We performed a comparison between OPNsense and Palo Alto Networks NG Firewalls based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: OPNsense is highly regarded for its ability to adapt and grow, its ability to allow guest access, its user-friendly interface, its versatility, its reliability, its intrusion detection and prevention system, and the availability of a free version. Palo Alto Networks NG Firewalls excel in their incorporation of machine learning, their ability to prevent attacks in real-time, their unified platform, and their robust security capabilities.
OPNsense has room for improvement in interface simplicity, bandwidth management, high availability, logging, integration, hardware updates, reporting, SSL inspection, and learning curve. Palo Alto Networks NG Firewalls can enhance customization, SD-WAN configuration, logging accuracy, management interface, documentation, VPN availability, training materials, external dynamic list feature, and internet filtering.
Service and Support: Some users find the customer service for OPNsense excellent, while others believe it could be enhanced. Opinions on Palo Alto Networks NG Firewalls' customer service are divided. Some customers appreciate the support team's expertise and promptness, while others have faced challenges in contacting support.
Ease of Deployment: The setup process for both OPNsense and Palo Alto Networks NG Firewalls is described as straightforward. Users with or without IT experience can easily navigate through either setup. The deployment time for both options can vary depending on specific circumstances. Palo Alto Networks NG Firewalls provide training materials that contribute to the simplified and user-friendly setup experience.
Pricing: OPNsense primarily incurs expenses for hardware, while the software is available for free. Additional costs may involve public IPs and underlying VMs. Palo Alto Networks NG Firewalls are generally perceived as having higher pricing due to licensing and subscriptions. Nevertheless, this higher cost is deemed reasonable given the level of security and features offered by the product.
ROI: OPNsense delivers cost savings within a short period, eradicating the need for ongoing expenses. Palo Alto Networks NG Firewalls enhance visibility, reporting, and security, streamlining administration and ensuring a sense of security.
Comparison Results: Based on user feedback, Palo Alto Networks NG Firewalls is the preferred choice when compared to OPNsense. Users find the initial setup of Palo Alto Networks NG Firewalls to be straightforward and easy. Palo Alto Networks NG Firewalls is highly regarded for its embedded machine learning capabilities, strong security features, and comprehensive logging.
"Secure, user-friendly, stable, and scalable network security solution. Installation is straightforward."
"The SD-WAN feature is the most valuable. This feature evolved from link load balancing. It has helped us in terms of our uptime and privatizing applications whenever we experience an outage. The SD-WAN feature has been a plus for us. Two-factor authentication has allowed us to add more users in terms of remote working. We have two-factor authentication for remote workers to authenticate them before they get on the network."
"FortiGate is very simple to manage and easy to use."
"The CLI is robust and powerful, enabling rapid, consistent changes via SSH."
"All of the features of Fortinet FortiGate are useful and the security protection is good."
"Initial setup is straightforward. There weren't too many issues with setting it up. It takes one hour or so."
"Their proxy-based inspection is responsive and secure."
"The user interface (UI) is very, very good."
"OPNsense is highly stable."
"What I like best about OPNsense is that, as a firewall, it's pretty good. I'm quite impressed with it. I had an excellent experience with OPNsense, which helped me achieve the targets I wanted."
"URL blocking, Wireguard, Tail Scale, Engine Blocker, and VPN are the most valuable features for me."
"The solution is user-friendly and easy to configure."
"The initial implementation process is simple."
"OPNsense could improve by making the configuration more web-based rather than shell or command-line-based."
"OPNsense is easy to use and open source."
"The solution has high availability."
"The management options are good."
"Good functionality and features."
"You can easily integrate it with Active Directory, and you can use the GlobalProtect VPN for internal and external purposes. The URL Filtering is also clear and the application filtering is a plus. The application filtering is much better when you compare it to FortiGate or other firewall vendors."
"IoT security is most valuable in the current version. Content IDs, DDoS protection, zone protection, and DLP are the most prominent features in Palo Alto Networks NG Firewall. It is easier to configure than other solutions."
"Comments have some delay, but overall, it's a good product."
"The Unified Threat Management (UTM) module, which consists of the basic firewall and IPS services, is what the majority of our customers use in Palo Alto Firewall."
"The most important thing is that it's really user-friendly. I have almost stopped using the CLI because I like the graphical interface. You can do whatever you want on a single screen, including all the configuration and implementation, using Panorama. You don't have to switch from one place to another."
"It's a next-generation firewall and it's pretty stable. You don't have to worry about if you restart it for some maintenance. It will just come back."
"There can be more security in hybrid implementations. When a customer has a hybrid environment where some parts are in the cloud, we need a consistent security solution for such scenarios."
"Usually, we sell the bundle with the UTM or threat management piece with IPS, IDS. Other providers, such as Palo Alto, are ahead in terms of safe functionality. So, for me, delivering truly safe service is probably something that still needs to be improved."
"It needs more available central management."
"The graphical user interface of Fortinet's FortiGate product does not function well with text-based interfaces."
"The biggest "gotcha" is that if the client purchases what they call the UTM shared bundle, which has unified threat management on both, it's not as easy to manage if you have more than one firewall."
"The initial setup and configuration are not intuitive and require training."
"There were quite a few problems with the stability of the system."
"I don't really have anything negative to say as far as Fortinet firewalls are concerned. If anything, they can support a user a little bit better. They can stop being so time-sensitive about how much time the support call has taken, and they can help you do it yourself."
"There are issues with stability and reliability."
"The logging could improve in OPNsense."
"We did not like the fact that you have to configure everything with the graphic user interface. We have used other firewalls, such as FortiGate, that you can configure via code. OPNsense is not easy to integrate. When you are deploying via GitHub or another source repository, this is not possible. That's one thing we didn't like much."
"Its interface should be a little bit better."
"The only thing that I would like to see improved is the Insight or the NetFlow analysis part. It would be good to have the possibility to dig down on the Insight platform. Right now, we can easily do only a few analyses. If this page becomes more powerful, it surely will be a well-adopted platform."
"In terms of improvement, the performance could be enhanced."
"The IPS solution could be more reliable."
"OPNsense showed me some problems when using it in different environments. The problem is integration with a virtual server."
"Palo Alto Networks NG Firewalls work slowly for vulnerability management. Its performance could be faster."
"The biggest thing that needs to be improved with them is their training. I took a training class for the 8.0 build, then I took it again for the 9.0 and 10 builds. They add new features every time that they do a new major release, but the training doesn't keep up. It is the same basic training that probably was with the 3.0 build, and they just change the screenshots. I would love to see them do some more work since they have all these bells and whistles, but we don't know how to use those features on a large scale."
"Palo Alto can do a little bit better when it comes to the User-ID part. I've been facing problems related to double authentication. You have a computer user, but you also have a VPN user, and when you do a single sign-on to another page, these logs can sometimes generate a problem notification. It doesn't happen a lot, but in some networks, it could be a problem. It would be very helpful to have the ability to restrict the connections that you can have in your VPN. For example, if you have the credentials, you can connect with the same user account from different computers or devices. If you have the domain information, you can connect from different devices. That's a problem that they need to address and resolve. They should ensure that at any moment, only one person is connected through a specific user account."
"Maybe they could add some tools and more competing services, like servers, but that would increase the cost of the solution."
"The stability, scalability for enterprise-level organizations, and technical documentation have room for improvement."
"I think visibility can be improved."
"Over the past one or two years, Palo Alto Networks has added a lot of features into the NG Firewall products. I think this is becoming more complicated for our customers. Therefore, we could use some best practices, best practice tools, and implementation guides for some of the complicated features."
"The pricing could be improved. They need to work on the setup over the firewall, VLAN, and PPPoE."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
OPNsense is ranked 3rd in Firewalls with 36 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 162 reviews. OPNsense is rated 8.4, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of OPNsense writes "Robust network security and management offering a user-friendly interface, open-source flexibility, and cost-effectiveness, with challenges regarding initial setup and the absence of official support". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". OPNsense is most compared with Netgate pfSense, Sophos XG, Untangle NG Firewall, Sophos UTM and Sophos XGS, whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Sophos UTM. See our OPNsense vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.