I work for a small business. We have a number of different remote sites, so I use the solution as my primary firewall. I use it as a way for my remote sites to connect back to the main office via VPN.
IT Manager at a marketing services firm with 51-200 employees
Flexible and easy to use with helpful support
Pros and Cons
- "The visibility in pfSense helps optimize performance."
- "Maybe in their package manager, it would be nice to see which packages are officially from pfSense and which are community driven."
What is our primary use case?
What is most valuable?
The VPN features are the most valuable aspects of the solution.
It's pretty flexible. It does everything I need it to do. My use cases are somewhat limited.
I do like how easy it is to restore if you lose a router. I lost a firewall over the weekend at one of my remote sites. As of right now, I'm setting up a new piece of hardware and restoring it. It couldn't be more simple.
There are features in pfSense that help me to prevent data loss. It's relatively easy for me to back up what I need. I've created a pretty simple script that I run on a computer inside of my network that reaches out to all of the different pfSense firewalls that I use. It grabs a config file. And that's pretty simple. It's a script that runs daily. I could probably even run it weekly. It simply reaches out and grabs these things and backs them up. Data loss is not something that I'm really concerned about as long as I have a good backup, which I do, and I check it regularly.
It’s easy to add features to pfSense and to configure them. I don't add a lot to pfSense with regard to the package manager that it comes with. That said, the packages that I do use are easy to install, easy to update, and easy to configure.
I witnessed the benefits of pfSense immediately. I have what I consider an enterprise-class firewall and routing stack at a pretty reasonable price.
pfSense gives you a single pane of glass type of management. You can see pretty much most things inside of the firewall, everything from bandwidth charts to DHCP leases - anything you've set up with regards to DNS. It's got pretty good logging features. I wind up sending most of the Syslog information from pfSense to third-party logging software. That’s why I'm not really using it to peer through logs. However, to do quick checks, I'll use it. The UI is pretty similar to Netgate. It makes a lot of sense.
pfSense provides features that help minimize downtime. The high availability configuration allows me to mitigate downtime. I've worked with their deployment team to set that up and also set up the LAN. Regardless of whether or not I lose a firewall or an Internet connection, my connection to the Internet remains pretty resilient.
The visibility in pfSense helps optimize performance. I'm primarily using it to see how our bandwidth is being utilized. Outside of that, I'm not using pfSense to visualize a ton of data. I offload pfSense data to third-party software that I use to visualize things that are happening on my network. If I just pop in and take a quick glance at what might be going on in my network, it's sufficient.
What needs improvement?
I'm hard-pressed to think of a needed additional feature. It would be nice to see which packages are officially from pfSense and which are from a third party in the package manager.
For how long have I used the solution?
I've been using the solution for more than a decade.
Buyer's Guide
Netgate pfSense
August 2025

Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability is rock solid.
What do I think about the scalability of the solution?
I haven't really had to scale my deployment. My deployment was for an in-place network. My network hasn't changed much as I've redeployed the pfSense over the years.
How are customer service and support?
The speed of response is good. It was well within the SLA.
They were incredibly helpful. They answered follow-up questions in a timely manner. I was very pleased. I have had to use it very minimally. However, I was very pleased with how it worked.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I may have used something different a decade ago. Since then, I've been using pfSense. We're a small business. I do have some Cisco hardware, however, I'm not using it on my edge network. It's mostly just for switching.
How was the initial setup?
I typically buy the hardware myself for the installation. I have one or two pfSense appliances. One is sitting on a rack as a backup unit in case I need it. I have a couple in the field. At the end of the day, if I'm going to buy the appliance, I get a year or two of CE. I'd much rather just buy the hardware myself and purchase a CE or get a Plus license.
It's incredibly easy to deploy. Even for a new engineer, it would be pretty simple.
I am in the process of restoring one. It took me 20 minutes to flash the image to a thumb drive, install it on the device, boot the device, restore the configuration backup, and have it up and running. I'm familiar with the hardware that I purchased, and I take and test good backups. That said, the process is incredibly easy. It takes very little time to deploy something that has failed.
