We use pfSense for firewall, ad-blocking, and IPS functions. We have two pfSense instances on Dell hardware, and one exclusively does IPS/IDS. I have the firewall features turned off on that. The other use case is for the firewall features, reporting, and VPN.
Owner at a consultancy with 1-10 employees
It was easy to set up WireGuard and connect seamlessly to customer sites
Pros and Cons
- "I like the VPN features. We use WireGuard, which is part of the pfSense package. That was easy to set up, so I could connect to other customer sites seamlessly."
- "I would like to see an additional wizard added to pfSense when you add some of their other packages. You can add a package from pfSense to do a particular task, but you need to be a product expert or willing to spend time on the Internet for hours and hours to figure out how to configure some of those features correctly."
What is our primary use case?
How has it helped my organization?
The first benefit is that pfSense offers an affordable firewall solution. It's open source and available on any platform. If you wanted to pull an old machine out of your garage, you could set up a pretty decent pfSense installation. Having learned a little more about pfSense and some of the additional packages that can be bolted onto pfSense, I've used it now for quite a few different things.
I haven't had any particular instances where I felt I was under attack or the firewall was somehow inadequate. I feel very comfortable that this will do everything to protect data. The initial deployment was positive, and we started seeing the benefits within a couple of hours.
The pfSense Plus has vetted rules and software releases from Netgate. Having that extra layer of accountability from Netgate with the Plus features is a positive.
What is most valuable?
I like the VPN features. We use WireGuard, which is part of the pfSense package. That was easy to set up, so I could connect to other customer sites seamlessly. Is there such a thing as being too flexible? It's a highly flexible platform, especially regarding support for third-party packages. It's almost like you're overfilling your grocery cart, and items are all falling on the floor. You can add too much to it.
What needs improvement?
The single pane of glass management could be better. For example, it relies on several additional packages to provide some of the features advertised as part of its capabilities, but those packages are not visible directly through the initial pfSense dashboard.
It is easy to add features, but configuring them takes a lot of knowledge. I would like to see an additional wizard added to pfSense when you add some of their other packages. You can add a package from pfSense to do a particular task, but you need to be a product expert or willing to spend time on the Internet for hours and hours to figure out how to configure some of those features correctly.
Buyer's Guide
Netgate pfSense
June 2025

Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
We have used pfSense for about one year.
What do I think about the stability of the solution?
We haven't experienced any crashes or performance issues. I have pfSense loaded up with third-party packages, and it's just rock solid.
What do I think about the scalability of the solution?
We're a small shop, so I don't have much experience deploying it in bigger, better, faster scenarios.
How are customer service and support?
I rate Netgate support nine out of 10. They were very responsive. It took some getting used to because I always used phone support. I love phone support. I like talking to people, but the support level that I paid for was email. They were on it fairly quickly. It was a licensing issue, and they told me exactly what the problem was within 24 hours.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've used Cisco firewalls before and found them very complicated. You don't know what you're doing, and it's dedicated hardware. I've used some other common off-the-shelf products, such as Netgear and Linksys. I thought pfSense was the best fit.
How was the initial setup?
The initial deployment of the pfSense firewall is easy. It took nearly four hours, including the additional configuration tweaks. We're a small environment, so it was pretty straightforward
After deployment, it doesn't require much maintenance. It's essentially fire and forget. I chose to do the updates manually, but you can set it to update automatically. I should note that I chose Dell platforms to run pfSense because there's a lot of industry knowledge regarding the combination of Dell and pfSense. Anyone deploying some no-name hardware from other companies will probably run into some trouble.
What's my experience with pricing, setup cost, and licensing?
PfSense is affordable. I appreciate that it's based on a support requirement instead of bandwidth or users. We're pretty small, so we don't touch many of those levels that they might have.
Since I'm using my own hardware instead of a Netgate appliance, this is the most bang for your buck you can deploy. I pay for the Plus and feel the benefits behind the software and configurations. The average user might be fine with the community edition, but I wouldn't go that route for a production environment. I think this is a cost-effective solution. I can amend it to manipulate the various hardware configurations without much pushback from Netgate.
What other advice do I have?
