OPNsense is an open source, easy-to-use and easy-to-build FreeBSD based firewall and routing platform. OPNsense includes most of the features available in expensive commercial firewalls, and more in many cases. It brings the rich feature set of commercial offerings with the benefits of open and verifiable sources.
OPNsense started as a fork of pfSense® and m0n0wall in 2014, with its first official release in January 2015. The project has evolved very quickly while still retaining familiar aspects of both m0n0wall and pfSense. A strong focus on security and code quality drives the development of the project.
OPNsense offers weekly security updates with small increments to react on new emerging threats within in a fashionable time. A fixed release cycle of 2 major releases each year offers businesses the opportunity to plan upgrades ahead. For each major release a roadmap is put in place to guide development and set out clear goals.
OPNsense offers a dashboard feature to quickly check the status of your OPNsense Firewall.Shown is the latest version with drag and drop multi collumn support.
- Modern User Interface
The modern user interface offers a great user experience with multi language support, build-in help and quick naviagtion with the searchbox.
Shown is the fast search navigation option.
- Stateful Firewall
A stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. OPNsense offers grouping of Firewall Rules by Category, a great feature for more demanding network setups.
- Aliases & GeoLite Country Database
Managing firewall rules have never been this easy. By using Aliases you can group mulitple IP’s or Host into one list, to be used in firewall rules. Additionally IP or Hostnames can be fetched from external URLs, examples are DROP (Do Not Route Or Peer), Abuse.ch’s Ransomware tracker and the build-in Maxmind GeoLite2 Country database.
- Traffic Shaper
Traffic shaping within OPNsense is very flexible and is organised around pipes, queues and corresponding rules. The pipes define the allowed bandwidth, the queues can be used to set a weight within the pipe and finally the rules are used to apply the shaping to a certain package flow. The shaping rules are handled independently from the firewall rules and other settings.
- Two-factor authentication
Two-factor authentication also known as 2FA or 2-Step Verification is an authentication method that requires two components, such as a pin/password + a token. OPNsense offers full support for Two-factor authentication ( 2FA ) throughout the entire system utilizing Google Authenticator.
Supported 2FA services include:
- OPNsense Graphical User Interface
- Captive Portal
- Virtual Private Networking – OpenVPN & IPsec
- Caching Proxy
- OPNsense Captive Portal
- Captive Portal
Captive Portal allows you to force authentication, or redirection to a click through page for network access. This is commonly used on hot spot networks, but is also widely used in corporate networks for an additional layer of security on wireless or Internet access.OPNsense offer most enterprise features including Radius and voucher support.
- Virtual Private Network – IPsec & OpenVPN GUI
OPNsense offers a wide range of VPN technologies ranging from modern SSL VPN’s to well known IPsec as well as older (now considered insecure) legacy options such as L2TP and PPTP. Site-to-Site and road warrior setups are possible and with the integrated OpenVPN client exporter, the client can be configured within minutes. Looking for a IPsec or OpenVPN GUI, you just found something better!
- High Availability / Hardware Failover (CARP)
OPNsense utilises the Common Address Redundancy Protocol or CARP for hardware failover. Two or more firewalls can be configured as a failover group. If one interface fails on the primary or the primary goes offline entirely, the secondary becomes active. Utilising this powerful feature of OPNsense creates a fully redundant firewall with automatic and seamless fail-over. While switching to the backup network connections will stay active with minimal interruption for the users.
- Caching Proxy
The caching proxy offered by OPNsense is fully featured and includes category based webfiltering, extensive Access Control Lists and can run in transparent mode. The proxy can be combined with the traffic shaper to enhance user experience. Integration with most professional Anti-Virus solutions is possble trough the ICAP interface.
- Intrusion Detection & Prevention
The inline IPS system of OPNsense is based on Suricata and utilises Netmap to enhance performance and minimize cpu utilisation. This deep packet inspection system is very powerful and can be used to mitigate security threats at wire speed.
