{"id":14146,"date":"2019-07-01T08:39:26","date_gmt":"2019-07-01T08:39:26","guid":{"rendered":"https:\/\/www.firewallhardware.it\/pfsense-vs-opnsense-comparazione-tecnica\/"},"modified":"2024-04-15T12:33:11","modified_gmt":"2024-04-15T10:33:11","slug":"pfsense-vs-opnsense-technical-comparison","status":"publish","type":"post","link":"https:\/\/blog.miniserver.it\/en\/pfsense\/pfsense-vs-opnsense-technical-comparison\/","title":{"rendered":"pfSense vs OPNsense: technical comparison"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1123.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">Introduction<\/h3>\n<p>This article was written as food for thought for a <strong>technical comparison<\/strong>\u00a0resulting from our first impressions of the two solid platforms:<strong>pfSense\u00ae CE<\/strong>\u00a0ed\u00a0<strong>OPNsense\u00ae<\/strong>.<br \/>\nThe following information are available in the links in the footer or those directly connected to the article.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">Un po&#8217; di storia contemporanea<\/h3>\n<p><strong>OPNsense\u00ae<\/strong>\u00a0is a young firewall operating system based on FreeBSD 10, it started as a fork of pfSense\u00ae CE which is a m0n0wall\u00ae fork.<br \/>\nHis story begins officially in January 2015, exactly the 2 January 2015, when it was published on the official website the release announcement of its first release: the 15.1.<br \/>\nFor all those who were not already known, keep in mind that OPNsense\u00ae versions represent (respectively) the year (ex. 15), and the month (ex. 1). The version 15.1 indicates, therefore, January 2015 and there are two major releases per year: in January and in July.<br \/>\npfSense\u00ae CE which is also based on FreeBSD, as mentioned earlier, was born as a m0n0wall\u00ae fork back in September 2004 by *Chris Buechler and Scott Ullrich to overcome some of limitations of this excellent embedded system.<br \/>\nThe m0n0wall\u00ae system, for who do not know, was in fact an embedded firewall; his great strength was also a limitation of expandability because both applications that the operating system were performed entirely in RAM.<br \/>\nIf, like us, you&#8217;ve wondered why the name of pfSense\u00ae CE\u00a0<a href=\"https:\/\/blog.pfsense.org\/?p=114\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>&#8216;s an interesting post written by one of the founders who explains in a few simple words why their project is called so.<br \/>\nLast but not least, we write a few words to greet m0n0wall\u00ae; the project ends permanently, as announced on the\u00a0<a href=\"http:\/\/m0n0.ch\/wall\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">official page<\/a>, the February 15, 2015. Its founding father, Manuel Kasper, always on the\u00a0<a href=\"http:\/\/m0n0.ch\/wall\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">official page<\/a>\u00a0encourages all its users to check out OPNsense\u00ae.<br \/>\n*[Editor&#8217;s note: he had contributed to m0n0wall\u00ae project, but\u00a0<a href=\"http:\/\/m0n0.ch\/wall\/license.php\" target=\"_blank\" rel=\"noopener noreferrer\">below<\/a>\u00a0in the section &#8220;The Following persons have Contributed code to m0n0wall&#8221; does not include his name.]<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">So Why did we fork<\/h3>\n<p>The <strong>OPNsense\u00ae<\/strong>\u00a0developers have participated for years to pfSense\u00ae CE project but, in 2014, motivated by a desire of wanting to make a number of things differently, they decided to create their own project that reflects better their needs.<br \/>\nThe stated reasons which led to the fork are mainly technical, but also due to security and code quality. In Last (but not least), the fork was due to the license change done by pfSense\u00ae CE, which caused some disappointment whitin the community.