Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

6 AWS reviews

External reviews

23 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Moutaz Sheikh Alard

Has helped simulate enterprise security setups and strengthens network segmentation practices

  • September 09, 2025
  • Review provided by PeerSpot

What is our primary use case?

I work with OPNsense to create my capstone project in the sixth semester. I work with OPNsense for my capstone project, and I am now planning to make it my main firewall in my network at home, and I'm planning to use it also in case I work in the company.

What is most valuable?

For my capstone, I use OPNsense for my project and its broader benefits for enterprise and cybersecurity context. OPNsense is an open source based firewall and routing platform. It offers enterprise-grade features such as intrusion detection and prevention system, VPN support, traffic shaping, and web filtering, all without license cost. This platform has a modular design, a clean web-based GUI, and frequent updates that prioritize security and usability. It competes with commercial firewalls such as Cisco ASA, FortiGate, and Palo Alto, but stands out because it's community-driven, cost-effective, and transparent.

I find OPNsense's feature of acting as a central firewall and gateway most valuable, providing robust point segmentation between the internal network and DMZs in my capstone project, intrusion detection to monitor malicious traffic, VPN services for secure remote access, and logging and monitoring for compliance and auditing. This allows me to simulate a real-world enterprise environment on a smaller scale, demonstrating both security hardening and network efficiency.

OPNsense impacts my projects and home network positively because its cost-effectiveness is perfect for lab and enterprise setup without expensive licensing. The flexibility, easy VLAN and DMZ configuration supports different zones such as web servers, mail servers, and log servers. The security-first design for IDS/IPS integration helps me showcase modern defense-in-depth strategies. The user-friendly management through the web GUI makes it possible to manage complex firewall rules clearly, which is critical when documenting and presenting a capstone. Scalability is also an advantage. Although my project is lab-based, OPNsense can scale into production deployments in SMBs and enterprise.

What needs improvement?

The documentation should be clearer because I faced some difficulties navigating many options. Providing clearer documentation will be helpful for other students who are new to experiences with OPNsense.

For how long have I used the solution?

I have been using OPNsense throughout my capstone project in the sixth semester.

What do I think about the stability of the solution?

OPNsense is stable in my experience and has been reliable for my projects and home network. For my capstone project, OPNsense consistently performs as expected, maintaining stable routing and firewall rules across multiple VLANs and DMZs. The IDS/IPS engine using Suricata detects test intrusion attempts without causing noticeable performance degradation, and VPN tunneling works reliably, allowing secure remote access to my simulated enterprise work. Logs and monitoring tools provide clear visibility, which is important for documenting my project. For home and small network use, OPNsense is also reliable, providing enterprise-grade security at no cost, which is valuable for students and professionals building labs. It has a user-friendly GUI that makes managing the firewall straightforward, and the community support is active, making troubleshooting and updating reliable.

What do I think about the scalability of the solution?

OPNsense is scalable, but the degree of scalability depends on the hardware resources and the network design. In theory, OPNsense can handle small home networks and even large enterprise environments if deployed on sufficiently powerful hardware or virtualized on a clustered system. It supports features such as high availability pairs, load balancing, and multi-WAN setups that allow it to scale beyond a single device. In practice, for my capstone project, I didn't simulate a very large enterprise, but I did segment multiple VLANs, set up DMZs, and enable IDS/IPS, and OPNsense managed this well without performance issues. This showed me that it can handle at least mid-sized network complexity reliably. I haven't tested it for large production environments, but it is a reliable, cost-effective, and scalable solution for labs and mid-sized enterprises.

How are customer service and support?

In my personal experience, I mostly interact with the community side and find it responsive and well documented. The forums answer most configuration issues I face, and the documentation is up to date. Compared to some open-source projects with weak support, OPNsense stands out for having both a strong community and commercial backing options.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I selected OPNsense as a primary solution in my project because of its strong open-source community support, robust features, and suitability for a cost-effective lab environment. If I were to switch to another solution, the most likely candidate would be pfSense or a commercial firewall appliance such as Cisco ASA or FortiGate.

For pfSense, built on a similar FreeBSD foundation with a long-standing reputation in academic and enterprise labs, I might choose it if I need certain community plugins or enterprise-level add-ons that are more mature in pfSense. The reason I initially didn't switch away from OPNsense is that it provides everything required for my capstone: VLANs, DMZ segmentation, IDS/IPS integration, VPN functionality, logging and monitoring, strong documentation, and GUI management. But for a production environment, I might recommend switching to Cisco or FortiGate for scalability in a very large network to ensure professional support in case of critical downtime and integration with another enterprise security system.