With regard to a new setup, it's impossible for me to answer broadly; however, even then, it's not a long time. It just depends on how sophisticated a given user's network is.
There is very little maintenance outside of updating the software.
What about the implementation team?
I deployed devices to our remote sites myself. I used Netgate Professional Services to help deploy a high availability stack at our main office, and they were outstanding to work with.
What was our ROI?
Anybody not using it, at least at the small or medium business level, is crazy. There's a significant return on investment. We're getting a pretty state-of-the-art device that runs OpenVPN and some other VPN software. It's not Cisco. It's not Juniper or any of the others out there. However, I keep my ear to the ground with regard to vulnerabilities generally out there, and it seems like there are far more vulnerabilities that you hear about day-to-day in their competitors than in their software. At the enterprise level, there may be some more sophisticated and purpose-built solutions. That said, pfSense meets all of my needs. I can't imagine it not meeting the needs of anybody in a business my size and slightly bigger or slightly smaller.
What's my experience with pricing, setup cost, and licensing?
The licensing is fair.
What other advice do I have?
I'm a pfSense customer.
There are two versions of pfSense. The plus version, which is paid, and the community edition, which is free. I primarily use plus.
I'd rate the solution ten out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Network Operations Team Lead at Flint Works
Enables us to achieve the protection we need in a flexible manner
Pros and Cons
- "I like how affordable and flexible pfSense is. I can achieve the protection I need in a flexible manner. I enjoy using pfSense. It's effective and solid."
- "The portal is still not well-tuned. There are still issues regarding implementation and its effectiveness. But besides that, everything else is great, from the purchase to implementation, setup, etc. Only the portal needs a lot of work."
What is our primary use case?
I use pfSense as a firewall for a university client with 10,000 to 12,000 users. I'm a consultant to the client, and they haven't introduced the product to their IT team. They are only starting to train themselves and use it to secure their environment from end to end.
How has it helped my organization?
One of the biggest benefits is cost savings. It has reduced operating costs compared to Sophos by more than 50 percent. PfSense Plus helped us minimize downtime. I can configure it for high availability, and the machines are simple and reliable. The Netgear devices work well. They stay up. I built a cluster, and they work seamlessly.
What is most valuable?
I like how affordable and flexible pfSense is. I can achieve the protection I need in a flexible manner. I enjoy using pfSense. It's effective and solid.
What needs improvement?
Two key areas need improvement: the traffic profile and better centralized management. It would be great if we could have a single pane of glass for managing multiple appliances running in different locations. Sophos has much better centralized management, but you're paying an arm and a leg for it.
The management is good, but it's quite basic. If I have multiple instances deployed, I can't manage the information like I would when I use something like Sophos Central to manage multiple devices in different locations.
The portal is still not well-tuned. There are still issues regarding implementation and its effectiveness. But besides that, everything else is great, from the purchase to implementation, setup, etc. Only the portal needs a lot of work.
What do I think about the stability of the solution?
I rate pfSense 10 out of 10 for stability.
What do I think about the scalability of the solution?
I rate pfSense 10 out of 10 for scalability. It's highly scalable.
How are customer service and support?
I have not contacted Netgate support yet, but I've heard that the technical support is excellent. I can't afford it.
Which solution did I use previously and why did I switch?
We were using Sophos but switched due to the price. I was looking for a more affordable firewall solution, which brought me to pfSense. I sought something to replace our existing device. We needed something to do the same thing I was doing, including firewall, IPS, etc., but that wouldn't cost me as much as Sophos did.
PfSense isn't very easy, but if you know what you're doing and know what you're looking for, you can get it done. It's technical compared to Sophos. It's not difficult. It's just more technical.
How was the initial setup?
PfSense was straightforward. The infrastructure is complex, but the implementation was straightforward for me. Maybe that's because I've had years of experience in IT infrastructure deployment.