I rate Netgate pfSense nine out of 10. I highly recommend it. It isn't a perfect solution. It's a little difficult to configure. If you can afford it, I would pay for the phone support.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Chief Technology Officer at Dcomm
Plug-and-play, easy to use, and responsive support
Pros and Cons
- "The solution is very stable. Issues are rare unless a box gets hit with a power surge or something."
- "If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update the, and keep them all central. A management portal would be very nice."
What is our primary use case?
We're using our offices including the main endpoint VPN connections from the main office to our seller offices.
What is most valuable?
The ability to load third-party apps, et cetera, into the firewall is pretty useful for a commercial-grade router and file, which is very customizable.
Out of the box, it's about 90% plug-and-play. The last piece, you do need to know how you're setting the firewall up for your environment. It varies on what you're trying to do with it. It can be really easy or difficult, depending on your knowledge base for the application.
We were able to witness the benefits of the product pretty much immediately.
Once you've navigated around it, it's pretty self-explanatory as to where to go. Compared to other products out there, it's pretty easy.
What needs improvement?
We do have a sort of single pane of glass for management purposes. You do have to dig around. If we had, for example, ten pfSense routers deployed, it would be nice to have one console where you could see all ten devices, update them, and keep them all central. A management portal would be very nice.
For how long have I used the solution?
I've been using the solution for seven years.
What do I think about the stability of the solution?
The solution is very stable. Issues are rare unless a box gets hit with a power surge or something.
What do I think about the scalability of the solution?
I found the solution very scalable. I can load multiple VMs on it and add a second port onto it. Depending on your deployment, it is very scalable.
How are customer service and support?
I've only contacted support for corrupted systems. If the unit loses power and comes back on every once in a while, the file system gets corrupted, or it won't boot the device, and you have to reimage the whole thing, in those instances, I've had to reach out to them. They are pretty quick. I can get help within an hour even with just the free version. I imagine the paid version has good support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Ubiquiti, which was not a great solution. We also used something previously to that. Their interface was very clunky. You'd have to go through multiple different routes to get to the same thing that pfSense has on a single drop-down. pfSense has a more user-friendly setup. Plus, it has CLI integration, which is great. You can make configurations in the command prompt too, which is a lot easier.
How was the initial setup?
To me, the setup is fairly easy. That said, I already knew what I was doing to set it up. If I were coming fresh out into the network and environment, I'd never switch one of the firewalls; there may be a challenge to go through and figure out what the router can do to make the deployment work. When you get the box, you plug it in. There are a lot of features that are ported in that don't come pre-installed. However, they have a complete database listed in their browser. You just go down and pick what services you need. If you don't know what is there, it may take you a while to figure out what the unit is capable of.
There is no maintenance beyond occasional updates. They don't push those out too often. However, when they do come out, you have to go through them one by one to make sure the update is successful. It would be easier if you could do everything all at once and be done with it.
How long it takes to deploy varies as each office is different. If I'm building three or four VLANs, that's going to take time. In my role, I built one base configuration that contains the VLANs IP servers that I want to use. I've extracted that as a file that I can modify and push to different boxes. So if I get 100 2100 or 4100, it doesn't matter. All I have to do is change the interface names and push it back to the box. So to me, it's pretty fast, and it already has my settings ready to go.
What about the implementation team?
I handled the initial setup myself.
What's my experience with pricing, setup cost, and licensing?
I use the community version. For configurations and troubleshooting, you do need to pay. I'm not sure what the pricing is for Plus.
What other advice do I have?
I'd rate the solution ten out of ten.
I'm a customer and end-user.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Netgate pfSense
June 2025

Learn what your peers think about Netgate pfSense. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Owner at davecanfixit.com
It is highly configurable with zero downtime but lacks a web dashboard
Pros and Cons
- "The most valuable features of pfSense are its ability to segment networks, create different subnets, create different VLANs, and use the VPN, as well as its affordability."
- "pfSense lacks a centralized web dashboard for viewing all my clients' pfSense dashboards."
What is our primary use case?
My company uses Netgate pfSense firewall routers for some clients, but I choose the device based on their needs. For locations like restaurants that require constant internet, I use a different device with cellular failover built-in. The cost-effective Netgate pfSense is a good option in simpler locations like doctors' offices. I can leverage Netgate's ability to handle multiple ISPs for clients with large internet demands. Ultimately, the choice depends on the client's budget and specific requirements.
