One of our clients operates multiple branches, and we've implemented a solution involving feature and IP address tunnels connecting these branches. The main branch serves as the hub, housing the Central PBX and providing services to the other branches.
Netgate pfSense Plus Firewall/VPN/Router (ARM64/Graviton)
Netgate | 24.11.0 w/ GravitonLinux/Unix, FreeBSD 14 - 64-bit Amazon Machine Image (AMI)
External reviews
External reviews are not included in the AWS star rating for the product.
Offers robust features, including advanced firewalling, routing, VPN connectivity and traffic shaping
What is our primary use case?
How has it helped my organization?
We use pfSense to handle VPN connections, extending to remote workers in our various branches as well.
The feature I find most valuable for fulfilling network security requirements is pfBlockerNG. It offers exceptional visibility and filtering capabilities, without the need for dedicated hardware or recurring expenses. Unlike other solutions, pfBlockerNG operates seamlessly and continuously without additional costs or maintenance concerns.
The traffic shaping and bandwidth management features of pfSense significantly enhance our network performance. The inclusion of a QoS wizard simplifies the process, eliminating the complexity often associated with configuring QoS on other platforms like Cisco routers. With pfSense, utilizing the wizard streamlines the setup process, making it accessible and effective for users without requiring an advanced understanding of networking intricacies.
There have been specific incidents where the reporting and monitoring tools of pfSense played a crucial role in identifying and resolving network issues. In one instance, we received complaints about internet connectivity problems affecting productivity across the business. Upon investigation, I discovered that the issue stemmed from excessive bandwidth consumption caused by multiple HD camera streams being watched simultaneously. Utilizing pfSense's reporting and monitoring tools, I quickly pinpointed the source of the problem and implemented measures to alleviate the network congestion. These tools are invaluable for identifying resource-intensive processes and resolving performance issues effectively.
The process of integrating pfSense with other tools and services has proven to be quite straightforward thus far. While there may be a slight learning curve at the outset, particularly for those less familiar with networking concepts, it becomes manageable with experience.
What is most valuable?
The most valuable feature, for instance, is the ease of migrating configurations between different Netgate devices housed in the same box. This capability simplifies troubleshooting, as it allows for faster identification of DNS discrepancies or any other issues compared to proprietary systems. With pfSense, network configurations adhere to standard practices, facilitating troubleshooting without the need for complex overlays or policies. The interface, prioritizes network principles, making it intuitive for those familiar with networking concepts to navigate and achieve desired outcomes efficiently.
What needs improvement?
It lacks a solution for SD-WAN integration. I believe improving integration with various antivirus vendors could be beneficial. Partnering with trusted antivirus providers such as Bitdefender or Sophos as an add-on feature could enhance the antivirus capabilities of pfSense. Incorporating a centralized management console for easier administration would be a valuable addition.
For how long have I used the solution?
I have been working with it for over five years.
What do I think about the stability of the solution?
The stability of pfSense is exceptional. I've only encountered one instance of hardware failure, which was due to an electrical issue. Otherwise, all other deployments have been reliable. I would rate it nine out of ten.
What do I think about the scalability of the solution?
The scalability of pfSense is impressive. I've witnessed its capabilities firsthand, especially when it was deployed in environments supporting up to seven thousand employees. I would rate it nine out of ten. Currently, pfSense is our top recommendation for clients, tailored to their budget and specific requirements. Depending on the client's needs, such as compliance with PCI or HIPAA regulations, we may suggest models that offer corresponding features and evaluations of network security. This flexibility allows us to cater to clients with varying compliance needs, ensuring they receive suitable recommendations.
How are customer service and support?
In terms of technical support, I primarily rely on the forums whenever I have a question or need technical information. I've found that the answers I seek are often readily available there. While pfSense does offer paid support packages, I haven't had the opportunity to utilize them yet.
Which solution did I use previously and why did I switch?