Before choosing OPNsense, I evaluated other options to ensure the choice aligns with both the technical goals of my project and real-world industry practice. The main alternative I considered was pfSense, which is very close to OPNsense. Both are free-based. I considered it because it's widely used in academic labs and has a strong plugin ecosystem. Ultimately, I preferred OPNsense for its more modern user interface, frequent updates, and strong focus on security features.

How was the initial setup?

Regarding the pricing, OPNsense has no cost. The setup is somewhat easy, and for licensing, I haven't tried the paid version yet, but overall it's perfect. I save time while working on my capstone project because OPNsense helps me save time during setup and configuration, especially for the intrusion prevention system that helps me be more aware of monitoring and catching any malicious packets or traffic already passing through my network.

What other advice do I have?

The GUI-based OPNsense is very useful and easy to deal with because many people find it frustrating to deal with command line projects. OPNsense provides a web-based GUI that makes the matter easier and more efficient to look at and to deal with.

I will discuss the general benefits of OPNsense, which include compliance support that is useful for organizations pursuing ISO 27001 and PCI DSS, as it helps enforce security controls. One benefit is open-source transparency; unlike black-box firewalls, its code is reviewable and trusted by the community. Rapid innovation through frequent updates means it stays aligned with modern threats, and many organizations use OPNsense as a cost-effective alternative to commercial appliances without sacrificing core security capabilities.

From using OPNsense, I think it could be easier, and I will talk about the lessons I learned. I gained hands-on experience with firewall rules design and the challenges of balancing security with usability. I learned the importance of logging and monitoring for incident response. Furthermore, I realized that open-source tools such as OPNsense can be viable for both learning and professional deployment. Most importantly, OPNsense helped me connect academic theory with practical enterprise-grade solutions.

I rate OPNsense a nine because the documentation needs more clarification.

If I were advising others considering OPNsense, I recommend a few key points. Start with clear goals; OPNsense has a wide feature set including firewalling, IDS/IPS, VPNs, traffic shaping, and more. Define what you need first—segmentation, remote access, monitoring—so you don't get overwhelmed. Invest in proper hardware since performance and scalability depend heavily on CPUs, RAM, and network interfaces, especially for IDS/IPS. Choose hardware with enough power; otherwise, packet inspection can slow the network. Leverage the community by utilizing the forums, GitHub, and documentation, which are excellent. Most configuration challenges I face have already been solved by others. Keep it updated because OPNsense has frequent updates and security patches. Staying current ensures you are protected against new vulnerabilities. For labs and mid-sized enterprises, open source is a fantastic solution; it is cost-effective, feature-rich, and transparent. For very large enterprises that require vendor SLAs or guaranteed throughput, you may want to evaluate commercial appliances alongside OPNsense.

Which deployment model are you using for this solution?

On-premises


    Mahmoud Suleiman

Has improved network security while reducing costs significantly

  • September 07, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OPNsense is as a firewall on-premises.

Using OPNsense in my work environment, it serves as the first line of defense. I'm using it for filtering, using my own repository and Dnsmasq to filter unwanted websites. I'm using it as an SD-WAN, as an IPS, intrusion prevention software, and as a next-gen firewall.

As the first line of defense of my network, OPNsense firewall acts effectively, helping me reduce the number of attacks that my network suffers or has been impacted by a huge percentage. Due to its openness and because it's free, and it's a next-gen firewall, it can go up to the application layer to protect my network, which is very good and unique compared to traditional firewalls.

OPNsense is deployed on-premises in my organization.

What is most valuable?

In my opinion, the best features OPNsense offers are that it's open source, so it can be implemented in whatever scope or environment that I need. I just need to scale the hardware for that environment and I don't have to pay a license, perpetual or renewal.

The open-source aspect and flexibility of OPNsense have helped me significantly, especially due to the difference in the currency exchange rate here in Egypt, where the licensing and budgeting for IT infrastructure is very hard right now due to the high cost of the products in the Egyptian currency. Most companies see that the IT department is a consuming department, not one that's bringing money, with the ROI being an improvement in SLAs in a few percentages. We have a tight budget in Egyptian pounds, so when we get stuck because the budget has ended, we have to prefer open-source solutions to save budget, and here the open source can rise and shine. I don't need the license, so I will save cost in my budget that I can use in another product that doesn't have any alternative.

People sometimes overlook that OPNsense is modular, and that you can install plugins to improve it. You don't have to use it bare-metal OPNsense releases; it's modular, and you can add whatever plugin or features that you need to be added.

What needs improvement?

OPNsense can be improved by making it more user-friendly, as its current UI is not that user-friendly when compared to paid software such as Sophos. Sophos has a free version that is very limited, but OPNsense could be fantastic if this point is addressed correctly.

For how long have I used the solution?

I have been using OPNsense for a couple of years.

What do I think about the stability of the solution?

OPNsense is stable.

What do I think about the scalability of the solution?

OPNsense's scalability is excellent; I just need to resize my hardware and upgrade the server, and voilà, I am good to go.

How are customer service and support?

OPNsense is open source, so you have to rely on the community for customer support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I previously used Sophos Home, but I switched because it's very limited.

How was the initial setup?

My experience with pricing, setup cost, and licensing for OPNsense has been very positive since it is open source, reducing the cost of licensing. I don't need to license the software as it's free, and I can also scale the hardware, which cost me around 30,000 Egyptian pounds, less than a thousand dollars for used servers. This initial cost just required purchasing the server and installing the open-source software, reducing the amount of money needed for an enterprise firewall.

What was our ROI?

I have seen a return on investment as I saved a chunk of money, nearly $100,000, needed for licensing for an enterprise firewall such as FortiGate or Sophos.

We saved up to half a million Egyptian pounds, which is nearly $100,000 yearly on licensing or subscription using this kind of software. This saved a huge amount of money, and the network attacks reduced by approximately 60% after using that, even without customizing the custom configuration yet. Currently, I'm working on custom configuration.

Which other solutions did I evaluate?

Before choosing OPNsense, I evaluated pfSense, but pfSense is maintained by Netgate, which has filed for bankruptcy, so it's considered legacy and not fit for the modern network. OPNsense is a good option.

What other advice do I have?

I rate OPNsense 8 out of 10. It is a straightforward product that has nothing crazy to do with it.

My advice for others looking into using OPNsense is to get creative.

My company does not have a business relationship with this vendor, as we are just customers.

Which deployment model are you using for this solution?

On-premises


    Richard Chamberlain

Network isolation improves security with ease of use in home lab

  • September 04, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OPNsense is that it is my home firewall for my home lab.

A quick specific example of how I use OPNsense in my home lab is that I use VLANs, so I have different networks or sub-networks inside my home network, and the VLAN inside of OPNsense allows me to keep them isolated.

I have added some firewall rules to allow different devices to talk to different subnets regarding how I'm using OPNsense in my home lab.

What is most valuable?

The best features OPNsense offers include the VLANs that work spotlessly, and I feel very secure in my network because of it. It was relatively easy to set up, though I think a better wizard would help out.

One of the things I appreciated about the VLANs is that I can have a Wi-Fi VLAN and feel secure that the server network or the VM network that I have on a different VLAN are isolated, and they cannot talk to one another, which adds a great level of security.

OPNsense has positively impacted my organization and home lab through its security features, though it's hard to quantify as I don't pay enough attention to the logs to see what it's stopping from an outside perspective. It's actually sitting behind my modem from my ISP and I'm not in bridge mode.

OPNsense definitely gives me peace of mind and helps my workflow because of the network isolation. I can have multiple subnets without having to worry about one affecting the other.

What needs improvement?

OPNsense could be improved with a better wizard, as when I first installed it, it seemed difficult to know where to go. I had to watch a couple of YouTube videos on it, so having better videos sponsored by OPNsense might be helpful.

It would be beneficial if they could create some videos on how to set it up themselves.

For how long have I used the solution?

I have been using OPNsense for about two years now.

What do I think about the stability of the solution?

OPNsense is stable for me.

What do I think about the scalability of the solution?

OPNsense's scalability in my experience is very scalable, and I've been able to generate multiple VLANs without seeming to have any degradation.

Which solution did I use previously and why did I switch?

I had not previously used a different solution for my firewall; this was the first one I tried.

What was our ROI?

Unfortunately, I have not seen a return on investment with OPNsense; I don't keep track of that, beyond the sense of saying that for a very little investment, I was able to increase the security of my network.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that since OPNsense is free, the licensing and setup was easy, and honestly, it's great for the price.

Which other solutions did I evaluate?

Before choosing OPNsense, I did evaluate other options, specifically I looked at pfSense first.

What other advice do I have?

The advice I would give to others looking into using OPNsense is to absolutely go play with it. For little cost, if you have an extra machine around that you can test it out on, test it out. I'm running it on a low-end mini PC with multiple network interfaces and it works great.

I would say that OPNsense is one of those technologies, a firewall that if you're not playing with, you should, just to keep your skills up and to secure your home network.

On a scale of 1-10, I rate OPNsense an 8.

Which deployment model are you using for this solution?

On-premises


    Stephen Zoran

Offers seamless deployment and feature-rich experience with deep packet inspection

  • April 29, 2025
  • Review provided by PeerSpot

What is our primary use case?

I am a Sales Engineer working for a consulting company. I use OPNsense to take my lab environment on the road for demos. Initially, I built it to bring my demos from my own lab. Although the company has a lab, putting an OPNsense firewall in there worked better because it was a colo. I run it both bare metal and virtualized, and in some cases, I do both.

What is most valuable?

The main features I find valuable are ease of use, code stability, and the ability to add features such as Zenarmor, which provides fourth-generation firewall capabilities with deep packet inspection. Additionally, integrating solutions like Tailscale for VPN is very valuable for my uses.

What needs improvement?

They are trying to augment reporting with Grafana dashboards. Some of those integrations could be improved to work better with Grafana.

For how long have I used the solution?

I have used the solution for about four years.

What do I think about the stability of the solution?

The solution is extremely stable. At the latest code level, I haven't experienced any crashes. Initially, there were some performance issues with earlier versions, but it is very stable now.

What do I think about the scalability of the solution?

So far, scalability has been good. I use Zenarmor, pinning it to one core for packet inspection, and the CPU performance seems very good. My use cases don’t drive a ton of bandwidth, but I’m looking at some AI applications that may increase that dramatically, and that's where we will test scalability.

How are customer service and support?

The support is good. I mainly rely on community support since the solution is open source. I haven't had to open many tickets, just one or two under the Pro license.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup was very straightforward. It took about an hour the first time, but I could probably do it in five minutes now.

What was our ROI?

There are dramatic operational impacts compared to Check Point and FortiNet.

What's my experience with pricing, setup cost, and licensing?

The pricing is competitive when compared to vendors like Palo and FortiNet.

Which other solutions did I evaluate?

I have experience with FortiNet and Palo Alto network solutions.

What other advice do I have?

Overall, I would rate OPNsense as nine out of ten. The ability to deploy easily and leverage fourth-generation features adds significant value, especially with Zenarmor.

Which deployment model are you using for this solution?

On-premises


    reviewer1027455

Enhancing network security with reliable firewall functionality and GeoIP features

  • November 15, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use OPNsense primarily for network security. It involves basic firewall operations and GeoIP location functionalities. I've got multiple versions running, some on hardware purchased and some on VPSs.

What is most valuable?

The most valuable features include the basic firewall functionality and the GeoIP location services. OPNsense is very stable, easy to upgrade, and maintain. I can work efficiently, knowing it does what it needs to do.

What needs improvement?

OPNsense should improve its performance in handling large volumes of voice traffic. It needs more support for Vigoroute and extensive VPN technologies. Enhancing its performance for significant amounts of data traffic would make it closer to a perfect solution.

For how long have I used the solution?

I've been working with OPNsense for about five years.

What do I think about the stability of the solution?

I rate OPNsense's stability as very high. I would give it a nine out of ten. The only challenge faced was its inadequacy to manage large voice traffic effectively, even with dedicated hardware. It couldn't keep up with the packet per second for voice load, requiring a revert in our setup.

What do I think about the scalability of the solution?

OPNsense struggles to handle large volumes of voice traffic, indicating scalability issues in that specific use case.

How are customer service and support?

I haven't used technical support. I rely on forums and manage the setup independently.

Which solution did I use previously and why did I switch?

The only other similar product I can compare is FortiGate. Overall, I find OPNsense more user-friendly.

What's my experience with pricing, setup cost, and licensing?

I consider the pricing of OPNsense to be high when compared with other market products. However, as a free firewall product, it is one of the best available currently.

Which other solutions did I evaluate?

I only evaluated FortiGate alongside OPNsense, as they are the two offerings from my company.

What other advice do I have?

For small to medium businesses, I recommend OPNsense. I'd rate it eight point five out of ten.


    Karan S.

My Experience with OPNSense

  • October 17, 2024
  • Review provided by G2

What do you like best about the product?
the thing which i liked using OPNsense it has very good contenet filtering and from my seniors i have heard it is very cost effective to our company also in my personal use i have seen it has good authentication but in the first place it has good user friendly interface also it has a good performance response time is very good also i am using this like everday .
What do you dislike about the product?
there are not much dislike here but one thing i wants to point out is initial setup is quite difficult if you are not aware of much of the tech also for personal use i was going through the documentation but it was not much of help full
What problems is the product solving and how is that benefiting you?
it has good network security without connecting to this i cant access my company contenet which is very good idea so that some how if some has my laptop with out connecting to OPNsense they cant access the content also as i have mentioned earlier it is cost effective it has good web filtering like my organisation doesnt allow us to open our personal gmail in company laptop so we cant access all thanks to OPNsense


    Suraj K.

Secure our network

  • September 23, 2024
  • Review provided by G2

What do you like best about the product?
OPNsense has a user-friendly web interface, making it easy to use even for people who aren’t very technically knowledgeable. The platform gets regular updates, ensuring that security issues are fixed promptly and new features are added. The customer support is good and always available for assistance
What do you dislike about the product?
Currently, we are not facing any challenges. everything is going well
What problems is the product solving and how is that benefiting you?
Previously, we were facing a security challenge, such as unknown websites opening. After implementing this firewall, we can block unknown websites (HTTP sites) and also allow or block websites as per our requirements.


    Chirosca Alecsandru

Provides good network intrusion detection and prevention

  • July 26, 2024
  • Review provided by PeerSpot

What is most valuable?

I mostly rely on the solution's network intrusion detection and prevention system, along with other systems, CMs, and log management. We are currently satisfied with the solution's threat intelligence. It's a pretty much in-house developed solution because it's in a Wazuh server. We have several scripts around it, allowing us to improve our posture on threats.

What needs improvement?

SD-WAN (software-defined wide area network) is integrated into some restricted service providers for OPNSense.

I pretty much like the solution's APIs, but it's somehow limited. I would like the APIs to be more mature and more developed and have more options to automate threat hunting. Also, I would like to see more drill-down possibilities.

We have to rely on specific hardware for the in-depth analysis of NetFlow. Although we have an interface on OPNsense, it's not as easy to use on the security side as other solutions.

For how long have I used the solution?

I have been using OPNsense since 2016.

What do I think about the stability of the solution?

I rate the solution ten out of ten for stability.

What do I think about the scalability of the solution?

OPNsense is an extremely scalable solution. I played on one network with CARP, and I was pretty happy with what I achieved there.

Which solution did I use previously and why did I switch?

Before OPNsense, we worked with the Cisco ASA 5505 product for three years. Although it included the FirePOWER part, it was quite a poor experience.

What was our ROI?

OPNsense has helped reduce the speed of threat detection and containment from 50 minutes to 15 minutes.

Which other solutions did I evaluate?

I have quite a background in Berkeley Software Distribution (BSD) systems. I was looking into BSD, especially for the packet filter side. While evaluating, OPNsense was the most solid solution. I was also considering pfSense as my first option, but it is not so strong on the file system side.

What other advice do I have?

OPNsense is a strong and solid solution that is easy to interact with. I don't see much on the new generation of firewalls, and only a few solutions are available for OPNsense. OPNsense handles network traffic much faster during peak loads because it's on dedicated hardware. I would recommend OPNsense when no specific topic prevents me from recommending OpenSense.

Overall, I rate the solution an eight out of ten.


    Suraj K.

G2 review

  • July 14, 2024
  • Review provided by G2

What do you like best about the product?
Good for carrer growth. It has lasrge community
What do you dislike about the product?
It should be More proactive. Work on more option for the community.
What problems is the product solving and how is that benefiting you?
Easy to use interface and frequent updates.


    Vandita T.

Amazing software with loaded features

  • July 12, 2024
  • Review provided by G2

What do you like best about the product?
Amazing software with loaded features...
Ease of use
Easy to implement
Easy to intefrate with other systems.
What do you dislike about the product?
nothing as such. Product is really good.
What problems is the product solving and how is that benefiting you?
OPNsense's focus on security brings unique features such as easy to use one time password authentication for various components. The robust and reliable update mechanism gives OPNsense the ability to provide important security updates in a timely fashion.