In my role, I decide what our clients should implement for their network security. I want to create a secure environment by separating the business network from the Wi-Fi and phone networks. To achieve this separation, pfSense uses different subnets to effectively block any incoming traffic attempting unauthorized access to the network.
How has it helped my organization?
pfSense is highly configurable, offering flexibility to tailor its features and functionality to each client's network needs.
pfSense offers a wide range of plugins and add-ons, making initial configuration straightforward. However, since I primarily rely on endpoint security products installed on clients' workstations for their overall protection, my pfSense setup focuses on basic functionality. This includes configuring the firewall for my in-house network and leveraging its ability to handle multiple WAN connections. Ultimately, pfSense's affordability and ease of use make it a great choice for me as a secure and customizable router/firewall solution.
Network segmentation offers the biggest benefit for my clients. By creating separate Wi-Fi, phone systems, and business network segments, I can isolate any security breaches and prevent them from spreading throughout the entire network. As the decision-maker, I prioritize client security without needing them to understand the technical details. My focus is ensuring their networks are secure.
I have never had any downtime using pfSense Plus.
What is most valuable?
The most valuable features of pfSense are its ability to segment networks, create different subnets, create different VLANs, and use the VPN, as well as its affordability.
What needs improvement?
pfSense lacks a centralized web dashboard for viewing all my clients' pfSense dashboards. A single pane of glass for both web access and management would be a game-changer. This missing interface is my biggest frustration with pfSense, and improvement is sorely needed. I have clients all over the United States and would deploy many more pfSense firewalls if it had a centralized web dashboard.
For how long have I used the solution?
I started installing Netgate pfSense for clients almost three years ago.
What do I think about the stability of the solution?
I would rate the stability of Netgate pfSense ten out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of Netgate pfSense ten out of ten.
Which solution did I use previously and why did I switch?
We've worked with almost every firewall: SonicWall, Cradlepoint, Ubiquiti, Fortinet, and UniFi devices. You get into the licensing of some of those with SonicWall and Fortinet, and it's just not the product that I like to sell to my clients. I'm always client-friendly. I want to find the most affordable product for them that does the best job. NetGate pfSense is the right one for some but not for others.
How was the initial setup?
The deployment is simple. We preconfigure the device in the shop and then take it out and hook it up in less than one hour.
We have three people total who deploy the firewalls, including myself.
What was our ROI?
Netgate pfSense is a set-and-forget product other than deploying and periodically updating the firmware. pfSense has been solid for me.
What's my experience with pricing, setup cost, and licensing?
Unlike many firewalls that require annual licensing fees, making them expensive for small businesses, pfSense is an affordable option.
What other advice do I have?
I would rate Netgate pfSense seven out of ten. The only area of improvement is the web dashboard, which is currently lacking in pfSense.
I use other products to control data security. Most of my clients don't have an in-house server. I work with small businesses, and that's why the Netgate pfSense device works well. For my larger clients, we go to the cloud for data storage and data security with redundancy. So, I don't use pfSense for data security at all.
pfSense is a good value for some clients; it's client-specific. It depends upon other things we are deploying there, such as what kind of Wi-Fi network we use. If we are adding a VoIP phone system. It just depends on what the client's needs are, but It is the right device for the right client.
A lot of our clients are small businesses. I've got one fairly large business. It is a restaurant group nationwide with 700 employees, but its main office has maybe 30 to 50 employees. So, that's probably my largest deployment of the Netgate device.
The only maintenance required for the pfSense firewalls is applying the occasional firmware updates.
Some MSPs are more focused on making money. I'm not. I'm focused on the right fit for the client, and the money takes care of itself. pfSense is a great device. I'm not focused on what will make me money. I'm focused on what is best for the client. In many decisions, the Netgate pfSense is the right decision for that client.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
DevOps Engineer at Vogel Communications Group GmbH & Co. KG
Has good performance optimization documentation
Pros and Cons
- "The performance optimization documentation has improved our organization. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection."
- "Performance Optimization Documentation could use improvement. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection."
What is our primary use case?
We use it as a firewall within our public cloud infrastructure. We use it in particular for IPSec, VPN, and Reverse Proxying HTTP Traffic. We have deployed multiple pfSenses and most of them are configured as HA/Failover.