<\/p>\n<p>If you wish to have further details on the reasons of the fork, please refer to the links:<br \/>\n<a href=\"https:\/\/docs.opnsense.org\/history\/thefork.html?highlight=fork\" target=\"_blank\" rel=\"noopener\">https:\/\/docs.opnsense.org\/history\/thefork<\/a><br \/>\n<a href=\"https:\/\/m.reddit.com\/r\/PFSENSE\/comments\/3rh9dw\/pfsense_vs_opnsense\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/m.reddit.com\/r\/PFSENSE\/comments\/3rh9dw\/pfsense_vs_opnsense\/<\/a><\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">OpnSense\u00ae: License<\/h3>\n<p>It is released under an open source license called <a href=\"https:\/\/opensource.org\/licenses\/BSD-2-Clause\" target=\"_blank\" rel=\"noopener noreferrer\">BSD 2-Clause &#8220;Simplified&#8221; or &#8220;FreeBSD&#8221; license<\/a>\u00a0OSI-approved (Open soruce Initiative &#8211; Approved); ie approved by the organization dedicated to the promotion of free software.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">pfSense\u00ae CE: License<\/h3>\n<p>Let&#8217;s talk about the much-discussed license.<br \/>\npfSense\u00ae CE\u00a0<a href=\"http:\/\/web.archive.org\/web\/20140615204450\/https:\/www.pfsense.org\/about-pfsense\/\" target=\"_blank\" rel=\"noopener noreferrer\">changed<\/a>\u00a0her license, which was a 4-clause license (original &#8220;<a href=\"https:\/\/it.wikipedia.org\/wiki\/Licenze_BSD#Licenza_BSD_originale_.284_clausole.29\" target=\"_blank\" rel=\"noopener noreferrer\">BSD License<\/a>&#8220;), with the ESF License in 2014. You can find this license informations in the COPYRIGHT file inside the older software releases.<br \/>\n<a href=\"https:\/\/blog.pfsense.org\/?p=2103\" target=\"_blank\" rel=\"noopener noreferrer\">Recently<\/a>\u00a0it was replaced once again, and now is released under\u00a0<a href=\"https:\/\/opensource.org\/licenses\/Apache-2.0\" target=\"_blank\" rel=\"noopener noreferrer\">Apache License 2.0<\/a>\u00a0which is OSI-approved as well.<br \/>\nAll people who wish to contribute to the pfSense\u00ae CE project, have to subscribe and electronically sign an ICLA (Individual Contributors License Agreement).<br \/>\nIf you wish to have more information about this, we suggest to follow this links:<br \/>\n<a href=\"https:\/\/doc.pfsense.org\/index.php\/Contributor_License_Agreement_for_Developers\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doc.pfsense.org\/index.php\/Contributor_License_Agreement_for_Developers<\/a><br \/>\nBelow an interesting Wikipedia web page where are published some comparing tables about much open source and free licenses:<a href=\"https:\/\/en.wikipedia.org\/wiki\/Comparison_of_free_and_open-source_software_licenses\" target=\"_blank\" rel=\"noopener noreferrer\">comparing tables about much open source and free licenses<\/a>.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">Technically speaking: differences<\/h3>\n<p><strong>OPNsense\u00ae<\/strong>\u00a0<a href=\"https:\/\/docs.opnsense.org\/history\/thefork.html\" target=\"_blank\" rel=\"noopener noreferrer\">declares<\/a>\u00a0(In their website) that almost all code has been rewritten keeping only a minor portion of the 10% still shared with that of his elder brother, and to have solved many kernel issues of pfSense\u00ae CE.<br \/>\nThe new Graphic User Interface is written with\u00a0<a href=\"https:\/\/phalconphp.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phalcon PHP<\/a>\u00a0framework that, to what we read, is the fastest open source framework on the market.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[OpnSense\u00ae: Phalcom]<\/h3>\n<p>Users choosing to try this system can then use this new design that incorporates an efficient search system (really useful and functional), and an interesting module called &#8220;System Health&#8221;.<br \/>\nThis module is interactive and allow you to have a graphical feedback during any analysis. Useful to find a problem more quickly and easly or simply to watch the performances.<br \/>\nOnce in the System Health is possible to hide some entries from the view, and use the graphics cursor\/focus (bottom right below the graph) to make a zoom of the relevant time range.<br \/>\nFinally we can export the data from the table (shown below the graph activating Show Table On) in CSV format. Here are some screenshots showing this interesting form.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[pfSense\u00ae CE: Bootstrap]<\/h3>\n<p>pfSense\u00ae CE, starting from version 2.3, introduces a new look by <a href=\"https:\/\/blog.pfsense.org\/?p=1837\" target=\"_blank\" rel=\"noopener noreferrer\">converting<\/a>\u00a0everything to\u00a0<a href=\"http:\/\/getbootstrap.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bootstrap<\/a>.