So I've been using OPNsense for a few years. I have an extensive config inclduing vlans, plugins, policies, suricata, VPN, routes, gateways, HAProxy, etc.
Over the past few months, I've noticed certain bugs, weirdness, and slowness within OPNsense. I recently watched Tom Lawrence's video on the licensing changes and he touched on the openssl vulnerability that OPNsense has yet to remediate.
The Plus license cost (per year) which entitles you to some limited support options is also appealing. Every time I get stuck figuring out something complex in OPNsense, I have to hope someone else has tried to do the same thing and posted about it so I can troubleshoot.
I also don't like having to constantly update. A more "stable"/enterprise focused cycle like pfSense has seems like my pace. It broke on me last year with one of the upgrades and I had to clean install.
Don't get me wrong, I love the UI (mostly), plugins, etc. in OPNsense, but these past few months have got me thinking.
I've also heard that people don't like Netgate as a company, so that could definitely factor into not switching.
First of all, I love Opnsense! I'm saving for Opnsense hardware to support them.
Only thing that is bugging me around lately since 23.7.7. update is getting into my LAN with Tailscale. It's running as an exit node. I do get internet access and everything, but no local services. It worked from the beginning until that update. I hadn't changed anything. I've done all the steps Tailscale describes, but still no LAN access. No blocking rules shows up in the logs. I'm stumped.
For the first point, I believe that not long ago I've seen here that someone made a website where you upload your config file (or something like that) and it generates a config file for opnsense. I don't have the link to that post, but I guess you could manage to find it
I have an official netgate firewall and it runs pfsense+ However, when it comes time to replace it and upgrade to 2.5GB my next firewall will be running opnsense. I just don’t like the direction netgate has gone with their company decisions and I won’t be buying any more hardware from them. I don’t think you should either.
That sounds easy enough, but it creates a situation where I don't know what updates are important (security) and what updates are minor. So I have to read the release notes for each update and then decide if I need it to patch a security vulnerability.
Where with the other method, I know the update is likely critical.
For some those frequent updates are a +, for me it is not. So use what works best for you!
But right now I couldn't use opensense even if I wanted to, as it's FIPS non-compliant due to them still using the depreciated EOL OpenSSH 1.1.1, and no date set to move to v3
I have an extensive config inclduing vlans, plugins, policies, suricata, VPN, routes, gateways, HAProxy, etc.
When you have an extensive config, you should always test the upgrade on a "lab" machine before applying them to your "production" environment. You don't just apply the update blindly and hope nothing breaks.
Plus, opensense gets most of their code from the work done by pfsense, and often have to wait on them to push the code. Just look at what happened with TLS 1.3
OPNSense is far more willing to add "experimental" features and as a result you get a firewall that has more features out of the box, but is less stable.
pfSense is very slow to add new functionality, but the platform is rock solid as a result.
It all comes down to what you want. Do you want to play around with an appliance that has all the knobs, but also some eccentricities, or do you want an appliance that may not have bleeding edge features, but is far less prone to error.
VyOS is very good. It’s a fork of Vyatta which was sold to brocade and sold again to ATT. Ubiquiti products use a fork of Vyatta as well (EdgeOS on their edge routers for example). I used to work with Vyatta and Brocade so I was a big fan of the Edge line for home and SMB. Since Ubiquiti shelved EdgeOS and stopped putting meaningful updates out I switched to VyOS rolling on my home router with one of those Beelink mini PCs with dual nics.
Nope. I have moved away several years ago from pfsense and could not be happier. I am running production off a 2 node, 24 vlan cluster and it’s rock solid
Used both, from pf to opn maybe 15months ago. Never had issues with either but I've had issues with how pf is managed and just seems to get another reason to dislike every so often.
Depends on your issues but go raise bug report with opn.
If opn started to cause me issues then I'd be more likely to goto openwrt I think,rather than pf.
If you have a home lab, offshore what you can from your firewall. The less it does the more secure it is. Once you've watered it down to maybe DHCP and suricata then there's almost no difference in pfsense and opn.
I went from pfsense to opnsense about a year ago after an attempted settings change completely broke my pfsense install (again). I've been debating going back because I cannot get load balancing to work on opnsense, no matter what I do. Currently it's just using a single gateway, and if that goes down then everyone is SOL until it comes back up or I manually switch it.
If stability is what you're after (both in terms of versioning and in the sense of as few unscheduled reboots as possible), then neither is a good option. Both update quite often and go with an "introduce feature now, worry about stability later" and end up having to constantly patch a bunch of stuff.
If you're comfortable with a CLI, then I'd recommend Vyos and then going with the stable branch. It's had 3 service patches since 1.3.0 released in 2021. The last being in june and before that, you have to go to september last year. Ofc, downside is that you'll miss out on a lot of features. Like I don't think stable has wireguard support yet, and not certain it will be ready for when 1.4 goes stable either (it's currently in 1.4 rolling). You could implement some of it yourself because it's built on Debian, but anything you do like that is tied to your current image. So if you upgrade, you have to do it again so I don't recommend it.
Point is, if you need features, don't, but if it's the most stable you're after, I can highly recommend at least having a look. Though I always recommend getting a proper router above any router os on amd64. You'll get more out of it, cheaper, with less power consumption and lower latency.
If you like support and stability then going for pf over opn is a choice you can make. I just don't like how netgate has been shitting on the competitor with that ridiculous site.
Your extensive config is probably your issue and not opnsense. You said you've been running it for a few years but seemingly 4 months ago, you couldn't figure out a basic rule to block internet for a single ip.
My config probably does factor into some of the issues. To be fair, I've never had to block Internet from a single device before, and the rule seemed backwards compared to my thought process.
If I remember correctly, I started using OPNsense in 2020. Since then, my lab and network has evolved tremendously.
Just an FYI, “your way of thinking” doesn’t apply to pretty much anything. Try learning how things actually work and not assume “your way” is the right way.
I never noticed any "slowing down issues" since any of the recent updates. Running OPNsense with a similiar setup to yours "vlans, plugins, policies, suricata, VPN, routes, gateways, HAProxy, etc". Again no issues on 8+ sites, including SiteToSite WireGuard VPNs and with large corporate networks. Some systems running perfectly stable and performant since version 20.x (installed) and now running the latest update.
Therefore I highly think your issues are user error / misconfiguration. Yet, I don't mean to judge but it seems to me that you switching to pfSense will just bring your OPNsense issues with it.
I can't tell how much experience you have with networking/firewalls in general but a lack of that won't bring you any further by switching to pfSense.
I use pf CE and if they have plans to discontinue it or whatever I’ll switch. If someone can provide me with a good rational reason I would consider OPNsense though.
I actually switched from pfsense to opnsense last week. The licensing debacle and the stand Netgate took against the community was enough for me to switch. It took a bit of time getting used to the UI, but I'm starting to enjoy using opnsense more than pfsense. First thing that made me happy was the automatic backups to nextcloud haha
I use pfsense CE. I am a bit worried that Netgate will be less interested in maintaining the community edition now, but it just works. I don't need a lot of bells and whistles. So I'm staying put until I see a decent reason to switch.
IMO, no. I don’t use pfsense on a daily basis (MikroTik FTW), but netgate will use CE as a testing ground. They’ll keep putting out updates; but advanced functionality will be paywalled.
Netgate as a company has certainly done a few things which have had me looking at other router options but at the moment, pfSense CE works, is stable, and I don't need to faff with it, so I'm happy staying put.