- Integrated support for ET Open rules.
The ETOpen Ruleset is an excellent anti-malware IDS/IPS ruleset that enables users with cost constraints to significantly enhance their existing network-based malware detection.
- Integrated SSL Blacklist (SSLBL)
A project maintained by abuse.ch. The goal is to provide a list of “bad” SSL certificates identified by abuse.ch to be associated with malware or botnet activities. SSLBL relies on SHA1 fingerprints of malicious SSL certificates and offers various blacklists.
- Intergrated Feodo Tracker
Feodo (also known as Cridex or Bugat) is a Trojan used to commit ebanking fraud and steal sensitive information from the victims computer, such as credit card details or credentials. At the moment, Feodo Tracker is tracking four versions of Feodo.
- SSL Finger Printing
The IPS option to allow user defined rules include the option for SSL fingerprinting. With this option SSL communication can be blocked at the inital connection attempt by dropping the SSL key exchange.
- Backup & Restore
Better safe than sorry, always keep an up to date backup of your configuration. It’s easy with OPNsense.
Automatic backups of configuration changes make it possible to review history and restore previous settings.
Easily download a backup from within the GUI and store on a safe place.
Encrypt the backup with a strong password and make plain text unreadable for unauthorised persons.
Upload your configuration backup file and restore it with ease.
- Cloud Backup
OPNsense supports encrypted cloud backup of your configuration with the option to keep backups of older files (history). For this purpose Google drive support has been integrated into the user interface.
- Reporting & Monitoring
OPNsense offers many options for reporting and monitoring the system, these include:
- System Health
A modern take on RRD graphs with the option to zoom in and export data.
- Netflow Exporter
Use your favorite netflow analyser to see most active users, interfaces, ports & applications.
- Insight – Intergrated Netflow Analyser
OPNsense also offers an integrated Netflow analyser without the need for additional plugins or tools, similar to what you may find in high-end commercial products.
- Firmware & Plugins
Offering a robust firmware upgrade path to react on emerging threats in a fashionable time; OPNsense is equipped with a reliable and secure update mechanism to provide weekly security updates. A plugin mechanism can be used to install additional packages and customisations.
- Free Up-to-Date Online Manual
Our online documentation is completely searchable, up-to-date and offered for free. Features are explained in detail and examples are provided in the form of how-to’s , making configuring OPNsense as simple as possible. And if you are a developer than you’ll find all about our framework, coding guidelines and hello-world pugin well organised in the Developers section. See docs.opnsense.org.
Changelog OPNsense 19.1.1
This is a security and reliability release: WAN DHCP will no longer trust
the server MTU given. Uncoordinated cross site scripting issues have been
fixed. And the Python request library was patched due to CVE 2018-18074.
Here are the full patch notes:
o system: address XSS-prone escaping issues
o firewall: add port range validation to shaper inputs
o firewall: drop description validation constraints
o interfaces: DHCP override MTU option (contributed by Team Rebellion)
o interfaces: properly configure SIM PIN on custom modems
o reporting: prevent cleanup from deleting current data when future data exists
o ipsec: allow same local subnet if used in different phase 1 (contributed by Max Weller)
o openvpn: multiple client export fixes
o web proxy: add ESD files to Windows cache option (contributed by R-Adrian)
o plugins: os-acme-client 1.20
o plugins: os-dyndns fix for themed colours (contributed by Team Rebellion)
o plugins: os-etpro-telemetry 1.1 adds random delay to telemetry data send
o plugins: os-nginx 1.7
o plugins: os-rspamd reads DKIM keys via Redis (contributed by Garrod Alwood)
o plugins: os-theme-cicada 1.14 (contributed by Team Rebellion)
o plugins: os-theme-tukan 1.13 (contributed by Team Rebellion)
o ports: ca_root_nss 3.42.1
o ports: lighttpd 1.4.53
o ports: py-request 2.21.0