We performed a comparison between OPNsense and Palo Alto Networks NG Firewalls based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: OPNsense is highly regarded for its ability to adapt and grow, its ability to allow guest access, its user-friendly interface, its versatility, its reliability, its intrusion detection and prevention system, and the availability of a free version. Palo Alto Networks NG Firewalls excel in their incorporation of machine learning, their ability to prevent attacks in real-time, their unified platform, and their robust security capabilities.
OPNsense has room for improvement in interface simplicity, bandwidth management, high availability, logging, integration, hardware updates, reporting, SSL inspection, and learning curve. Palo Alto Networks NG Firewalls can enhance customization, SD-WAN configuration, logging accuracy, management interface, documentation, VPN availability, training materials, external dynamic list feature, and internet filtering.
Service and Support: Some users find the customer service for OPNsense excellent, while others believe it could be enhanced. Opinions on Palo Alto Networks NG Firewalls' customer service are divided. Some customers appreciate the support team's expertise and promptness, while others have faced challenges in contacting support.
Ease of Deployment: The setup process for both OPNsense and Palo Alto Networks NG Firewalls is described as straightforward. Users with or without IT experience can easily navigate through either setup. The deployment time for both options can vary depending on specific circumstances. Palo Alto Networks NG Firewalls provide training materials that contribute to the simplified and user-friendly setup experience.
Pricing: OPNsense primarily incurs expenses for hardware, while the software is available for free. Additional costs may involve public IPs and underlying VMs. Palo Alto Networks NG Firewalls are generally perceived as having higher pricing due to licensing and subscriptions. Nevertheless, this higher cost is deemed reasonable given the level of security and features offered by the product.
ROI: OPNsense delivers cost savings within a short period, eradicating the need for ongoing expenses. Palo Alto Networks NG Firewalls enhance visibility, reporting, and security, streamlining administration and ensuring a sense of security.
Comparison Results: Based on user feedback, Palo Alto Networks NG Firewalls is the preferred choice when compared to OPNsense. Users find the initial setup of Palo Alto Networks NG Firewalls to be straightforward and easy. Palo Alto Networks NG Firewalls is highly regarded for its embedded machine learning capabilities, strong security features, and comprehensive logging.
"The Fortinet FortiGate local partners were good. I did not have direct contact with Fortinet support."
"It is a one box solution, which covers most of the edge device’s requirements."
"The IPS is good. It protect my network from attackers."
"The product is very stable, easy to troubleshoot, and configure, so it has reduced the time it takes for support."
"The most important features with FortiGate are the web filter and application controls. We can control our internet usage and use the web filter for application purposes."
"Easy to implement, and it is also reliable."
"The virtual firewall feature is the most valuable. We have around 1,500 firewalls. We did not buy individual hardware, and the virtual firewalls made sense because we don't have to keep on buying the hardware. FortiGate is easier to use as compared to Checkpoint devices. It is user friendly and has a good UI. You don't need much expertise to work on this firewall. You don't need to worry much about DCLA, commands, and things like that."
"Using this product makes the VPN seamless and almost invisible to me in the sense that I don't have to think about it."
"The feature I find most valuable, is that the program helped me to realize all the requested functionality that was needed."
"The DNS-level filtering is impressive for thwarting time scanners."
"The VPN server feature is the most valuable. It is integrated with Radius and AAA for doing accounting and authentication. Insight view is also an important feature for me at this time. It allows me to assess our network traffic. I also like the firewall feature. The BSD kernel has a packet filter. It is one of the most solid frameworks for firewalls. Its user interface is one of the best interfaces I have used."
"The solution is user-friendly and easy to configure."
"What I like best about OPNsense is that, as a firewall, it's pretty good. I'm quite impressed with it. I had an excellent experience with OPNsense, which helped me achieve the targets I wanted."
"One of the most valuable features is the network checking. Additionally, the firewall and web filtering functionalities are highly useful."
"The initial setup is easy. It only takes 15-30 minutes to deploy."
"URL blocking, Wireguard, Tail Scale, Engine Blocker, and VPN are the most valuable features for me."
"The most valuable features are the power of the threat prevention and the WildFire service. Its strength comes from the huge number of sensors all over the world. The firewalls have a rich library of signatures."
"The most valuable features are the IPS/IDS subscriptions."
"Mechanically, all firewalls work in a similar fashion, but what makes Palo Alto different is that it also has some of the threat hunt capabilities. It is a little bit better than other vendors."
"The most valuable feature of the solution is the network protection."
"The strengths of Palo Alto Networks NG Firewalls are application visibility and application awareness. Their strong point is identifying applications for traffic. So all of the policies that are configured are related to the application and not to a port."
"We have found the application control to be the most valuable feature. Also, Layer 7, because all other products are working up to the maximum capacity. But Palo Alto is benefiting us, especially in application control management. We are able to differentiate between Oracle traffic and SQL traffic."
"The interface is very nice. We generally like the UI the product offers."
"Application layer firewalling has been the most valuable feature because it gives thousands of application IDs that we can use to control traffic into and out of our environment. The second most important feature has been the GlobalProtect VPN feature."
"The ease of use could be improved."
"We would like to see a better training platform implemented."
"WAN load-balancing could be a lot better at detecting when a link is poor or inconsistent, and not just flat out dead."
"We sometimes have issues with FortiGate's routing table in the latest firmware update. We had to downgrade the device because our customers complained about bugs."
"The solution's framework needs to be frequently updated in order to have a stable solution."
"The non-error conserve mode has room for improvement."
"Fortinet doesn't provide multiple virtual firewalls which would facilitate end users and customers."
"We would like to see an upgrade to the VPN feature, we are using the VPN from outside of our office and there is a limitation to 10 connections, more connections would be suitable."
"The user interface could be improved, and the DNS section should be more intuitive."
"Given that OPNsense plays a pivotal role as a firewall, safeguarding against various threats, having a reliable backup ensures uninterrupted protection even if unforeseen events impact the primary virtual machine."
"There are issues with stability and reliability."
"OPNsense could improve by making the configuration more web-based rather than shell or command-line-based."
"I think the most important thing is that it should be easily accessible, but currently, that doesn't seem to be the case. We need a hardware platform that's based on common standards and open computing principles, which would be like a commodity and benefit us greatly."
"The reporting part could be better."
"An area for improvement in OPNsense is the hardware, which needs to be updated more frequently. DNS blocking is another good feature I want to be added to the solution. pfSense has a peer-blocking feature that I also want to see in OPNsense."
"The solution could be more secure."
"Palo Alto has introduced new features in their next-generation firewall, such as SD-WAN. However, the technique of SD-WAN implementation is not easy to understand. It is not easy to deploy at this moment. Maybe, in the future, they can improve the process and how the administrators, partners, or support team can easily deploy this SD-WAN solution on their next-generation firewall. The SD-WAN solution from Fortinet is easy to do. It does not take more than five or 10 minutes. When we talk about Palo Alto, it takes extra effort to implement SD-WAN."
"The performance of the Panorama interface needs to be improved. It tends to be very sluggish at times."
"The tech support was once great, but now it is poor. The tech support has gone south. It is really difficult. I had a Priority 1 case last a week in their queue, and after multiple complaints, I finally got somebody to take the case. These are things that are unacceptable in the business world. They could train their employees better."
"I think automation and machine learning can be improved to make bulk configurations simpler, easier, and faster"
"I would like to see more integration."
"We need better affiliations for profiling the user."
"Maybe they could add some tools and more competing services, like servers, but that would increase the cost of the solution."
"The scalability of the firewalls could be improved."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
OPNsense is ranked 3rd in Firewalls with 36 reviews while Palo Alto Networks NG Firewalls is ranked 5th in Firewalls with 164 reviews. OPNsense is rated 8.4, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of OPNsense writes "Robust network security and management offering a user-friendly interface, open-source flexibility, and cost-effectiveness, with challenges regarding initial setup and the absence of official support". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". OPNsense is most compared with Netgate pfSense, Sophos XG, Untangle NG Firewall, Sophos UTM and Sophos XGS, whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Sophos UTM. See our OPNsense vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.