The deployment time depends on the features you want to implement. It took me about a week. The initial setup took less than two hours, but it took me about a week to finish the tune-up. I mostly deployed it by myself. I just looked up online videos from experts and understood what to do next. After deployment, it requires the occasional firmware update. That's it.
What's my experience with pricing, setup cost, and licensing?
I rate pfSense 10 out of 10 for affordability. The company did the price review of Sophos and just took it out of the wall. Most of our clients have recommended Netgate. The total cost of ownership is excellent. It makes a lot of sense for SMEs. I pay a little bit on top. The Netgate infrastructure is much easier to approach.
What other advice do I have?
I rate Netgate pfSense eight out of 10. I recommend it to others. It's affordable and not that difficult to set up or manage. You need to be certified to use Sophos, but we don't need any specific certifications to own or manage pfSense.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Netgate pfSense
August 2025

Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,384 professionals have used our research since 2012.
Owner at a consultancy with 1-10 employees
It was easy to set up WireGuard and connect seamlessly to customer sites
Pros and Cons
- "I like the VPN features. We use WireGuard, which is part of the pfSense package. That was easy to set up, so I could connect to other customer sites seamlessly."
- "I would like to see an additional wizard added to pfSense when you add some of their other packages. You can add a package from pfSense to do a particular task, but you need to be a product expert or willing to spend time on the Internet for hours and hours to figure out how to configure some of those features correctly."
What is our primary use case?
We use pfSense for firewall, ad-blocking, and IPS functions. We have two pfSense instances on Dell hardware, and one exclusively does IPS/IDS. I have the firewall features turned off on that. The other use case is for the firewall features, reporting, and VPN.
How has it helped my organization?
The first benefit is that pfSense offers an affordable firewall solution. It's open source and available on any platform. If you wanted to pull an old machine out of your garage, you could set up a pretty decent pfSense installation. Having learned a little more about pfSense and some of the additional packages that can be bolted onto pfSense, I've used it now for quite a few different things.
I haven't had any particular instances where I felt I was under attack or the firewall was somehow inadequate. I feel very comfortable that this will do everything to protect data. The initial deployment was positive, and we started seeing the benefits within a couple of hours.
The pfSense Plus has vetted rules and software releases from Netgate. Having that extra layer of accountability from Netgate with the Plus features is a positive.
What is most valuable?
I like the VPN features. We use WireGuard, which is part of the pfSense package. That was easy to set up, so I could connect to other customer sites seamlessly. Is there such a thing as being too flexible? It's a highly flexible platform, especially regarding support for third-party packages. It's almost like you're overfilling your grocery cart, and items are all falling on the floor. You can add too much to it.
What needs improvement?
The single pane of glass management could be better. For example, it relies on several additional packages to provide some of the features advertised as part of its capabilities, but those packages are not visible directly through the initial pfSense dashboard.
It is easy to add features, but configuring them takes a lot of knowledge. I would like to see an additional wizard added to pfSense when you add some of their other packages. You can add a package from pfSense to do a particular task, but you need to be a product expert or willing to spend time on the Internet for hours and hours to figure out how to configure some of those features correctly.
For how long have I used the solution?
We have used pfSense for about one year.
What do I think about the stability of the solution?
We haven't experienced any crashes or performance issues. I have pfSense loaded up with third-party packages, and it's just rock solid.
What do I think about the scalability of the solution?
We're a small shop, so I don't have much experience deploying it in bigger, better, faster scenarios.
How are customer service and support?
I rate Netgate support nine out of 10. They were very responsive. It took some getting used to because I always used phone support. I love phone support. I like talking to people, but the support level that I paid for was email. They were on it fairly quickly. It was a licensing issue, and they told me exactly what the problem was within 24 hours.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've used Cisco firewalls before and found them very complicated. You don't know what you're doing, and it's dedicated hardware. I've used some other common off-the-shelf products, such as Netgear and Linksys. I thought pfSense was the best fit.
How was the initial setup?