We wanted to secure traffic between our main office and multiple public cloud data centers and providers. We also wanted to have access to our cloud components via VPN.
We have multiple websites that are proxied via HAProxy and secured via Let’s Encrypt TLS Certificates (generated via the ACME Plugin).
We deploy across multiple virtual data centers that are in different physical locations. Multiple teams have their own deployment. One HA / Failover cluster is the entry point to our websites so there are millions of HTTP requests per month. We also have around 20 to 30 users (Dev and Ops) who use the VPN feature. Behind the pfSense firewalls, there are around 100+ servers and no end users.
How has it helped my organization?
We replaced a Sophos UTM 9 Failover Cluster with a pfSense Failover Cluster and we can now make config and certificate changes without downtime. Also, the TLS certificates are rotated automatically.
The performance optimization documentation has improved our organization. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection.
pfSense sort of gives us a single pane of glass management. We use the same product multiple times so we only need to know one product but it also does not offer a single management platform for all deployments. Whether this is good or bad depends on the point of view. On the one hand, we need to manage multiple setups, but on the other hand, we have a clear separation of concerns and risk zones (if the user account on one system is breached not all systems are affected).
What is most valuable?
It is hard to pinpoint a specific feature that is the most valuable. I think the big community is a major benefit. Most problems we encounter were already encountered and mostly solved by someone else. Most of the components are open-source tools, so the error messages have hits on Google which makes debugging easier.
pfSense has Plugins and is open source so everybody can add features or improve the product. For example, HAProxy, ACME Plugin, Prometheus-node-exporter, Nmap, etc. I see it as a relatively flexible product. If something is not working via the WebUI, SSH or WebKVM is always there.
Most of the time it is very straightforward to use a feature or plugin, the documentation is great and has examples that are very helpful. If something is a bit tricky, pfSense luckily has a big community.
What needs improvement?
Performance Optimization Documentation could use improvement. The base setup is great but with higher bandwidth, it is really hard to find good documentation on how to tweak the setup to get the most out of your connection.
For how long have I used the solution?
We have been using pfSense for eight years.
What do I think about the stability of the solution?
pfSense is a very stable solution. In all the years I had around three instabilities.
What do I think about the scalability of the solution?
Two people handle the maintenance of all pfSense Firewalls.
It can be used in small to big deployments. If the bandwidth hits more than 10GBs or 20GBs you need to optimize it to get good results. I would also not recommend it in very big ISP deployments with TBs of traffic.
How are customer service and support?
I have never used the support for any technical issue. The community forums and Google always were enough.
I rate the support an eight out of ten. I had an issue with a pfSense Plus License and the support was helpful and got my problem resolved within a day.How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In one of our virtual data centers, we had a Sophos UTM 9 as failover but it had some very annoying problems (Let’s Encrypt TLS Cert generation or WAF config reloads resulted in a two-minute downtime).
How was the initial setup?
The old installation was straightforward, but the new installer has some bugs and does not really work.
What about the implementation team?
We implemented it ourselves.
Previous deployments were done by a System Engineer and the current deployments are done by me (DevOps Engineer) and a System Engineer. It was a one-person job.
What was our ROI?
We have better uptimes and lower support costs in comparison to the Sophos firewall and we are also saving on licensing fees.
What's my experience with pricing, setup cost, and licensing?
The licensing seems fair. We owned the TAC Lite License for some time. The problem was, that the license is bound to a device ID which does not really work well with VMs where this ID changes sometimes.
We use pfSense Community Edition as our firewall within our public cloud so we only pay for the VM and the traffic.
What other advice do I have?
I would rate it an eight out of ten. It is very good but has some fields in which it can improve.
You need to have an interest in the topic and also (like any security product) it needs regular attention. But it is a reliable firewall and the combination of BSD and ZFS makes it pretty solid.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems Manager at Tillamook County
The solution has been highly flexible
Pros and Cons
- "PfSense was quite a bit less expensive than some other alternatives, and it's worked as well as we could hope."
- "We're doing a lot of OpenVPN tunnels, and some of the fields in the OpenVPN setup on the server side do not lend themselves to multiple sites. It's kind of ugly. It's a big list of allowed IP addresses. I'd much rather see that via the table individually."
