OPNsense 19.7.2 released, FreeBSD based firewall and routing platform


OPNsense is an open source, easy-to-use and easy-to-build FreeBSD based firewall and routing platform. OPNsense includes most of the features available in expensive commercial firewalls, and more in many cases. It brings the rich feature set of commercial offerings with the benefits of open and verifiable sources.

OPNsense started as a fork of pfSense® and m0n0wall in 2014, with its first official release in January 2015. The project has evolved very quickly while still retaining  familiar aspects of both m0n0wall and pfSense. A strong focus on security and code quality drives the development of the project.

OPNsense offers weekly security updates with small increments to react on new emerging threats within in a fashionable time.  A fixed release cycle of 2 major releases each year offers businesses the opportunity to plan upgrades ahead. For each major release a roadmap is put in place to guide development and set out clear goals.


  • Dashboard
    OPNsense offers a dashboard feature to quickly check the status of your OPNsense Firewall.Shown is the latest version with drag and drop multi collumn support.
  • Modern User Interface
  • Stateful Firewall
  • Aliases & GeoLite Country Database
  • Traffic Shaper
  • Two-factor authentication
    Supported 2FA services include:

    • OPNsense Graphical User Interface
    • Captive Portal
    • Virtual Private Networking – OpenVPN & IPsec
    • Caching Proxy
    • OPNsense Captive Portal
  • Captive Portal
  • Virtual Private Network – IPsec & OpenVPN GUI
  • High Availability / Hardware Failover (CARP)
  • Caching Proxy
  • Intrusion Detection & Prevention
  • Integrated support for ET Open rules.
  • Integrated SSL Blacklist (SSLBL)
  • Intergrated Feodo Tracker
  • SSL Finger Printing
  • Backup & Restore
  • Reporting & Monitoring
  • Firmware & Plugins
  • Free Up-to-Date Online Manual


Changelog OPNsense 19.7.2

o system: missing “” in legacy output via Syslog-ng
o system: fix writing gateway information for DNS servers
o system: allow gateway to work in DHCPv6 WAN when no router solicitation is available
o firewall: unhide automatic interface-based output rules
o firewall: unhide automatic non-interface-based floating rules
o firewall: lift length restriction in NAT rule description
o firewall: avoid newlines in rule descriptions
o firewall: only show usable addresses in NAT outbound rules
o interfaces: fix extended CARP output when parsing interface information
o interfaces: add more outputs to overview page to increase usefulness
o interfaces: use shared DHCP lease reader for ARP list
o captive portal: fix binary read issue in Python 3
o dhcp: fix DHCPv4 relay interface selection (contributed by jayantsahtoe)
o firmware: handle file signature verify correctly with multiple fingerprint repositories
o firmware: Aivian mirror is no longer active
o firmware: Cloudfence mirror in Brazil added
o plugins: os-acme-client 1.24[1]
o plugins: os-bind 1.6 (contributed by crazy-max)
o plugins: os-dnscrypt-proxy 1.5 (contributed by crazy-max)
o plugins: os-grid_example 1.0[2]
o plugins: os-helloworld Python 3 compatibility[3]
o plugins: os-nut 1.5 adds Riello driver (contributed by Michael Muenz)
o plugins: os-sunnyvalley 1.0[4][5]
o src: fix panic from Intel CPU vulnerability mitigation[6]
o src: fix multiple telnet client vulnerabilities[7]
o src: fix pts write-after-free[8]
o src: fix kernel memory disclosure in freebsd32_ioctl[9]
o src: fix reference count overflow in mqueuefs[10]
o src: fix byhve out-of-bounds read in XHCI device[11]
o src: fix file descriptor reference count leak[12]
o ports: libevent 2.1.11[13]