The initial deployment of the pfSense firewall is easy. It took nearly four hours, including the additional configuration tweaks. We're a small environment, so it was pretty straightforward
After deployment, it doesn't require much maintenance. It's essentially fire and forget. I chose to do the updates manually, but you can set it to update automatically. I should note that I chose Dell platforms to run pfSense because there's a lot of industry knowledge regarding the combination of Dell and pfSense. Anyone deploying some no-name hardware from other companies will probably run into some trouble.
What's my experience with pricing, setup cost, and licensing?
PfSense is affordable. I appreciate that it's based on a support requirement instead of bandwidth or users. We're pretty small, so we don't touch many of those levels that they might have.
Since I'm using my own hardware instead of a Netgate appliance, this is the most bang for your buck you can deploy. I pay for the Plus and feel the benefits behind the software and configurations. The average user might be fine with the community edition, but I wouldn't go that route for a production environment. I think this is a cost-effective solution. I can amend it to manipulate the various hardware configurations without much pushback from Netgate.
What other advice do I have?
I rate Netgate pfSense nine out of 10. I highly recommend it. It isn't a perfect solution. It's a little difficult to configure. If you can afford it, I would pay for the phone support.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Chief Technology Officer at Dcomm
Plug-and-play, easy to use, and responsive support
Pros and Cons
- "The solution is very stable. Issues are rare unless a box gets hit with a power surge or something."
- "If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update the, and keep them all central. A management portal would be very nice."
What is our primary use case?
We're using our offices including the main endpoint VPN connections from the main office to our seller offices.
What is most valuable?
The ability to load third-party apps, et cetera, into the firewall is pretty useful for a commercial-grade router and file, which is very customizable.
Out of the box, it's about 90% plug-and-play. The last piece, you do need to know how you're setting the firewall up for your environment. It varies on what you're trying to do with it. It can be really easy or difficult, depending on your knowledge base for the application.
We were able to witness the benefits of the product pretty much immediately.
Once you've navigated around it, it's pretty self-explanatory as to where to go. Compared to other products out there, it's pretty easy.
What needs improvement?
We do have a sort of single pane of glass for management purposes. You do have to dig around. If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update them, and keep them all central. A management portal would be very nice.
For how long have I used the solution?
I've been using the solution for seven years.
What do I think about the stability of the solution?
The solution is very stable. Issues are rare unless a box gets hit with a power surge or something.
What do I think about the scalability of the solution?
I found the solution very scalable. I can load multiple VMs on it and add a second port onto it. Depending on your deployment, it is very scalable.
How are customer service and support?
I've only contacted support for corrupted systems. If the unit loses power and comes back on every once in a while, the file system gets corrupted, or it won't boot the device, and you have to reimage the whole thing, in those instances, I've had to reach out to them. They are pretty quick. I can get help within an hour even with just the free version. I imagine the paid version has good support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Ubiquiti, which was not a great solution. We also used something previously to that. Their interface was very clunky. You'd have to go through multiple different routes to get to the same thing that pfSense has on a single drop-down. pfSense has a more user-friendly setup. Plus, it has CLI integration, which is great. You can make configurations in the command prompt too, which is a lot easier.
How was the initial setup?
To me, the setup is fairly easy. That said, I already knew what I was doing to set it up. If I were coming fresh out into the network and environment, I'd never switch one of the firewalls; there may be a challenge to go through and figure out what the router can do to make the deployment work. When you get the box, you plug it in. There are a lot of features that are ported in that don't come pre-installed. However, they have a complete database listed in their browser. You just go down and pick what services you need. If you don't know what is there, it may take you a while to figure out what the unit is capable of.
There is no maintenance beyond occasional updates. They don't push those out too often. However, when they do come out, you have to go through them one by one to make sure the update is successful. It would be easier if you could do everything all at once and be done with it.
How long it takes to deploy varies as each office is different. If I'm building three or four VLANs, that's going to take time. In my role, I built one base configuration that contains the VLANs IP servers that I want to use. I've extracted that as a file that I can modify and push to different boxes. So if I get 100 2100 or 4100, it doesn't matter. All I have to do is change the interface names and push it back to the box. So to me, it's pretty fast, and it already has my settings ready to go.