What is our primary use case?
I have three firewalls running my entire county and 11 smaller versions of the firewalls doing OpenVPN tunnels to my remote sites through StarLink.
What is most valuable?
PfSense has been highly flexible, and it's worked out great for us for the most part. The Plus version has support, which we will pay for since it is our edge firewall. I have not had an issue with adding features.
What needs improvement?
We're doing a lot of OpenVPN tunnels, and some of the fields in the OpenVPN setup on the server side do not lend themselves to multiple sites. It's kind of ugly. It's a big list of allowed IP addresses. I'd much rather see that via the table individually.
The individual firewalls have a single pane of glass view, but we have so many of them. You need to log into each to manage them.
For how long have I used the solution?
I'm officially about two years into using pfSense and one year in production.
What do I think about the stability of the solution?
I have not had any crashes happen.
What do I think about the scalability of the solution?
Overall, I've been happy with these firewalls.
How are customer service and support?
I rate Netgate support eight out of 10. They were highly responsive. It was strictly email support. I didn't buy phone support.
Which solution did I use previously and why did I switch?
We were running a Sophos firewall as the edge router of everything we did, and it wasn't meeting our expectations. I've used Cisco firewalls for most of my career. The Sophos firewall was underpowered and overburdened. It was constantly causing issues, such as filling up the logs and crashing the firewall in the middle of the day. I have not had that issue with the pfSense.
How was the initial setup?
It was harder to order them than it was to deploy them. As a county government, we ran into purchasing issues, but we ultimately managed to make it happen. It took us about three months to deploy all of them. After deployment, you need to update the firewall codes and back it up. That's pretty typical.
What's my experience with pricing, setup cost, and licensing?
PfSense was quite a bit less expensive than some other alternatives, and it's worked as well as we could hope. We have three 1500s and 11 of the 4100s. The total cost of ownership has been pretty beneficial.
Which other solutions did I evaluate?
We looked at some other options. I'm a Cisco guy, but pfSense firewalls provide more bang for your buck.
What other advice do I have?
I rate Netgate pfSense eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Owner at GroupGates, LLC
It is flexible, easy to use, and stable
Pros and Cons
- "The intuitiveness and ease of use are the most valuable features of pfSense."
- "I should have phone support for a certain period, even at the lower price point."
What is our primary use case?
We use pfSense as our router and firewall on several sites.
We implemented the pfSense open platform because we wanted to move away from SonicWall.
We use the community edition of the software and purchase the Netgate router separately. I used white boxes initially, but now I'm also using the Netgate hardware. It's a great product.
How has it helped my organization?
The pfSense offers exceptional flexibility, far surpassing SonicaWall's capabilities. Its intuitive interface, complete with a better layout of management screens, makes it a breeze to use. While Cisco routers may be overkill for many applications, pfSense performs well.
Using pfSense is easy. It has intuitive management screens. And if I ever run into a blockade, I pay for the technician annually. I am confident in sticking with that platform. It's always worked for me. It's tried and true.
I hired a seasoned professional with extensive experience using pfSense on white boxes for years, specifically the community edition. His mastery of configuration was evident, and I was impressed by his expertise. After he walked me through several scenarios, I was convinced of the benefits of the Netgate product and began replacing my aging SonicWall devices with it, drawn to the ease of use that Netgate offered.
Netgate pfSense provides a single-pane-of-glass to manage all our firewall needs.
It's relatively straightforward for a novice to deploy pfSense, likely easier than SonicWall. However, I've used SonicWall extensively and am gradually phasing them out. While SonicWall is a solid product, pfSense is remarkably easy to set up.
What is most valuable?
The intuitiveness and ease of use are the most valuable features of pfSense.
What needs improvement?
One thing that has always bothered me is that when I buy an appliance, there are two tiers of support: email-only and a premium tier, like TAC, that allows me to speak to someone on the phone. If I'm purchasing their hardware, I should have phone support for a certain period, even at the lower price point. My only complaint is that I need phone support, not just email, because if there's a support issue, I don't have time to wait for an email response. I need to speak to someone immediately. Therefore, I think I should receive TAC support for the Netgate pfSense for at least the first year after purchasing the hardware.
For how long have I used the solution?