The main difference between Fortinet and pfSense lies in their integration with different vendors. While pfSense offers integration with multiple commercial antivirus solutions, Fortinet primarily provides its own antivirus offering. However, the effectiveness of the antivirus provided by pfSense may not be as high as some other options available in the market. In terms of cost, pfSense offers a one-time payment for cloud services, providing continuous service without ongoing fees. On the other hand, Fortinet's pricing structure may seem appealing initially, but if you wait until close to the license expiration date, the renewal cost significantly increases, which could result in unexpectedly high expenses.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
To set up pfSense, you start by configuring firewall rules to allow the necessary traffic. Once that's done, you can explore and download additional security packages from the package manager to enhance your environment's security. The initial setup is quick, typically taking around ten minutes for a basic configuration. However, if you're integrating features like pfBlockerNG, it may take a bit longer as you need to ensure you're not inadvertently blocking any essential services. Despite this, the task can be managed by a single person, such as an IT manager.
Maintenance tasks, such as checking logs and ensuring updates are running smoothly, are typically handled by two designated individuals. They connect to the firewall periodically to perform these checks. While we do have a management console, it's not fully integrated with the pfSense Manager (PSM) solution. Having a dedicated management console that allows remote management of all wireless devices would be ideal, as it would streamline the process of making changes across multiple devices.
What's my experience with pricing, setup cost, and licensing?
The price point is highly competitive. The cost varies depending on the license type, such as licenses for eight to five support or twenty-four seven support. Opting for twenty-four-seven support significantly increases the price, reaching around ten thousand to thirteen hundred dollars. I would rate it four out of ten.
What other advice do I have?
Overall, I would rate it nine out of ten.
Which deployment model are you using for this solution?
User-friendly, easy to manage the firewall, rule-wise and interface-wise
What is our primary use case?
Our most common use cases are for our corporate firewalls, and currently, I'm using it as our school firewall. So it's our perimeter firewall. So, we're running three firewalls on our network.
So we have separate networks each because we have, like, different use cases. So we're running three at the moment.
We've been running it for six years now, and so far, it's been good.
How has it helped my organization?
Netgate pfSense has been utilized to create and manage VPNs within our organization. So we're running pfSense with VPN on one of our private cloud providers. So we're using IPSec VPN on that.
For everyday tasks, we just get alerts. It's anything that's suspicious, including from our Netgate. So, it's part of how we maintain cybersecurity in our school. This is working alongside our endpoint security solution.
We were using an open-source endpoint solution for that. So we're integrating that with the one we have on pfSense.
What is most valuable?
The ease of use. Like, it's easy to manage the firewall, rule-wise and interface-wise. For me, it's quite easy and friendly to use.
We have a set of rules so that it can manage all of our rules. We have a complex network here in our school. We have a lot of rules running, so it's really easy to match all of those rules using pfSense.
Integrating pfSense with other products was a bit tedious at first. We researched and tested for about a month, so it was not too hard but not instant.
What needs improvement?
For the third-party packages, I'd rather have it built-in, like a core feature of pfSense, part of the core model. This feature of pfSense would be great, instead of relying on a third-party module.
For how long have I used the solution?
I have been using it for six years.
What do I think about the stability of the solution?
It's about 95% stable, not perfect, but quite reliable.
What do I think about the scalability of the solution?
If I needed to scale it and merge our pfSense machines into one, I'd prefer a dedicated hardware appliance instead of running multiple x86 servers on the firewall.
We have around 4,000 endpoints.
How are customer service and support?
I reached out to support for an unusual CPU usage issue after an upgrade. They were responsive, and even though I ultimately found a solution, they were helpful in diagnosing.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Fortinet. We opted for pfSense because of budget limitations. pfSense was a more affordable solution for our requirements.
pfSense is easier to manage and offers modularity for features. With FortiGate, everything is there, but we might not need everything, and too many features can be challenging.
How was the initial setup?
The initial setup is very straightforward and intuitive.
We use the pfSense software directly and install it on our rack servers. So, we're adding three instances of that.
What about the implementation team?
I handle all the deployment processes. I am the core manager for the entire infrastructure, so I manage and deploy everything.
I consider how many users and gigabytes we expect on the network and try it on a test network first to validate before actual deployment.
Just my core team members manage the whole deployment, so that's enough for us.
Migrating the old one to the new one took around a month because we have many rules, and the new Netgate was quite different.
From the maintenance perspective, it is not difficult at all.
While configuring or maintaining pfSense, we had high CPU usage on one firewall, but the GPAC subscription provided a good response. The support team was helpful, and we resolved it in a few hours. So, we had good support because of the support subscription.