What about the implementation team?
I handled the initial setup myself.
What's my experience with pricing, setup cost, and licensing?
I use the community version. For configurations and troubleshooting, you do need to pay. I'm not sure what the pricing is for Plus.
What other advice do I have?
I'd rate the solution ten out of ten.
I'm a customer and end-user.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Owner at davecanfixit.com
It is highly configurable with zero downtime but lacks a web dashboard
Pros and Cons
- "The most valuable features of pfSense are its ability to segment networks, create different subnets, create different VLANs, and use the VPN, as well as its affordability."
- "pfSense lacks a centralized web dashboard for viewing all my clients' pfSense dashboards."
What is our primary use case?
My company uses Netgate pfSense firewall routers for some clients, but I choose the device based on their needs. For locations like restaurants that require constant internet, I use a different device with cellular failover built-in. The cost-effective Netgate pfSense is a good option in simpler locations like doctors' offices. I can leverage Netgate's ability to handle multiple ISPs for clients with large internet demands. Ultimately, the choice depends on the client's budget and specific requirements.
In my role, I decide what our clients should implement for their network security. I want to create a secure environment by separating the business network from the Wi-Fi and phone networks. To achieve this separation, pfSense uses different subnets to effectively block any incoming traffic attempting unauthorized access to the network.
How has it helped my organization?
pfSense is highly configurable, offering flexibility to tailor its features and functionality to each client's network needs.
pfSense offers a wide range of plugins and add-ons, making initial configuration straightforward. However, since I primarily rely on endpoint security products installed on clients' workstations for their overall protection, my pfSense setup focuses on basic functionality. This includes configuring the firewall for my in-house network and leveraging its ability to handle multiple WAN connections. Ultimately, pfSense's affordability and ease of use make it a great choice for me as a secure and customizable router/firewall solution.
Network segmentation offers the biggest benefit for my clients. By creating separate Wi-Fi, phone systems, and business network segments, I can isolate any security breaches and prevent them from spreading throughout the entire network. As the decision-maker, I prioritize client security without needing them to understand the technical details. My focus is ensuring their networks are secure.
I have never had any downtime using pfSense Plus.
What is most valuable?
The most valuable features of pfSense are its ability to segment networks, create different subnets, create different VLANs, and use the VPN, as well as its affordability.
What needs improvement?
pfSense lacks a centralized web dashboard for viewing all my clients' pfSense dashboards. A single pane of glass for both web access and management would be a game-changer. This missing interface is my biggest frustration with pfSense, and improvement is sorely needed. I have clients all over the United States and would deploy many more pfSense firewalls if it had a centralized web dashboard.
For how long have I used the solution?
I started installing Netgate pfSense for clients almost three years ago.
What do I think about the stability of the solution?
I would rate the stability of Netgate pfSense ten out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of Netgate pfSense ten out of ten.
Which solution did I use previously and why did I switch?
We've worked with almost every firewall: SonicWall, Cradlepoint, Ubiquiti, Fortinet, and UniFi devices. You get into the licensing of some of those with SonicWall and Fortinet, and it's just not the product that I like to sell to my clients. I'm always client-friendly. I want to find the most affordable product for them that does the best job. NetGate pfSense is the right one for some but not for others.
How was the initial setup?
The deployment is simple. We preconfigure the device in the shop and then take it out and hook it up in less than one hour.
We have three people total who deploy the firewalls, including myself.
What was our ROI?
Netgate pfSense is a set-and-forget product other than deploying and periodically updating the firmware. pfSense has been solid for me.
What's my experience with pricing, setup cost, and licensing?
Unlike many firewalls that require annual licensing fees, making them expensive for small businesses, pfSense is an affordable option.
What other advice do I have?
I would rate Netgate pfSense seven out of ten. The only area of improvement is the web dashboard, which is currently lacking in pfSense.