I have been using Netgate pfSense for six years.
What do I think about the stability of the solution?
I have never experienced any stability issues with pfSense.
What do I think about the scalability of the solution?
To scale we need to add a unit.
How are customer service and support?
I had email support for about a week before calling Netgate to request telephone support. I explained that if I'm calling for assistance, I'm likely experiencing an urgent issue and need immediate help. I decided to pay $699 or so for annual telephone support, which has been excellent. The support is prompt and effective, making it well worth the investment.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used SonicWall but migrated to pfSense because it is a more intuitive router and firewall.
Compared to Cisco, Netgate is definitively the product that is better for my use case. I know there's a want in the industry for Cisco devices. However, in the hotel vertical, I just don't need it, nor do I need to pay for the expertise in configuration of that platform.
How was the initial setup?
The first time I deployed a pfSense, a seasoned professional guided me through the process, making it incredibly easy to complete.
What's my experience with pricing, setup cost, and licensing?
Netgate pfSense is fairly priced. It's probably the most powerful router firewall I've come across.
The total cost of ownership of pfSense is reasonable, considering the value it provides. I appreciate the VPN, router, and firewall functionality it offers, which is essential for my business operations. In fact, the ongoing costs associated with pfSense do not significantly exceed the initial purchase price.
What other advice do I have?
I would rate Netgate pfSense nine out of ten.
Other than firmware updates, pfSense requires minimal maintenance. I update the firmware every two to three months for routine maintenance or immediately if a security vulnerability is discovered.
For a new user, I would recommend TAC support. I've spoken with others in my industry who have had positive experiences with TAC, particularly compared to email support. They've reported being up and running within five minutes of contacting TAC. Additionally, problem resolution is also swift and effective. So, I highly recommend new users invest in TAC support. It's well worth the money.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Owner at SimpleIT
Very flexible with a good interface and responsive support
Pros and Cons
- "The interface is very good. The configuration options are excellent."
- "We take care of more than 60 customers, so it would be nice to have the ability to have all of the pfSense boxes that we deploy under one pane of glass so we can manage them centrally."
What is our primary use case?
We deploy the pfSense firewall to our customers' networks.
How has it helped my organization?
The solution provides customers with reliability and additional security.
What is most valuable?
The interface is very good. The configuration options are excellent. All of its capabilities are quite useful. It's more capable than what we need it for. I like having the ability to have additional capabilities compared to others.
pfSense's flexibility is great. I would rate it pretty high based on that.
We immediately witnessed the benefits of pfSense.
The IPS intrusion protection system helps prevent data loss. It works really well. It's a little bit manual process, however, it works really well overall.
pfSense provides high availability to help minimize downtime. They all have built-in high availability, which fails over to another box.
The solution provides visibility that enables users to make data-driven decisions. That said, that's a capability that we really don't need due to how small our customers are.
The visibility in pfSense helps to optimize performance. Just being able to see network traffic and the load on the firewall on the box, or the response times from packets going back and forth is helpful. There is a lot of visibility into network performance.
What needs improvement?
pfSense does not provide a single pane of glass type of management. That's one of the biggest downfalls. We take care of more than 60 customers, so it would be nice to have the ability to have all of the pfSense boxes that we deploy under one pane of glass so we can manage them centrally.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
I've had no issues with stability; I'd rate it ten out of ten.
What do I think about the scalability of the solution?
While we do not scale the solution, I can see it being very scalable.
How are customer service and support?
Technical support is of excellent quality, and they have fast response times.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We've never used any alternative to pfSense.
How was the initial setup?
We're buying the machines from Netgate. It's very easy to deploy. I'd rate the ease of implementation as eight out of ten. Even if someone didn't have much experience with pfSense, it would be pretty easy.
It's low maintenance; we may only need to worry about an occasional firmware update.
What about the implementation team?
I did not use an integrator or consultant during the implementation. I handled the process myself.
What was our ROI?
The total cost of ownership is very good. It's low maintenance. Once you get it up and running, you really don't have to touch it. It's very favorable to have the inclusion of firewall, VPN, and router functionalities.
What's my experience with pricing, setup cost, and licensing?
The pricing is excellent.
What other advice do I have?
We're an end-user.
We use the pfSense Plus version.