What's my experience with pricing, setup cost, and licensing?
We just have the yearly support subscription.
Which other solutions did I evaluate?
I just found pfSense online. I just tried it out on a home lab and found it worked well enough for us. So, just started out, like, searching online and responded and tried it.
What other advice do I have?
I would advise you to try to estimate your network first and do a test network just to have a proof of concept of what you want to run and check the routes you want to run against your network, making sure that your requirements are valid before deploying it.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
A free solution to secure connections but lacks support
What is our primary use case?
I use pfSense for various reasons, including implementing IPsec technology due to having limited branches. I use a VPN for secure connections, control the Internet or network flow, employ it as an NTP server, facilitate conference calls, and set up VLANs. I use it to run a proxy server.
What is most valuable?
I use the free version of Netgate pfSense software. I installed it on my servers with mini network cards, allowing me to create mini gateways and implement different plans.
What needs improvement?
The Netgate forums and community don’t provide extensive discussions and topics related to every pfSense service.
For how long have I used the solution?
I have been using Netgate pfSense for five years. We are using the V23.09 of the solution.
What do I think about the stability of the solution?
Everything is very smooth, with a user-friendly interface. You can use the user interface or CLI as a command.
What do I think about the scalability of the solution?
We have 250 employees using this solution.
How are customer service and support?
We have Git Community forums with a million topics about all issues regarding Netgate pfSense. We can save this information to address various concerns.
Which solution did I use previously and why did I switch?
I have several reasons for choosing Netgate pfSense. Firstly, it serves my purposes effectively and is entirely free. Secondly, when I search on Google or inquire about past experiences with firewall workloads, its reliability and cost-effectiveness stand out.
How was the initial setup?
The initial setup is too easy.
What's my experience with pricing, setup cost, and licensing?
The product is free of cost.
What other advice do I have?
I recommend using Postgres. However, if you need a firewall without additional tools and prefer a pool of well-established services, pfSense offers suitable features."
Other solutions like Postgres, Sophos, and Palo Alto are in the market. We've used firewalls for a long time, but in the last three years, I worked with pfSense, and it's efficient for all devices.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
A load balancing solution that needs to improve VPN configuration
What is our primary use case?
We use Netgate pfSense for load balancing.
What is most valuable?
The tools' most valuable feature is load balancing.
What needs improvement?
Netgate pfSense needs to improve the configuration for a VPN.
For how long have I used the solution?
I have been working with the product for three months.
What do I think about the stability of the solution?
I rate the product's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate Netgate pfSense's scalability a seven out of ten.
How are customer service and support?
I have used online documentation and hence haven't contacted the support yet.
How was the initial setup?
I rate the tool's deployment a nine out of ten. Its deployment takes only a few hours to complete.
What about the implementation team?
We did the deployment in-house.
What's my experience with pricing, setup cost, and licensing?
I use the product's free version.
What other advice do I have?
I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Our IT representatives at the plants find it easy to use and manage because of its straightforward interface
What is our primary use case?
I install Netgate pfSense in various locations. It is also used for monitoring traffic and acting as a proxy.
What is most valuable?
I handle the scanning for the finance department. I recently encountered an issue with our company bills. I resolved the matter, cleared the bill, and received calls regarding it using pfSense.
The user interface is extremely user-friendly, which is why we use it across various sites. Our IT representatives at the plants find it easy to use and manage because of its straightforward interface.
What needs improvement?
They rely on third-party tools, unlike Fortinet, for example, which has its own tools. In comparison, we also use third-party tools on pfSense. For example, we had a situation where we needed a tool to identify authorized users, and when I searched for a solution, I found a third-party tool. However, using such tools may come with additional costs.
For how long have I used the solution?
I have been using Netgate pfSense for around one year.
What do I think about the stability of the solution?
If I think about pfSense, I would rate the stability around six. There have been some issues with stability, causing occasional downtime. I haven't extensively worked with pfSense in the last year, so my experience is limited.
What do I think about the scalability of the solution?
The scalability of pfSense is excellent, and it's easy to expand. Currently, we have around 200-plus users at our head office using pfSense. I would rate it 7 out of 10.
How are customer service and support?
I haven't contacted Netgate technical support, so I can't provide feedback on that aspect.
Which solution did I use previously and why did I switch?
Comparing pfSense with other vendors, I appreciate Fortinet for its all-in-one device with ALi involvement. However, for a country like Pakistan with limited resources, pfSense is suitable for small offices due to its cost-effectiveness.
How was the initial setup?
Installation is straightforward, especially for IT professionals. During the installation process, you are prompted to input the brand of the internet and LAN cables. If you're unsure, you can simply connect the cables – one for the internet and one for LAN – and proceed. You can choose to use either one or two cards based on your preference.
What about the implementation team?
Regarding maintenance and technical support, we have a team of around 14 technical staff who handle phone calls and work on maintenance when required.
What other advice do I have?
On a scale of one to ten for pfSense overall, I would rate it a seven. In comparison with other top devices like Fortinet and UDMP, pfSense stands equal in my opinion.
Most functions are readily available, and additional features can be obtained by downloading and installing plugins
What is our primary use case?
I have used Netgate pfSense for a range of purposes. Initially, I employed it for VPN connections, mainly for personal and professional use. I also relied on it to maintain network equipment in a professional context. In the professional sphere, I have experience with both pfSense and Juniper, but eventually, I decided to phase out Juniper due to its high costs, especially for updates and the addition of new functionalities. pfSense's cost-effectiveness and the flexibility to transition to new hardware while retaining configurations made it a preferred choice. pfSense also stands out in terms of its rapid algorithm evolution compared to competitors like Juniper. Its scalability is another advantage, where adding a new box or reconfiguring can boost the firewall's capacity.
On a personal note, I use Netgate pfSense to connect to my equipment at the data center. Currently, I have a highly available installation that requires two instances of pfSense. While I considered pfSense for this setup, I had to assess whether OpenSense might offer better features for future requirements before delving deeper into pfSense.
What is most valuable?
It's worth noting that Netgate pfSense's performance is independent of the hardware it runs on. As I mentioned earlier, its scalability is a strong point. Most functions are readily available, and additional features can be obtained by downloading and installing plugins, which are generally free. When you compare this to the alternative of purchasing a firewall from a different supplier, you'll find that the latter option typically doubles the cost of the firewall itself. This cost increase is often attributed to additional licenses for deep inspection and similar functionalities. While configuring pfSense may require more time and effort upfront, the long-term cost savings make it a more cost-effective choice.
What needs improvement?
One concern I have with Netgate pfSense is related to packet filtering. Specifically, issues can arise with certain functionalities like GP, and, at times, there may be bugs. When creating IP lists, I've noticed that synchronization doesn't always function correctly. While it's not entirely dysfunctional, troubleshooting these synchronization problems can be quite challenging.
For how long have I used the solution?
I have been using Netgate pfSense since 2015-16.
What do I think about the stability of the solution?
I've experienced certain issues with Netgate pfSense in the past, particularly with the previous version, which was 2.5. It posed several problems. However, the current version appears to be more stable. Nonetheless, I still encounter troubleshooting challenges. For instance, there is an issue where it initially blocks an IP range but releases it after ten minutes. This behavior is somewhat peculiar, and it pertains to IP filtering.
How are customer service and support?
The support for Netgate pfSense mainly comes from online forums. These forums are populated by a significant number of individuals who are knowledgeable in pfSense and its related areas, making it a valuable resource.
Which solution did I use previously and why did I switch?
The choice of whether to use Netgate pfSense often depends on the company's preferences. In some cases, particularly in Switzerland, there is a strong preference for open source solutions. This choice is sometimes motivated by the desire for open source alternatives and can also be related to cost considerations.
How was the initial setup?
The Initial setup is very easy.
What's my experience with pricing, setup cost, and licensing?
Netgate pfSense is a cost-effective option. If you're not using a VPN, you can acquire a decent embedded PC for around a hundred dollars and install pfSense on it, effectively creating a robust firewall solution. With this setup, you can achieve a throughput of two hundred to three hundred megabits per second without any issues, provided you're handling relatively simple rules. The level of performance depends on the specific requirements and tasks.
What other advice do I have?
If you're considering using Netgate pfSense for the first time, I would recommend giving it a try. It's relatively easy to set up and use, especially if you have some prior knowledge of network and IT work. The user manual provides helpful guidance, and the basic configuration is straightforward. Just ensure you pay attention to the hardware requirements to make the most of it.
It can be rated as an eight for simplicity. However, as you progress and introduce complexities, such as enabling deep packet inspection, adding extra features, or installing multiple plugins, the configuration can become more intricate. I encountered some issues with iOS in version 2.5, but they are expected to be resolved or have been resolved.
An affordable and scalable solution that provides excellent features and documentation
What is our primary use case?
I use the product to test firewalls and VPN solutions.
How has it helped my organization?
We could use the solution to connect with the firewalls remotely for security.
What is most valuable?
The VPN features are the most valuable. The product’s documentation is good.
What needs improvement?
The solution’s interface must be improved.
For how long have I used the solution?
I have been using the solution for one year. I am using the latest version of the solution.
What do I think about the stability of the solution?
I rate the solution’s stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the tool’s scalability a ten out of ten.
How was the initial setup?
The initial installation is easy.
What's my experience with pricing, setup cost, and licensing?
The product is cheap.
What other advice do I have?
Initially, the product was difficult. It gets easier with use. It was a good investment. I would recommend the solution to others. Overall, I rate the product an eight out of ten.
Which deployment model are you using for this solution?
A stable and free solution that is easy to maintain and suitable for small businesses
What is our primary use case?
We use the product as a perimeter firewall.
What is most valuable?
We can run it on any hardware.
What needs improvement?
The product must provide integration with other solutions.
For how long have I used the solution?
We have been using the solution for ten years.
What do I think about the stability of the solution?
The tool is stable.
What do I think about the scalability of the solution?
The tool is not very scalable. That is why we are planning to switch to a different product. The solution is used by one administrator and 75 end users in our organization.
Which solution did I use previously and why did I switch?
I have used SonicWall, Sophos, FortiGate, and Cisco Meraki. The choice of product depends on the context. Netgate pfSense is suitable for small businesses and homes. It is not the best solution for large deployments or branch offices. Sophos and FortiGate would be suitable for large companies.
How was the initial setup?
It is easy to install the tool. We need two weeks to deploy it. One person can deploy the solution. It is also easy to maintain. One person can maintain the solution.
What's my experience with pricing, setup cost, and licensing?
It is an open-source solution.
What other advice do I have?
Overall, I rate the product an eight out of ten.
Which deployment model are you using for this solution?
Effective online management, secure, and user-friendly
What is our primary use case?
I am using pfSense as a firewall and VPN gateway.
How has it helped my organization?
pfSense has helped our organization because we use a data center that needed a firewall, VPN, and other features under a budget.
What is most valuable?
The most valuable features of pfSense are security, user-friendliness, and helpful online management.
What needs improvement?
It was difficult to configure our web printer through the solution. This process could be easier. Additionally, integration with SD-WAN solution.
For how long have I used the solution?
I have been using pfSense for approximately one year.
What do I think about the stability of the solution?
I rate the stability of pfSense an eight out of ten.
What do I think about the scalability of the solution?
We have approximately 2,000 people using the solution.
I rate the scalability of pfSense an eight out of ten.
How are customer service and support?
I have not used the support from the vendor. However, I use community support.
How was the initial setup?
The initial setup of pfSense was simple. However, when we install filters or agents it can be difficult.
I rate the initial setup of pfSense an eight out of ten.
What's my experience with pricing, setup cost, and licensing?
I am using the community version of the solution which is free.
The paid version is priced reasonably.
What other advice do I have?
The solution has solved many of our use cases.
I rate pfSense an eight out of ten.
Feature-rich, well documented, and there is good support available online
What is our primary use case?
We are solution providers and this is one of the products that we deploy for our customers. We replaced old Cisco ASA with pfSense and it proves as a good choice.
How has it helped my organization?
PfSense gives tools to protect the network. If you configured things properly then you'll be protected to the distant level. PFsense gives a solid set of functionalities that work perfectly. VPN services are stable and easy to deploy.
What is most valuable?
The classic features such as content inspection, content protection, and the application-level firewall, and VPN Are most common. This is a feature-rich product and the documentation is good.
What needs improvement?
Ease of use is a problem for a user who is unfamiliar with this product because, in the interface, everything has to be set manually. It would be more user-friendly if things were set automatically.
The drop in performance can be drastic when you use more advanced techniques. There is some trade-off between having a certain level of security and maintaining acceptable performance.
For how long have I used the solution?
We have more than ten years of experience with pfSense.
What do I think about the stability of the solution?
The stability of pfSense is standard. It is rated as one of the good solutions in this area.
What do I think about the scalability of the solution?
This product is scalable to some point, although we have never used it for large companies. We use it for small to medium-sized organizations. For big companies, we more often implement Palo Alto.
In our company, we have a data center and some of our clients are hooked to it. This is something that we have on-premises for our customers.
We have plans to increase our usage with pfSense because we have had good feedback from our customers. In fact, with the good experience we have had, our sales have been slightly increasing. Our sales are shifting from Sophos to pfSense.
How are customer service and support?
The technical support is organized well. We do most of the technical support for our customers in-house but there is a second level of outside support available. It is okay.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We currently resell products from both pfSense, Sophos and Cisco. In some areas, pfSense is better than Sophos. I have been a bit disappointed with Sophos because I know their history, and I don't think that they have advanced as well as they should have in that time. Also, they have two different products, XG and UTM. This is another reason that I prefer pfSense, at least a little bit, over Sophos.
How was the initial setup?
The initial setup is complex. If you have a straightforward setup then you will have straightforward, basic protection and nothing else.
It takes a few months to adjust where you start by setting it up, and then you have to monitor it and see what's happening. It's ongoing work because, after this, you have to keep monitoring and adjusting to the situation. This is part of the service that we perform for our customers.
What about the implementation team?
We are the integrators for our customers and deploy with our in-house team. We have people in the company who are specialized in this area.
What was our ROI?
The return on investment depends on the predicted cost of failures of the system, or intrusion of the system, which is hard to give a straight answer on. In part, this is because different companies put a different value on their data.
For example, with medicine, if somebody were to steal the data related to the latest CORONA vaccine then the cost would be tremendous. On the other hand, if there is a company that is making chairs, stealing the design of the chair probably wouldn't be as high when compared to an application in medicine. So, there is not a straight answer for that.
Return on investment, in any case, I think for every company, this is a must. Put in a straightforward way, they can count just the possibilities of having an attack on their system with a cryptovirus. If they can save their data from attackers then it would save them at least two days of not working plus the cost of recovery, which would be much more than the cost of the system and maintenance.
What's my experience with pricing, setup cost, and licensing?
The price of the licensing depends on the size of the deployment. pfSense is open-source, but the support is something that the customer pays for. We charge them for the first line of support and if they want, they can purchase the second line of support. Typically, they take the first-line option.
The term of licensing also depends on the contract. The firewall doesn't always have a contract but rather, there is a contract in place for the network, which includes UTM.
In addition to the licensing fees, there are costs for hardware, installation, and maintenance. We use HPE servers, and the cost depends on how large the installation is. The price of setup is approximately €500 to €800, which also includes the initial monitoring.
The maintenance cost isn't really included in the network fees.
For smaller companies, we charge them a few hours a month for monitoring. It takes longer if the client is bigger.
Which other solutions did I evaluate?
Palo Alto, Fortinet, Sophos, Cisco
What other advice do I have?
It is important to remember that you can't just leave the device to do everything. You still have to know what you're doing.
I recommend the product. It's well-balanced and one with a long history, so it doesn't have child's diseases. There is a lot of online support available online, which they can consult themselves. But, in the case that they need support, they can hire a professional support line and that is highly recommended.
I say this because usually, people look at the UTM as something that should be put in the system, set up, and left alone. But, this is not the case with this type of solution. Therefore, I strongly suggest making an outside agreement with a specialized company that will take care of their security from that point on.
The biggest lesson that I have learned from using this kind of product is that you can't assume that the internet is a big place and nobody will find you. There is always a good possibility that robots will search your system for holes, and they are probably doing so this instant. This means that users should be aware and have decent protection.
In summary, this is a good product but there is always room for improvement.
I would rate this solution a nine out of ten.