I use other products to control data security. Most of my clients don't have an in-house server. I work with small businesses, and that's why the Netgate pfSense device works well. For my larger clients, we go to the cloud for data storage and data security with redundancy. So, I don't use pfSense for data security at all.
pfSense is a good value for some clients; it's client-specific. It depends upon other things we are deploying there, such as what kind of Wi-Fi network we use. If we are adding a VoIP phone system. It just depends on what the client's needs are, but It is the right device for the right client.
A lot of our clients are small businesses. I've got one fairly large business. It is a restaurant group nationwide with 700 employees, but its main office has maybe 30 to 50 employees. So, that's probably my largest deployment of the Netgate device.
The only maintenance required for the pfSense firewalls is applying the occasional firmware updates.
Some MSPs are more focused on making money. I'm not. I'm focused on the right fit for the client, and the money takes care of itself. pfSense is a great device. I'm not focused on what will make me money. I'm focused on what is best for the client. In many decisions, the Netgate pfSense is the right decision for that client.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
DevOps Engineer at Vogel Communications Group GmbH & Co. KG
Has good performance optimization documentation
Pros and Cons
- "The performance optimization documentation has improved our organization. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection."
- "Performance Optimization Documentation could use improvement. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection."
What is our primary use case?
We use it as a firewall within our public cloud infrastructure. We use it in particular for IPSec, VPN, and Reverse Proxying HTTP Traffic. We have deployed multiple pfSenses and most of them are configured as HA/Failover.
We wanted to secure traffic between our main office and multiple public cloud data centers and providers. We also wanted to have access to our cloud components via VPN.
We have multiple websites that are proxied via HAProxy and secured via Let’s Encrypt TLS Certificates (generated via the ACME Plugin).
We deploy across multiple virtual data centers that are in different physical locations. Multiple teams have their own deployment. One HA / Failover cluster is the entry point to our websites so there are millions of HTTP requests per month. We also have around 20 to 30 users (Dev and Ops) who use the VPN feature. Behind the pfSense firewalls, there are around 100+ servers and no end users.
How has it helped my organization?
We replaced a Sophos UTM 9 Failover Cluster with a pfSense Failover Cluster and we can now make config and certificate changes without downtime. Also, the TLS certificates are rotated automatically.
The performance optimization documentation has improved our organization. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection.
pfSense sort of gives us a single pane of glass management. We use the same product multiple times so we only need to know one product but it also does not offer a single management platform for all deployments. Whether this is good or bad depends on the point of view. On the one hand, we need to manage multiple setups, but on the other hand, we have a clear separation of concerns and risk zones (if the user account on one system is breached not all systems are affected).
What is most valuable?
It is hard to pinpoint a specific feature that is the most valuable. I think the big community is a major benefit. Most problems we encounter were already encountered and mostly solved by someone else. Most of the components are open-source tools, so the error messages have hits on Google which makes debugging easier.
pfSense has Plugins and is open source so everybody can add features or improve the product. For example, HAProxy, ACME Plugin, Prometheus-node-exporter, Nmap, etc. I see it as a relatively flexible product. If something is not working via the WebUI, SSH or WebKVM is always there.
Most of the time it is very straightforward to use a feature or plugin, the documentation is great and has examples that are very helpful. If something is a bit tricky, pfSense luckily has a big community.
What needs improvement?
Performance Optimization Documentation could use improvement. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection.
For how long have I used the solution?
We have been using pfSense for eight years.
What do I think about the stability of the solution?
pfSense is a very stable solution. In all the years I had around three instabilities.
What do I think about the scalability of the solution?
Two people handle the maintenance of all pfSense Firewalls.
It can be used in small to big deployments. If the bandwidth hits more than 10GBs or 20GBs you need to optimize it to get good results. I would also not recommend it in very big ISP deployments with TBs of traffic.
How are customer service and support?
I have never used the support for any technical issue. The community forums and Google always were enough.
I rate the support an eight out of ten. I had an issue with a pfSense Plus License and the support was helpful and got my problem resolved within a day.How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In one of our virtual data centers, we had a Sophos UTM 9 as failover but it had some very annoying problems (Let’s Encrypt TLS Cert generation or WAF config reloads resulted in a two-minute downtime).
How was the initial setup?
The old installation was straightforward, but the new installer has some bugs and does not really work.
What about the implementation team?
We implemented it ourselves.
Previous deployments were done by a System Engineer and the current deployments are done by me (DevOps Engineer) and a System Engineer. It was a one-person job.
What was our ROI?
We have better uptimes and lower support costs in comparison to the Sophos firewall and we are also saving on licensing fees.
What's my experience with pricing, setup cost, and licensing?
The licensing seems fair. We owned the TAC Lite License for some time. The problem was, that the license is bound to a device ID which does not really work well with VMs where this ID changes sometimes.
We use pfSense Community Edition as our firewall within our public cloud so we only pay for the VM and the traffic.
What other advice do I have?
I would rate it an eight out of ten. It is very good but has some fields in which it can improve.
You need to have an interest in the topic and also (like any security product) it needs regular attention. But it is a reliable firewall and the combination of BSD and ZFS makes it pretty solid.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems Manager at Tillamook County
The solution has been highly flexible
Pros and Cons
- "PfSense was quite a bit less expensive than some other alternatives, and it's worked as well as we could hope."
- "We're doing a lot of OpenVPN tunnels, and some of the fields in the OpenVPN setup on the server side do not lend themselves to multiple sites. It's kind of ugly. It's a big list of allowed IP addresses. I'd much rather see that via the table individually."
What is our primary use case?
I have three firewalls running my entire county and 11 smaller versions of the firewalls doing OpenVPN tunnels to my remote sites through StarLink.
What is most valuable?
PfSense has been highly flexible, and it's worked out great for us for the most part. The Plus version has support, which we will pay for since it is our edge firewall. I have not had an issue with adding features.
What needs improvement?
We're doing a lot of OpenVPN tunnels, and some of the fields in the OpenVPN setup on the server side do not lend themselves to multiple sites. It's kind of ugly. It's a big list of allowed IP addresses. I'd much rather see that via the table individually.
The individual firewalls have a single pane of glass view, but we have so many of them. You need to log into each to manage them.
For how long have I used the solution?
I'm officially about two years into using pfSense and one year in production.
What do I think about the stability of the solution?
I have not had any crashes happen.
What do I think about the scalability of the solution?
Overall, I've been happy with these firewalls.
How are customer service and support?
I rate Netgate support eight out of 10. They were highly responsive. It was strictly email support. I didn't buy phone support.
Which solution did I use previously and why did I switch?
We were running a Sophos firewall as the edge router of everything we did, and it wasn't meeting our expectations. I've used Cisco firewalls for most of my career. The Sophos firewall was underpowered and overburdened. It was constantly causing issues, such as filling up the logs and crashing the firewall in the middle of the day. I have not had that issue with the pfSense.
How was the initial setup?
It was harder to order them than it was to deploy them. As a county government, we ran into purchasing issues, but we ultimately managed to make it happen. It took us about three months to deploy all of them. After deployment, you need to update the firewall codes and back it up. That's pretty typical.
What's my experience with pricing, setup cost, and licensing?
PfSense was quite a bit less expensive than some other alternatives, and it's worked as well as we could hope. We have three 1500s and 11 of the 4100s. The total cost of ownership has been pretty beneficial.
Which other solutions did I evaluate?
We looked at some other options. I'm a Cisco guy, but pfSense firewalls provide more bang for your buck.
What other advice do I have?
I rate Netgate pfSense eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Owner at GroupGates, LLC
It is flexible, easy to use, and stable
Pros and Cons
- "The intuitiveness and ease of use are the most valuable features of pfSense."
- "I should have phone support for a certain period, even at the lower price point."
What is our primary use case?
We use pfSense as our router and firewall on several sites.
We implemented the pfSense open platform because we wanted to move away from SonicWall.