<br \/>\nThe layout of the pages and the menu is deliberately kept unchanged; probably to not force numerous users, already familiar to the &#8220;old&#8221; GUI, to spend time in a new format.<br \/>\n<a href=\"https:\/\/imgur.com\/a\/KGNVW#HoqdpwU\" target=\"_blank\" rel=\"noopener noreferrer\">Here<\/a>\u00a0you can find a images gallery published during the final stages of development.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[OpnSense\u00ae: Inline IPS]<\/h3>\n<p>From version 16.7 (out on July 28, 2016) it is also expected a change in the IPS system called Inline Intrusion Prevention; not limited to block an IP or a port, but inspects the packet and when it detects a certain type of traffic (or connection) the packet\/connection is dropped\/stopped instantly, before it reaches the sender.<br \/>\nBased on Suricata uses Netmap to increase performance and decrease CPU utilization.<br \/>\nThe system uses Ruleset, blacklist and Finger Printing.<br \/>\nFor more informations visit following link:\u00a0<a href=\"https:\/\/docs.opnsense.org\/manual\/ips.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/docs.opnsense.org\/manual\/ips.html<\/a><\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[pfSense\u00ae CE: IPS]<\/h3>\n<p>You can do it on pfSense\u00ae CE thanks to <a href=\"https:\/\/doc.pfsense.org\/index.php\/Setup_Snort_Package\" target=\"_blank\" rel=\"noopener noreferrer\">Snort<\/a>\u00a0package.<br \/>\nSnort is an open source (recently bought by Cisco) tool prevention of network intrusions. It is able to perform traffic analysis on IP networks in real time, to perform protocol analysis, content searching\/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.<br \/>\n<a href=\"https:\/\/www.snort.org\/faq\/what-is-snort\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.snort.org\/faq\/what-is-snort<\/a><\/p>\n<p>Here you will find an interesting comparison between Sport and Suricata:\u00a0<a href=\"http:\/\/wiki.aanval.com\/wiki\/Snort_vs_Suricata\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/wiki.aanval.com\/wiki\/Snort_vs_Suricata<\/a><\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[OpnSense\u00ae: Update]<\/h3>\n<p>Weekly security updates are planned to be more in step with the new threats.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[pfSense\u00ae CE: Update]<\/h3>\n<p>When writing this article there are no regular updates scheduled, but thanks to our experience we know that pfSense\u00ae CE releases updates frequently.<br \/>\nRecently, moreover, it was also announced the conversion of the underlying system to FreeBSD\u00ae pkg which allows to update parts of the system individually rather than the monolithic updates of the past.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[Community]<\/h3>\n<p>This is one of the major differences between the two projects. OpnSense\u00ae does not support the creation and installation of third-party packages, opposed to the pfSense\u00ae CE policy.<br \/>\nThis choice is motivated, by OpnSense\u00ae developers, to avoid possible code defects.<br \/>\nLink: <a href=\"https:\/\/docs.opnsense.org\/history\/thefork.html\" target=\"_blank\" rel=\"noopener\">https:\/\/docs.opnsense.org\/history\/thefork.html<\/a><\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">[OpnSense\u00ae: Community]<\/h3>\n<p>Questo punto rappresenta una delle differenze maggiori tra i due progetti. OPNsense\u00ae non supporta la creazione e l&#8217;installazione di packages di terze parti, come invece consente di fare pfSense.<br \/>\nQuesta scelta viene motivata dagli sviluppatori di OPNsense\u00ae per evitare possibili imperfezioni del codice.<br \/>\nLink: <a href=\"https:\/\/docs.opnsense.org\/history\/thefork.html\" target=\"_blank\" rel=\"noopener\">https:\/\/docs.opnsense.org\/fork\/nomoremyths#myth-opnsense-doesn-t-support-packages<\/a>OPNsense\u00ae abolished packages and introduced a plugin system. All those who want to contribute to the project can learn more details about it consulting the following link:\u00a0<a href=\"https:\/\/docs.opnsense.org\/plugins.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/docs.opnsense.org\/plugins.html<\/a>.<\/p>\n<p>As mentioned earlier, the community must sign an ICLA, but can then contribute like it always did in all these years.<\/p>\n<p>As always, for more about the above information, please see the following link:<\/p>\n<ul>\n<li><a href=\"https:\/\/docs.opnsense.org\/history\/thefork.html\" target=\"_blank\" rel=\"noopener\">https:\/\/docs.opnsense.org\/fork\/thefork#debunking-the-myths<\/a><\/li>\n<li><a href=\"https:\/\/opnsense.org\/about\/about-opnsense\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/opnsense.org\/about\/about-opnsense\/<\/a><\/li>\n<li><a href=\"https:\/\/docs.opnsense.org\/plugins.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/docs.opnsense.org\/plugins.html<\/a><\/li>\n<\/ul>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">OPNsense\u00ae vs Feature pfSense\u00ae CE: Comparative<\/h3>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 66.7167px;\"><strong>Features<\/strong><\/td>\n<td style=\"width: 91.8333px;\"><strong>OPNsense\u00ae<\/strong><\/td>\n<td style=\"width: 74.0333px;\"><strong>pfSense\u00ae CE<\/strong><\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Firewall<\/td>\n<td style=\"width: 91.8333px;\">Stateful inspection<\/td>\n<td style=\"width: 74.0333px;\">Stateful inspection<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Web Based Graphical Interface<\/td>\n<td style=\"width: 91.8333px;\">Bootstrap based on Phalcon PHP Framework<\/td>\n<td style=\"width: 74.0333px;\">* From 2.3 migrated to Bootstrap<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Installation Setup Wizard<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Configurable Dashboard<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">IPv4 and IPv6 support<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Wireless Access Point<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Wireless Client Support<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Setup and filter\/isolate multiple<\/td>\n<td style=\"width: 91.8333px;\">&#8211;<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Interfaces (LAN] DMZ] etc.)<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Traffic Shaping<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">State Table controls<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">NAT<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Redundancy\/High Availability<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Multi-WAN Support<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Server Inbound Load Balancing<\/td>\n<td style=\"width: 91.8333px;\">Yes (Virtual Server Setup)<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Network diagnostic utilities<\/td>\n<td style=\"width: 91.8333px;\">See below<\/td>\n<td style=\"width: 74.0333px;\">See below<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[ping]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[traceroute]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[port tests via the GUI]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">more with packages] such as nmap<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\" colspan=\"3\"><strong>VPN<\/strong><\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[IPsec (including Phase 2 NAT)]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[OpenVPN]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[L2TP]<\/td>\n<td style=\"width: 91.8333px;\">Yes (tramite plugin)<\/td>\n<td style=\"width: 74.0333px;\">Yes (through package)<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[PPPoE]<\/td>\n<td style=\"width: 91.8333px;\">Yes (tramite plugin)<\/td>\n<td style=\"width: 74.0333px;\">Yes (through package)<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[PPTP]<\/td>\n<td style=\"width: 91.8333px;\">Yes (Non considerata sicura)<\/td>\n<td style=\"width: 74.0333px;\">No (Taken because not sure)<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">RRD Graphs<\/td>\n<td style=\"width: 91.8333px;\">No (System Health)<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Real-time interface traffic graphs<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Dynamic DNS<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Captive Portal<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">DHCP Server and Relay (IPv4 and IPv6)<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Command line shell access<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Wake on LAN<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Built in packet capture \/ sniffer<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Backup and restore the fw configuration<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Edit files via the web GUI<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\" colspan=\"3\"><strong>Virtual interfaces for:<\/strong><\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[VLAN]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[LAGG\/LACP]<\/td>\n<td style=\"width: 91.8333px;\">Yes\/No<\/td>\n<td style=\"width: 74.0333px;\">Yes\/Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[GIF]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[GRE]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[PPPoE\/PPTP\/L2TP\/PPP WANs]<\/td>\n<td style=\"width: 91.8333px;\">Yes\/Yes\/Yes\/Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes\/Yes\/Yes\/Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">[QinQ] and Bridges]<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Caching DNS Forwarder\/Resolver<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Can be run in many virtualization env.<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">Yes<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Proxy Server<\/td>\n<td style=\"width: 91.8333px;\">Yes<\/td>\n<td style=\"width: 74.0333px;\">using packages<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">IPS<\/td>\n<td style=\"width: 91.8333px;\">Yes (based on <a href=\"https:\/\/suricata-ids.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Suricata<\/a>: gi\u00e0 incluso)<\/td>\n<td style=\"width: 74.0333px;\"><a href=\"https:\/\/www.snort.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SNORT<\/a> (EXTRA PACKAGE)<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">IDS<\/td>\n<td style=\"width: 91.8333px;\">Yes (based on <a href=\"https:\/\/suricata-ids.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Suricata<\/a>: gi\u00e0 incluso)<\/td>\n<td style=\"width: 74.0333px;\"><a href=\"https:\/\/www.snort.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SNORT<\/a> (EXTRA PACKAGE)<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Security Update<\/td>\n<td style=\"width: 91.8333px;\">Yes Weekly<\/td>\n<td style=\"width: 74.0333px;\">Yes with patch fix release<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #ccc;\">\n<td style=\"width: 66.7167px;\">Raid Software<\/td>\n<td style=\"width: 91.8333px;\">Yes unofficially supported*<\/td>\n<td style=\"width: 74.0333px;\">Yes full supported<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This\u00a0<strong>comparative table<\/strong>\u00a0is born researching the pfSense\u00ae CE features in OPNsense\u00ae.* is possible to choose during works installation the &#8220;Geom Mirror&#8221; and selecting: the master and the slave disks. In the graphical interface, however, there is no trace of the mirror created, so it not possible to have any information about its status. We also found, in our lab tests, some strange messages of &#8220;Geom Mirror distroyed&#8221; that not compromised (apparently) the system functionality.[vc_row]<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">pfSense\u00ae CE VS OPNsense: comparing performances<\/h3>\n<p>To have another point of comparison we decided to test on site some of the systems performance. We chosen to do the files transfer tests between two hosts connected behind two <a href=\"https:\/\/www.miniserver.store\/firewall\/entry-level\" target=\"_blank\" rel=\"noopener\">Firewall Entry level.<\/a> Below a logical scheme of the tests network used:<\/p>\n<p>Traffic from Host1 to Host2 passed through the two firewall systems on which we registered almost identical performances for all tests done. In the table summary, that you will find below, the expressed values in Mbps reported was recorded during the tests:<\/p>\n<ul>\n<li>Through\u00a0 OpenVPN<\/li>\n<li>Through\u00a0 VPN IPSec<\/li>\n<li>Through a direct routing<\/li>\n<\/ul>\n<p>Both firewalls have behaved the same way in all situations.<br \/>\nThis are the registerd value ranges:<\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr style=\"border-top: 1px solid #cccccc;\">\n<td><strong>Throughput<\/strong><\/td>\n<td><strong>OPNsense\u00ae<\/strong><\/td>\n<td><strong>pfSense\u00ae CE<\/strong><\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #cccccc;\">\n<td>File Transfer OVPN<\/td>\n<td>40-42 Mbps<\/td>\n<td>40-42 Mbps<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #cccccc;\">\n<td>File Transfer direct (routing)<\/td>\n<td>150-330Mbps<\/td>\n<td>150-330Mbps<\/td>\n<\/tr>\n<tr style=\"border-top: 1px solid #cccccc;\">\n<td>File Transfer VPN IPSec<\/td>\n<td>150Mbps<\/td>\n<td>150Mbps<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You can consider our hardware devices sizing guide valid for both OPNsense\u00ae and pfSense. <a href=\"https:\/\/blog.miniserver.it\/en\/firewall\/how-to-size-a-firewall\/\">Check out How to size a firewall.<\/a><\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">Conclusions<\/h3>\n<p>All around the web you read pros and cons comments for both projects; we do not wish consider them and do not wish take sides in favor of anyone, but certainly, it would be wrong not to see this fork as an opportunity for the open source security world.<br \/>\nThe competition between the two is good for both projects and for the end user: whatever your choice will always have a good product.<br \/>\nAside the small differences already described, firewalls are very similar right now. The systems performances are the same (for now) being derived both from the same O.S. (this result was expected even before the test).<br \/>\nIn hardware compatibility, we have not noted particular differences, as well as for the features: for the 90% are equivalent (see table above).<br \/>\nGraphically it seems that OPNSense\u00ae is better than pfSense\u00ae CE with a more enjoyable menu.<br \/>\nProbably in the future separation will be more pronounced or maybe not; if not it would be pretty hard to choose one solution over the other.<br \/>\nFor now the choice could be either due to the different OPNSense\u00ae graphic layout, more engaging and with a more pleasing menu, or for the years of experience, the great community and greater notoriety of pfSense\u00ae CE. It should not be forgotten that OPNSense\u00ae has just over 1 year old (compared with 12 years old of pfSense\u00ae CE). This affects the popularity, various discussion forums contents that are much more populated and full of informations.<br \/>\nInstead, what leaves us a bit confused, are the continuous license type changes operated by pfSense\u00ae CE and the Community Edition inscription under the logo: maybe in future could there be a different policy?<br \/>\nWe&#8217;ll see.<\/p>\n<h3 style=\"text-align: left; color: #00a0df; font-size: 20px;\">Curiosity<\/h3>\n<p>After Scott Ulrich, also Chris Buechler leaves the pfSense\u00ae CE project: officially on the July 28, 2016. He accepted to become principal engineer at Ubiquiti Networks.<br \/>\nAnd speaking of notoriety, if you want more information on the trends diffusion of the most famous open source firewall O.S. please consult the following link:<\/p>\n<ul>\n<li><a href=\"https:\/\/trends.google.it\/trends\/explore?date=all&amp;q=opnsense,pfsense\" target=\"_blank\" rel=\"noopener\">pfSense CE VS OPNsense<\/a><\/li>\n<li><a href=\"https:\/\/trends.google.it\/trends\/explore?date=all&amp;q=opnsense,pfsense,zeroshell,ipcop,ipfire\" target=\"_blank\" rel=\"noopener\">pfSense\u00ae CE VS OPNsense\u00ae VS zeroshell VS IPCop VS IPfire<\/a><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article was written as food for thought for a technical comparison resulting from our first impressions of the two solid platforms:pfSense\u00ae CE ed OPNsense\u00ae.<\/p>\n","protected":false},"author":11,"featured_media":28005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[124,126],"tags":[137,138],"class_list":["post-14146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pfsense","category-opnsense","tag-opnsense-en","tag-pfsense-en"],"_links":{"self":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/comments?post=14146"}],"version-history":[{"count":16,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14146\/revisions"}],"predecessor-version":[{"id":29721,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/14146\/revisions\/29721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media\/28005"}],"wp:attachment":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media?parent=14146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/categories?post=14146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/tags?post=14146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}