Open Source
OPNsense is open-source, which means it is free to use, modify, and distribute. This allows for community contributions and transparency in code.
Regular Updates
The project provides regular updates and patches, ensuring the software is up-to-date with the latest features and security fixes.
User-Friendly Interface
The user interface is clean and intuitive, making it easier for both beginners and advanced users to configure and manage the firewall and other network settings.
Comprehensive Feature Set
Includes a wide range of features such as VPN capabilities, IDS/IPS, Web Proxy, and more, making it a versatile solution for various networking needs.
Strong Community Support
The active community and forums provide robust support, tutorials, and shared knowledge, which can be very helpful in troubleshooting and optimizing the system.
We have collected here some useful links to help you find out if OPNsense is good.
Check the traffic stats of OPNsense on SimilarWeb. The key metrics to look for are: monthly visits, average visit duration, pages per visit, and traffic by country. Moreoever, check the traffic sources. For example "Direct" traffic is a good sign.
Check the "Domain Rating" of OPNsense on Ahrefs. The domain rating is a measure of the strength of a website's backlink profile on a scale from 0 to 100. It shows the strength of OPNsense's backlink profile compared to the other websites. In most cases a domain rating of 60+ is considered good and 70+ is considered very good.
Check the "Domain Authority" of OPNsense on MOZ. A website's domain authority (DA) is a search engine ranking score that predicts how well a website will rank on search engine result pages (SERPs). It is based on a 100-point logarithmic scale, with higher scores corresponding to a greater likelihood of ranking. This is another useful metric to check if a website is good.
The latest comments about OPNsense on Reddit. This can help you find out how popualr the product is and what people think about it.
OPNsense is an open source, feature rich firewall and routing platform used by home users, small businesses, and enterprises around the world. OPNsense features โGeoIPโ support, which allows you to block or allow traffic from specific countries using a geolocation database. - Source: dev.to / 3 months ago
>I'm currently upgrading my home network, trying various options, and one of the headaches is provenance of the equipment. If you're concerned about provenance (or even if you're not), I suggest using a general purpose device and rolling your own ala pfSense[0]/OPNSense[1], etc, or just use one of the BSDs or Linux and use native tools or one of the many router/firewall distros[2] [0] https://www.pfsense.org/ [1]... - Source: Hacker News / 10 months ago
Firmware's like Asuswrt-Merlin or OpenWRT can support dynamic-dns, or you can do like I do and run something like OPNsense in an x86 VM with a NIC passed through, or buy an inexpensive firewall appliance (up to 500mbps/1gbps/10gbps). Source: almost 2 years ago
The easiest solution is to buy your own router, set it up, disable the router functionality on the Fritzbox 7590 and plug your router into it. It'll be cheaper and easier than a Cisco Firewall, but if you want to go the dedicated firewall route then I would recommenced OPNsense. Source: almost 2 years ago
BSDs may not have a significant presence on desktops, but they're well known in the networking world for their reliability. They also were the foundation used to build OSes for specific applications. OpnSense and XigmaNAS, for example, are two excellent FreeBSD based applications aimed at firewalling/security and NAS/services. https://opnsense.org/ https://xigmanas.com/xnaswp/. - Source: Hacker News / about 2 years ago
For switches? OpenWrt supports a few models toward the lower end, and SONiC support a bunch at the higher-end datacenter ToR market, but none of these options are SME production-ready like Linux servers or OPNsense firewalls. Source: over 2 years ago
Thatโs a stupid policy, and it looks like one of my UDMs is defective. Iโm an idiot for not just buying good quality open boxes and putting https://opnsense.org/ on them. ๐คฆ๐ปโโ๏ธ. Source: over 2 years ago
One option is Firewalla Gold Plus, or you could buy a mini PC like it and run pfSense/OPNsense yourself. Source: over 2 years ago
Another option is Firewalla, or buy a mini PC like it and run pfSense/OPNsense yourself. Two similar concepts, with the cost being either money or your DIY time. A lot of Firewalla users say that it's much easier for home use than pfSense/OPNsense, so you might find it worthwhile to spend a little more on it upfront and have to tinker less. Source: over 2 years ago
VPN or Zero Trust networking + separate users + sophisticated passwords for remote access. Don't expose anything to the web. You can install something like OpnSense (https://opnsense.org/) and configure WireGuard VPN and configure remote access to the services via VPN. Source: over 2 years ago
For most router issues, I recommend people always put them in to dumb bridge mode and put a proper firewall like pfsense or opnsense as your gateway. Source: over 2 years ago
If you want firewall, I think you can use https://www.pfsense.org/ or https://opnsense.org/ , maybe running on an old PC or a Raspberry Pi. Not sure. Source: over 2 years ago
I've recently started using OPNsense. It's similar to pfSense, but seems to be considered a little more user-friendly. Source: over 2 years ago
First of all; understand what it is the software you want to use actually does. I know that Proxmox is a Hypervisor and can run multiple VMs (Virtual Machines) and LXCs (Linux Containers) which is great, but there are a lot of options for setting up these things. For example, I really liked the idea of having my router be a VM that ran OpnSense so that I can run multiple router-specific things on the same machine... Source: over 2 years ago
If you are going to apply for WSA, learn Hyper-V, maybe failover clustering (nested) with something like S2D (https://learn.microsoft.com/en-us/azure-stack/hci/concepts/storage-spaces-direct-overview) or starwinds vsan (https://www.starwindsoftware.com/vsan), PowerShell, and automatization with PowerShell. Even all full Windows systems are pretty often deployed on ESXi, so you can learn it. SCVMM, SCOM, and other... Source: over 2 years ago
You might look into using OPNsense on a small PC with whatever NICs you like for wired routing, with a separate AP and switch. It'll probably cost a little more initially, but it makes it a lot easier to get the exact specs you want, as well as upgrading only the parts that need it. Need a faster LAN? Upgrade the switch. New Wi-Fi standard? Upgrade the AP. Faster internet service? Upgrade the router's NICs.... Source: over 2 years ago
I guess you need a router with a WAN to access the internet. If so, purchase another router, and configure it as a wireless bridge with your primary, or turn one PC into a router by installing something like OpnSense (https://opnsense.org/), add a wireless card, and add a simple switch to connect all your computers to the same switch, configure OpnSense in the way that WAN network is your wireless connection and... Source: over 2 years ago
I would look into OPNsense, which is free, community supported, rather advanced, but fairly easy to configure and maintain. You run it on a PC with more than one Ethernet port. Source: over 2 years ago
Currently, I use a custom OPNsense router with three gateways: Vodafone Cable, DSL with O2, and a backup cellular connection with O2, as well as another personal phone as a secondary backup with Vodafone. However, I don't recommend this approach due to the complexity of DSL Lite, dual-stack, IPv6 prefixes and the difficulty in obtaining basic information for proper setup from these companies. Source: over 2 years ago
You have options such as PfSense, OpnSense, Arista Untangle and Sophos. I'm sure there are other alternatives as well. Source: over 2 years ago
I see these for sale on eBay (e.g. Pfsense four-port Gigabit router/firewall on Sophos UTM 110/120 hardware) with pfSense installed, so this apparently is an option. OPNsense, a fork of pfSense, may work as well. Both pfSense and OPNsense are based on FreeBSD (UNIX) and are free, enterprise-class, router/firewall software. Both also have attractive, easy-to-use web UIs. For 25โฌ, it may be worth trying it as... Source: over 2 years ago
OPNsense, an open-source firewall and routing platform based on FreeBSD, is gaining prominence in the networking community as a formidable alternative to its progenitor, pfSense. Widely regarded as user-friendly and modern, OPNsense boasts a range of features that rival those found in commercial products, all while maintaining its open-source roots. This has positioned it favorably among a field of competitors including pfSense, VyOS, MikroTik RouterOS, OpenWrt, IPFire, Endian Firewall Community, and FRRouting.
One of the key attributes of OPNsense is its focus on security, which is underscored by its use of HardenedBSD โ a security-enhanced fork of FreeBSD. This enables OPNsense to offer features like the option to deploy LibreSSL instead of OpenSSL, ensuring a robust security stance. In terms of functionality, OPNsense provides comprehensive features such as multi-WAN support for traffic balancing and failover, a sophisticated intrusion detection and prevention system, and VPN capabilities, all managed through a slick, multilingual web-based interface.
The platform's rapid pace of development and consistent updates have been noted as significant strengths. OPNsense has managed to maintain a dynamic feature set, supported by a dedicated community that contributes to timely security updates and enhancements โ a critical component for any cybersecurity-focused software.
However, OPNsense is not without its challenges. Users have occasionally cited limited Wi-Fi support as a drawback, which can necessitate additional configuration or hardware solutions to accommodate wireless networking needs. Yet, many in the user community have shifted from pfSense to OPNsense, attracted by its user-friendly interface and active development cycle.
In various technical forums and discussions, OPNsense is frequently recommended for its flexibility and efficacy in home and small business environments. Enthusiasts praise OPNsense's ability to be configured on general-purpose devices, making it an attractive option for DIY setups, particularly in home lab environments. This versatility, alongside its comprehensive feature set, allows users to implement complex network topologies involving virtualized instances and advanced routing schemes.
Overall, public opinion on OPNsense is predominantly positive. Its fusion of enterprise-grade features with open-source accessibility makes it a standout choice in the realm of firewall and routing solutions. As with any robust system, a certain level of technical acumen is required for optimal configuration and maintenance. Nonetheless, for those willing to engage with its features and community, OPNsense offers a highly capable and adaptable platform capable of addressing a broad spectrum of networking needs.
Do you know an article comparing OPNsense to other products?
Suggest a link to a post with product alternatives.
Is OPNsense good? This is an informative page that will help you find out. Moreover, you can review and discuss OPNsense here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.