Because the underlying OS (FreeBSD) doesn't support routed IPsec at the moment, I don't expect pfSense to perform miracles. (the irony is JUNOS is based on FreeBSD, but they obviously have other things under the hood)
Routed IPsec is what connects all of our branches, corporate main, admin centers, and colo together. Without it, we're dead in the water.
I have been wanting to experiment with pfSense for quite a while but didn't have the opportunity. While I couldn't use it for new offices (due to no routed IPsec), this office was different because I had the old Juniper to open a tunnel to the rest of the company from inside the LAN. Unfortunately it didn't work out because the tunnel would not stand up behind NAT, no matter what I did.
Even if it did work, it would be limited to this one location. New locations will still need a Juniper for routed IPsec.
Although my time with it was cut short, pfSense seemed like a really nice product. If FreeBSD bakes in routed IPsec support, or if the pfSense developers can build it in themselves, I'll definitely have another look. I like the idea of running on an open source platform, not locked in to a specific vendor.
I also like that the pfSense folks sell commercial appliances with custom images, as well as commercial support. We keep all of our devices under vendor support contracts. For this test, I was using a new HP ProLiant server– one of our hot-spare chassis we keep on hand for emergency swapouts-- so we'd spend money either way. Whether we buy another Juniper, or a server chassis + pfSense, or a pfSense appliance, it's still not free. I would never run a commercial environment on freeware without paid support.