I'd rate pfSense nine out of ten.
New users should be aware that it is more complex than just a consumer-grade product. Users need to be prepared for a lot of features that they might not understand or know how to implement at first. Check your resources in preparation.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Manager at GECT Solutions, Inc
Offers excellent flexibility and works well with both physical appliances and virtual machines
Pros and Cons
- "The most valuable features of pfSense are the pfBlocker, HAProxy, NAT, and VPN."
- "I am unsure if it's feasible, but I have previously utilized a web VPN interface with Cisco Firewalls that allows VPN connections through a website, eliminating the installation of VPN software."
What is our primary use case?
I use Netgate pfSense as my office firewall.
I implemented pfSense as a firewall, VPN, and content filtering solution using pfBlocker and configured it to verify HAProxy certificates.
Most of our pfSense deployments are on existing machines with a small amount in the cloud.
How has it helped my organization?
pfSense offers excellent flexibility and works well with both physical appliances and virtual machines.
The ease of adding features to pfSense and configuring them depends mainly on the user's experience. I find it extremely easy.
Firewalls and Network Address Translation offer immediate benefits once configured, as they are foundational security measures. Other features, however, require more extensive configuration and testing before their advantages become apparent.
Compared to other firewall solutions, pfSense's interface is user-friendly and straightforward.
pfSense allows us to configure multiple internet connections and firewall rules to minimize downtime.
It provides visibility into our network by capturing and delivering log data, such as Syslog, firewall logs, and other relevant information. This enables us to make informed decisions based on data analysis.
pfSense can help optimize network performance. When using appliances, we can install more than ten gigabit network interface cards and add more as needed, depending on the hardware capabilities. Typically, new appliances come equipped with ten-gigabit network adapters or ports. We can significantly enhance network and server communication speeds by fully utilizing these ten-gigabit connections.
What is most valuable?
The most valuable features of pfSense are the pfBlocker, HAProxy, NAT, and VPN.
What needs improvement?
I am unsure if it's feasible, but I have previously utilized a web VPN interface with Cisco Firewalls that allows VPN connections through a website, eliminating the installation of VPN software. Such a feature would be a valuable addition to pfSense. Additionally, an easy method to monitor pfSense within other monitoring software would be beneficial.
For how long have I used the solution?
I have been using Netgate pfSense for ten years.
What do I think about the stability of the solution?
We have encountered only minor and infrequent stability issues.
What do I think about the scalability of the solution?
Netgate pfSense is highly scalable.
How are customer service and support?
The quality of the technical support is good, but if we cause an issue, we have to pay for the support hours.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have previously used WatchGuard Firebox and OPNsense, but I prefer pfSense for its excellent usability within my company. Other firewalls like WatchGuard and OPNsense are often retained due to customer preference or specific requirements, but most of my deployments utilize Netgate's pfSense.
How was the initial setup?
Deploying a single pfSense box is relatively straightforward. However, the process can become more complex if outdated hardware is used and network cables must be reconfigured. Deployments using Netgate appliances tend to be more straightforward.
We can have the Web GUI up and running in under 30 minutes, and a complete deployment can last up to four hours. One person is required for each deployment.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable.
Netgate pfSense offers effective total cost of ownership by combining firewall, VPN, and router functionalities into a single solution.
What other advice do I have?
I would rate Netgate pfSense nine out of ten.
pfSense does not have any built-in features specifically designed to prevent data loss. Instead, we must configure various functions to indirectly protect against data loss, primarily as a preventative measure against unauthorized access to our servers and equipment.
I use both the paid and community versions of pfSense. Most of my appliances use the paid version. In the cloud, some virtual machines come with the free community version.
Maintenance is required to open ports and create VPN users.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller

Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Untangle NG Firewall
KerioControl
Buyer's Guide
Download our free Netgate pfSense Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Sophos and pfSense?
- How do I choose between Fortinet FortiGate and pfSense?
- How do I deploy anti-spam in pfSense or SonicWall TZ?
- What are the differences between Fortinet FortiGate and pfSense?
- Comparison between Sophos XG and pfSense as firewalls
- What is the difference between PfSense and OPNsense?
- Why is pfSense's firewall better than OPNsense's?
- Which solution do you prefer: pfSense or KerioControl?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet