Share your pfSense stories!
-
While the ability for any software and your hardware/system to run for such a long time is nice.
That you would run your firewall on software that is no longer updated or maintained is BAD security.. 2.1.5 should of been updated when it went EOL.. Its still running esxi 3.5 that went end of extended support back in 2013 and end of even technical guidance back in 2015 is not good practice from any point of view especially security.
Agree with everything! This box, however, was only handling internal routing between some private networks. Didn't have access to the internet either - updating wasn't easily possible. Was also a low-priority segment - it's now being killed forever and nothing comes in place.
-
I hope this thread is still alive :)
I was using m0n0wall for a long time (still have one that's been alive without reboot almost 7 years!) before I came across the first customer needing VLAN, about 12 years ago I think. I got recommended to check out pfsense, and I have since then never looked back. These days I run my own company and importing hardware and building our own routers based on APU2 board and pfsense. We have at least 200+ installations out there, and we're also running pfsense in our small datacenter where we maintain our smallest customers, as well as the two geographical backup sites we keep for customer data. And, at home of course, where I hide my entire network behind an OpenVPN service setup in pfsense.
I'm originally a Windows-guy, but after I met pfsense I realised there's a whole world of open source out there so I started learning, and today roughly half of our services are based on open source.
Comparing pfsense to Cisco or the likes, I'd say there is no competition when it comes to price / functionality / reliability (as long as you use an appropriate hardware). Only kind words from me!
...and were are also retailers for Netgate in Sweden, not that we have a lot of customers of the size demanding that good hardware.
-
@Phatsta I am using PfSense now for about a year and find it to be a great tool!
I am still a very young novice in it's use, but saying that, it has saved my PC's from countless attacks and intrusion as well as providing a safe network a reality. -
We moved a couple of years ago from a Fortigate-HA/MPLS based solution to a full pfSense one. HQ plus 5 subsidiaries in EU and one in US are site-to-site connected. All hardware is based on Denverton C3K with IDS/IPS. No regrets at all.
-
I recently switched to pfSense. I'm still pretty new to it. Here is my story.
I used to have a $20 router. Now that I think about it, it's quite a piece of garbage. The router has a build-in reboot function. I can set the router to reboot itself every day or every week. So that the router won't acting funky. Back then, rebooting router is believed to be a necessary periodic action that everyone is expected to do.
After about 1 or 2 years of use, I finally burnt out that little garbage router. It refuse to connect to internet anymore (or maybe refused to route, who knows). I then switched to a used old cisco/linksys router. I flashed a DD-WRT system on it. That's the first time I know that router can have an OS that's not from the factory. This cisco/linsys router is very reliable. I rarely need to touch it. It just always runs good.
However, over the years, I gradually reached the limit of that cisco/linksys router. It still works fine, but I now need more functions that requires more powerful hardware. For example, OpenVPN won't work on that router because the CPU is too weak. This is when I learned that you can actually install a "router OS" on any computer. I started my research and finally landed my eyes on pfSense.
My current network:
Netgear modem (I don't know the model, but it's not the default modem that my ISP give me. This modem is very reliable)
pfSense on a Qotom fanless pc. i5 5200U cpu, 8gb ram, 521gb SSD (I realized this big SSD might be a waste)
Netgear 8 port switch
Netgear access point.In this question I posted, I talked more about my pfSense settings if you are interested.
https://forum.netgate.com/topic/154474/multi-openvpn-client-random-openvpn-connection-customize-sticky-connection -
Quick story here, just to confirm a point about ProxMox adapter performance.
I set up pfSense 2.4.5-RELEASE-p1 (amd64) on ProxMox on Friday, and when I was creating the VM it was crashing if I used the Virtio Parallel driver for the NICs so I changed to E1000.
After install eveything worked but bandwidth throughput was slowed by half.
I shut down pfSense and changed the NIC drivers to Virtio and started pfSense back up.
On boot pfSense ran through interface assignments, but I was pleased to find that once I was back up and running, none of my configurations had been lost and everything was working as it should.
I did have to reconfigure the Snort interface in order to get Snort running again but once I did that everything was running well.
I ran speed test again and got full bandwidth and pfSense is running great.
Moral of the story is anyone having throughput problems on ProxMox deployments, needs to make sure they are using the Virtio Driver (where supported) because it does make a huge difference (at least from my experience with Intel NICs)
My set up is:
2.4.5-RELEASE-p1 (amd64) with Snort in VM on ProxMox 6.2-4
On HP T730 thin client 64GB M.2 SSD, and 16GB Memory
Intel EXPI9404PTLBLK PRO/1000 PT 4-Port PCIE NICSean
-
Hello
I have been working in the IT business my whole career.
When I retired I was not aiming as being a "couch potato" so I search for an activity as a volunteer
and I discover Emmaüss Connect a caritative French association.Emmaüs Connect fights for the digital inclusion of the most vulnerable people in France,
where a quarter of the population is unable to use the internet on a daily basis.I joined the local team in Lyon France where I provided lectures regarding basics used of laptops, smartphones
and tablets.From an IT side I found that the small local network didn't have any protection aka the cable modem/routeur
was directly connected to the PCs.Talking to the local responsible I suggested that we implement some basic strategy to protect our local network.
The constraint was to make it at 0 Euros as you may understand.
After looking around on what was available on the software market I choose pfSense because it got an excellent
reputation, it was modular and available to be implemented on a recycled PC.So I moved that way and with the help of the pfSense user forum and the many excellent tutorials available on Youtube
I end up with a pfSense configuration that is now up and running 24 hours a day.
The Firewall protects our small network.
I also added the following packages:pfBlockerNG : to filter what is going out because we don't want people going to "bad" sites using our network.
Captive portal : so we can provide free vouchers to the people we are supporting to use our network to connect to the internet.
OpenVPN : so I can do remote monitoring/maintenance on the firewall.I like to really thank the whole pfSense community for the great product they have made and keep maintaining actively.
I will be a real advocate for it.
If anyone is in the same situation I will be happy to help/share.Thanks again
Pierre -
I'm not sure how well this fits in with the topic, since I'm not a network admin or engineer, and I've only been using pfSense for a short time for my home network.
I had been using some consumer-grade routers at home and found them unsatisfactory, often unstable, and generally unreliable.
I had tried an inexpensive brand of routers that was less consumer-oriented and that worked ok. I also tried one of the mesh systems and that worked ok too. Neither was really ideal though.
Some of my friends and co-workers had been telling me I needed to switch to pfSense. I resisted at first because I thought it would be overkill. I looked at the Netgate appliances and thought the SG-1100 might not be enough to allow for future growth and the SG-3100 seemed too expensive.
I also wanted to try Untangle, IPFire, Sophos, and another project that I won't name.
I got some hardware and tried these out and it didn't take long to decide that pfSense made the most sense to me and offered the features that I wanted. It was really easy to install and configure and has great docs.
I've since found that some of the features I originally wanted, like Suricata, really didn't add anything for me at this time. I also talked to some people and found that faster internet is going to be a long time coming to my neighborhood, so I'm not going to need to handle gigabit speeds anytime soon.
The SG-1100 would probably have been ideal for me, although I wouldn't have been able to try the other software on it, so it didn't seem as attractive until I really decided that what I wanted was pfSense. (The SG-2100 arrived a bit too late, but would have been an excellent choice too.)
pfSense is the router/firewall for me. It feels comfortable and I'm looking forward to learning even more about it and finding ways to make it even more useful and informative.
-
I just wanted to run pfSense virtualized and discovered that it is not possible. - The thread got hijacked by a whole load of senior members who seem to believe that virtualization is all about dual-booting (hardly) and ProxMox was recommended.
No problem there, but ProxMox is hell to run, will not install pfSense, and does not like anything but Debian distros. VMWare, on the other hand, can be made to run on Windows, but software pfSense will not work with it, and cannot be used for PPoE IPv4 with PPP IPv6 ...so absolutely useless; especially so bearing in mind that, even given all the right DNS information, it absolutely refuses to connect to your ISP on FTTP connections even with the ethernet cable plugged directly into the mainboard.
Thank goodness for Draytek: the experts are right when they say that pfSense (and others) cannot even come close to them and, more importantly, at least they work.
-
@2RTzC5KbQGH4aG I'm glad that you found something that works for you, but I've never heard any "experts" recommending Draytek. :-)
I've worked in IT for many years and I think this is the 2nd time I've even heard Draytek mentioned. They sort of remind me of Zyxel, and that's not really a good thing.
BTW, I know people who run pfSense virtualized and some of those are using ProxMox. I don't use Windows, so I can't comment on that. As for ProxMox not liking anything but Debian, that's simply not true.
Again, I'm glad that you've found something that works for you, but my experience with pfSense has been completely positive.
-
@2RTzC5KbQGH4aG said in Share your pfSense stories!:
I just wanted to run pfSense virtualized and discovered that it is not possible.
That's an absolute load of... I run many, many PFsense installations like virtual machines in both VMware and Hyper-V and it works great.
Thank goodness for Draytek: the experts are right when they say that pfSense (and others) cannot even come close to them and, more importantly, at least they work.
The one who proclaims Draytek over PFsense clearly haven't got many miles on their back. I agree it's somewhat like Zyxel, and that's saying a lot. Its just a load of manure. Probably a sales pitch that stuck. Nothing more.
PFsense can compete with the best. I would argue it's in class with Cisco, any day. I've had serious relationships that lasted shorter than the uptime in PFsense. And the possibilities are literally endless (well as long as we're talking networking of course). And to have a GUI beats Cisco every day.
Go back, analyse your notes and come back when you realised where you were wrong.
-
@2RTzC5KbQGH4aG said in Share your pfSense stories!:
The thread got hijacked by a whole load of senior members who seem to believe that virtualization is all about dual-booting (hardly)
WHAT? That thread your talking about... You stated and I quote
"Would like to setup a Dual Boot with pfsense on a Lap top."Now your saying you wanted to run it as VM? From that thread, and your statements here it is quite clear you have no clue to what your talking about.. You seem to be a troll and nothing more..
-
come on.... my isp gave me a Zyxel, it's good if you put it in bridge mode and let pfsense manage everything ....
-
@kiokoman I'd rather have my liver taken out.
-
@kiokoman Based on my experience, Zyxel has a high failure rate. We saw a lot of them DOA when you opened the box. Then they'd fail over the first year of service. We speculated that they were using very low-quality parts or didn't put heatsinks were they were needed, etc.
Worst of all was the ones that would fail, but not completely. People would be complaining of assorted problems with their internet connection, and when you went to diagnose and troubleshoot maybe you'd find something and maybe you wouldn't. Or the issue would come and go. After a couple of go-arounds, a replacement of the hardware would resolve it - for a while.
Zyxel was inexpensive to purchase, but it wasn't cost-effective.
-
@stuartkh42 said in Share your pfSense stories!:
Zyxel was inexpensive to purchase, but it wasn't cost-effective.
Precisly. Amen.
Intermittent problems are the most expensive ones, because they are time-consuming and create the most miserable users which reflects poorly on us.
-
well.. I'm using it only as a modem .. everything else(router/wifi/voip/firewall/dhcp/share) is disabled / turned off... I had it for free from my isp. no problem so far.. I will think about it when the problem arises. I already have a couple of other modems as a spare part
-
I've been using pfSense for about 5 years after my Linksys router running DD-WRT was no longer able to keep up with the speed of my internet connection.
I am so thankful for the pfSense project, the community is friendly/helpful, the documentation is good, and the software is very professional/stable. A sharp contrast from what I was using.
When our ISP rolled out IPv6, I read that anyone using the ISP provided hardware as it was configureded was exposing all their Windows file/printer shares on the LAN to the internet! Many consumer routers contain serious security flaws and corrective updates are slow or nonexistant.
pfSense allows me to easilly treat the ISP equipment as part of the untrusted internet. pfSense makes it possible to manage and secure my network using enterprise techiniques that would be impossible with consumer equipment. Secure remote access, Multiple VPNs, VLANs, IDS, IPS, IP/DNS Blocking, Proxies, Reverse Proxies and Enterprise Grade Firewall, pfSense has it all, and more.
There are some very bright and talented people in the community who really care working with this software, so security gets taken very seriously and the few CVEs that are found get patched very quickly.
For anyone willing to learn how to set it up, (or pay someone) the possibilities are endless and pfSense can't be beat.
-
I came from ddwrt and was looking for some better security, so maybe 6yrs? Just recently started actually "using" pfsense (snort/vlans).
My pfsense system has gone through multiple iterations, with the last motherboard dying. I'm "in the process" of building a new box with the new i3 1200 socket.
So in the meantime I pulled out some random board I had bought back in 2014 and loaded my config on it and it blew me away at how well it runs with +/- 40 clients and two people working from home with mucho teleconferencing.
My current setup (Don't laugh too hard)
J1800 motherboard
1x pcie 2 port intel nic
1x ssd
It literally sits on top of a shelf with an atx power supply next to it (It's fun trying to remember which pins to jump to boot the system).
I have snort and multiple vlans running and it supports my gigabit connection just (If snort is configured correctly, that's another "in process" thing). -
@nullvalue
If the PSU has colored wire's it will be the green wire and any black wire. -
Former organisation hunts companies who are practicing corruption, collusion and nepotism. Usually, these organisations do hostile takeover of other companies. The organisation's goal is one organisation to control them all.
Short story, me and a few of my colleagues resigned because of their new policies against our conscious and moral values. Remember! Just do the opposite of what this organisation tells you. If they advised you and your family to implant microchipped (WO/2020/060606) for (Covid) prevention, refuse it. When they tell you don't use an open source OS/firewall/router like pfSense, use it. That's my story on why I use pfSense.
-
Home user, but I have been using pfSense since 2014ish.
My first install was on an Intel DQ77KB, and that was fun and worked great.
Later, I moved to virtualize pfSense in ESXi for around 2 years (stable, but was a bear to properly configure).
Currently, I have my install on a Pcengines APU2. It works perfectly other than a weird issue with an upgrade to OpenVPN causing a boot hang (had to use my serial to see the error).
The weakness of pfSense is wireless, but that seems to flow from the underlying FreeBSD.
I will post an update about a new project: a "DIY Nighthawk X10," which is a wireless router/NAS/Plex box. Unlike some other people, I don't need AC-wireless and would prefer an older, but stable platform.
Cheers!
-
@garrett-0 said in Share your pfSense stories!:
Home user, but I have been using pfSense since 2014ish.
My first install was on an Intel DQ77KB, and that was fun and worked great.
Later, I moved to virtualize pfSense in ESXi for around 2 years (stable, but was a bear to properly configure).
Currently, I have my install on a Pcengines APU2. It works perfectly other than a weird issue with an upgrade to OpenVPN causing a boot hang (had to use my serial to see the error).
The weakness of pfSense is wireless, but that seems to flow from the underlying FreeBSD.
I will post an update about a new project: a "DIY Nighthawk X10," which is a wireless router/NAS/Plex box. Unlike some other people, I don't need AC-wireless and would prefer an older, but stable platform.
Cheers!
It's way easier to buy a Ubiquiti Unifi AP AC Lite for €60 and run the controller on the pfSense:
https://github.com/gozoinks/unifi-pfsenseI have roughly 100-150 of those exact installations out there running perfectly for at least 3-5 years. For larger installations just add a switch and more APs. And for high density environments just replace the Lite with Pro. You can easily handle up to a thousand users this way, probably more. The largest such installation I have is running pfSense on an APU2, five or six switches and about thirty mixed Lite and Pro APs. About 800-1000 devices divided on 4 VLANs. Works like a charm.
-
I had always wanted my own server setup for various things. I was advised by a friend to get a firewall as well. This is where I started looking into different options for my own home firewall for my network which will be getting quite extensive. I came across pfSense. I watched youtube videos about it and had read the forums for a few weeks before really delving into it myself. Started out with an old Watchguard X750E when pfSense was still supporting x86. When pfSense went fully x64 I was thrilled. I knew that 64-bit can really do a lot more and offer more. Tho I did have some issues getting it going I was able to do so with help from others in the community.
I have since upgraded my old X750E to a Watchguard XTM550 with the latest version of pfSense. Love it. Will not use another firewall for anything. Simply love the setup and ease of use. Am quite happy with the software. Does more than I could ever dream of and allows me the ability to learn more and more as I go. I can't wait for pfSense Plus to be supported across 3rd party hardware as I really want to have it installed on my XTM550. It will offer so much more for me at home and it will be able to be setup quite easily. Thanks for offering a really nice piece of software. I really don't know what else I can say. It is just that much of a nice thing to have.
-
Okay, I'll add my story now.
For years I've had issues with wifi connectivity throughout the house, and over the last couple of years my wife would complain about the wifi printers not working. At first I thought my routers were just old, so I paid more money to upgrade a D-link to a Netgear, then to another Netgear, and you know that story. Wifi would improve slightly, and seemingly quite well for the first while, but ultimately after a few months wifi got worse, and wifi printers started dropping again.
Then I started researching enterprise level routers and the name Netgate came up. The installation was sure a steep learning curve for me, and even now I would consider myself a sub-novice at it. But I got it up and working. But I was still using the old Netgear router as an wireless AP, and guess what? My wifi printers were still dropping and I still had lousy Internet at the opposite end of the house.
I have since added two Unifi Lite AP, one on the top floor, one on the main floor. I keep them on medium power and wifi is fine. Even on basic 20 Internet, we can Zoom call, watch TV on the Roku, and surf Youtube all at the same time. I haven't lost the wifi printer once in the 6 months I've had this set up.
I know I've wandered into a field I probably have no business mucking with, given my knowledge, but it works better than the consumer junk I had. I even started making my own cables so I could make specific lengths, and connect the Unifi APs.
-
@larryjb great job! You came to the same conclusion as many of us have, all on your own!
I have at least 150 installations with PFsense and Unifi APs (most of them Lite) in residential buildings, hotels, schools, offices and industries. There is very rarely any problems, and wifi performance is steady without reboots, year after year after year. It's like it should be!
-
Installed pfsense 2.5.2 on Barracudda F18 firewall device. it's awesome for home use.
Intel Atom CPU C2358 @ 1.74GHz (2 CPUs: 1 package(s) x 2 )core(s)
2gb ram[to be upgraded to 4gb soon]
50gb msata ssd
Fanless and super silent. -
@mr-rosh cool, how much did it cost you?
-
it's a second hand device and cost me less than $40 US dollars [in my local currency]
-
Intel(R) Atom(TM) CPU C2358 @ 1.74GHz 2 CPUs: 1 package(s) x 2 core(s)
-
2GB RAM [i am yet to upgrade it to 4GB] say another $10 US dollars
-
50GB mSATA SSD Disk
-
4 x Intel 1gb nics setup as
-
Best part is it's silent and pretty good for home use.
-
RJ45 Console PORT, VGA Port and 4x USB Ports. So hooking up keyboard, mouse and monitor was easy as and was able to boot from USB and install pfsense.
-
-
@mr-rosh the price is great. I paid something like €150 for the fanless quad core, 4GB, SSD hardware, but it's really, really fast. I get 970+Mbit/s port to port no problem. And the real advantage comes when using crypto services like IPSec where you don't lose as much speed thanks to the fast CPU.
But for home use that is a really nice setup!
-
@phatsta thats cool.
-
@mr-rosh you got it for like $40? That is a steal - they are still being sold, they are not eol til like 2025 I don't think.. Rev A, I take it?
-
@johnpoz Yes, it's a Rev A. u can look around on ebay if u like. I am certain that there are many barracuda's out there [decommissioned /second hand, simple because it's out of warranty and or so]
something similar is;
https://www.ebay.com/itm/274832571200?hash=item3ffd4c3b40:g:B64AAOSwXdZgxrBm
-
@mr-rosh not in any need for anything, I have a netgate sg-4860 here at home ;) When its time to replace - I would get another netgate appliance for sure..
But that is pretty good price for such hardware.. And yeah makes a great pfsense box.. enjoy! And thanks for sharing..
-
-
For the Barracudda F18 [Rev A.] Below are specs;
Intel Atom CPU C2358 @ 1.74GHz (2 CPUs: 1 package(s) x 2 )core(s)
2gb ram[to be upgraded to 4gb soon]
50gb msata ssd
Fanless and super silent. -
ROCK SOLID, to sum it up. Home environment, minimal packages (pfBlockerNG, nut) pfSense has been rock solid over the years for my family. Home built machine (Intel Celeron G3930, 8GB RAM, Intel NICs) Speed from ISP has been rock solid (600Mbps Down, 20Mbps Up - Shaw Cable Calgary AB Canada) Have contributed to date $100 Canadian, before yearly payments discontinued. Please make yearly contributions available again! Love pfSense (Netgate)!
-
Dell R430 with 32GB Ram and a RAID1. Running server 2016core hyper-v with veeam backup. 2x Failover PPPoE WANs supplying the network if failover gateway mode. Snort and PFblockerNG installed. We have been running pfsense for some time. R430 is a nice chassis but noisy.
currently on 2.4.5 as it is a gen2 hyper-v which wont play nicely with a 2.5.x upgrade (bootloops) so im waiting until I get a decent sized maintenance windows to park the VM, create a fresh gen1 VM and restore from backup.
-
Protectli Vault FW4B with pfSense v2.5.2. Running pfBlockerNG, Snort, and Squid. Zero issues. I must say that im pretty impressed with Protectli Vault build quality. The case is one solid piece of aluminum with cooling fins on top of it. You can literally run this unit over with your car, it wont be damaged. It is that solid. Oh and its completely silent, since there are no moving parts.
Only issue i had is that my DSL modem power adapter decided to die on the same day when Protectli box arrived. For some strange reason, faulty adapter on my DSL modem caused Protectli box to behave strange. That misled me to believe there might be some issue with the box or pfSense software. Took me a few days to figure out that power adapter was an issue. As soon as i replaced it, all issues that i have been experiencing were gone.
-
'Pfsense is the cosmic belch among network devices.' That's how I got it described 8 years ago from a friend, a Fortinet trainer. I never stopped using it since then, in Vmware esx, HyperV and Virtualbox.
Nice it has the .xml backup and restore features.That's an OS I can't stop recommending on IT encounters.
Flawless, lightweight, huge, capable...bsd? Wow!Too bad I rarely got an answer from Netgate forums. I enjoy reading anyway.