OpenWrt - OpenWrt is an open-source firmware based on Linux for wireless routers