We use the community edition of the software and purchase the Netgate router separately. I used white boxes initially, but now I'm also using the Netgate hardware. It's a great product.
How has it helped my organization?
The pfSense offers exceptional flexibility, far surpassing SonicaWall's capabilities. Its intuitive interface, complete with a better layout of management screens, makes it a breeze to use. While Cisco routers may be overkill for many applications, pfSense performs well.
Using pfSense is easy. It has intuitive management screens. And if I ever run into a blockade, I pay for the technician annually. I am confident in sticking with that platform. It's always worked for me. It's tried and true.
I hired a seasoned professional with extensive experience using pfSense on white boxes for years, specifically the community edition. His mastery of configuration was evident, and I was impressed by his expertise. After he walked me through several scenarios, I was convinced of the benefits of the Netgate product and began replacing my aging SonicWall devices with it, drawn to the ease of use that Netgate offered.
Netgate pfSense provides a single-pane-of-glass to manage all our firewall needs.
It's relatively straightforward for a novice to deploy pfSense, likely easier than SonicWall. However, I've used SonicWall extensively and am gradually phasing them out. While SonicWall is a solid product, pfSense is remarkably easy to set up.
What is most valuable?
The intuitiveness and ease of use are the most valuable features of pfSense.
What needs improvement?
One thing that has always bothered me is that when I buy an appliance, there are two tiers of support: email-only and a premium tier, like TAC, that allows me to speak to someone on the phone. If I'm purchasing their hardware, I should have phone support for a certain period, even at the lower price point. My only complaint is that I need phone support, not just email, because if there's a support issue, I don't have time to wait for an email response. I need to speak to someone immediately. Therefore, I think I should receive TAC support for the Netgate pfSense for at least the first year after purchasing the hardware.
For how long have I used the solution?
I have been using Netgate pfSense for six years.
What do I think about the stability of the solution?
I have never experienced any stability issues with pfSense.
What do I think about the scalability of the solution?
To scale we need to add a unit.
How are customer service and support?
I had email support for about a week before calling Netgate to request telephone support. I explained that if I'm calling for assistance, I'm likely experiencing an urgent issue and need immediate help. I decided to pay $699 or so for annual telephone support, which has been excellent. The support is prompt and effective, making it well worth the investment.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used SonicWall but migrated to pfSense because it is a more intuitive router and firewall.
Compared to Cisco, Netgate is definitively the product that is better for my use case. I know there's a want in the industry for Cisco devices. However, in the hotel vertical, I just don't need it, nor do I need to pay for the expertise in configuration of that platform.
How was the initial setup?
The first time I deployed a pfSense, a seasoned professional guided me through the process, making it incredibly easy to complete.
What's my experience with pricing, setup cost, and licensing?
Netgate pfSense is fairly priced. It's probably the most powerful router firewall I've come across.
The total cost of ownership of pfSense is reasonable, considering the value it provides. I appreciate the VPN, router, and firewall functionality it offers, which is essential for my business operations. In fact, the ongoing costs associated with pfSense do not significantly exceed the initial purchase price.
What other advice do I have?
I would rate Netgate pfSense nine out of ten.
Other than firmware updates, pfSense requires minimal maintenance. I update the firmware every two to three months for routine maintenance or immediately if a security vulnerability is discovered.
For a new user, I would recommend TAC support. I've spoken with others in my industry who have had positive experiences with TAC, particularly compared to email support. They've reported being up and running within five minutes of contacting TAC. Additionally, problem resolution is also swift and effective. So, I highly recommend new users invest in TAC support. It's well worth the money.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Cisco Meraki MX
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Sophos XGS
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Sophos and pfSense?
- How do I choose between Fortinet FortiGate and pfSense?
- How do I deploy anti-spam in pfSense or SonicWall TZ?
- What are the differences between Fortinet FortiGate and pfSense?
- Comparison between Sophos XG and pfSense as firewalls
- What is the difference between PfSense and OPNsense?
- Why is pfSense's firewall better than OPNsense's?
- Which solution do you prefer: pfSense or KerioControl?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet