As pfSense is based on FreeBSD, its hardware compatibility list is the same as FreeBSD's. The pfSense kernel includes all FreeBSD drivers. PfSense 2.5 (FreeBSD 12.2). PfSense is ranked 2nd in Firewalls with 30 reviews while Sophos UTM is ranked 1st in Unified Threat Management (UTM) with 16 reviews. PfSense is rated 8.8, while Sophos UTM is rated 8.4. The top reviewer of pfSense writes 'Feature-rich, well documented, and there is good support available online'. OPNsense includes most of the features available in expensive commercial firewalls.
This is IT industry Visio collections for IT Team easier to download. All of these collection is copyrighted to its respective owner, and is not the property of Techbast.
Some network diagram is made by Techbast, and you can download to use it for free in commercial.
If you need any further information please don’t hesitate contact us at info[a]techbast.com
Stencil Included
If i want to replace pfsense with Sophos can I follow the same instructions you have provided for pfsense creating vlans on the layer 2 switch as well as on the sophos UTM and connect them as a trunk ports. Can you please advise how to create VLANS on sophos if possible. Thank you very much for your help till date mate. Much appreciate it!!! Both pfsense and astaro are running NAT, but aren't behind NAT. I tried playing with that setting in a few different ways. Anytime I change the VPN ID the tunnel dies until I set the peer address to that same IP on the pfsense.
Pfsense Sophos
- Netgate pfSense microFirewall SG-1000
- Netgate pfSense Firewall Appliance SG-2220
- Netgate pfSense Firewall Appliance SG-2440
- Netgate pfSense Security Gateway Appliances SG-3100
- Netgate pfSense Security Gateway Appliances SG-4860
- Netgate pfSense Security Gateway Appliances SG-4860-8860 1U
- Netgate pfSense Security Gateway Appliances SG-5100
- Netgate pfSense Security Gateway Appliances SG-8860 1U
- Netgate pfSense Security Gateway Appliances XG-1537 1U
- Netgate pfSense Security Gateway Appliances XG-1541 1U
- Netgate pfSense Security Gateway Appliances XG-2758 1U
- Netgate pfSense Security Gateway Appliances XG-7100 1U
- Netgate pfSense Security Gateway Appliances XG-7100
- Netgate pfSense microFirewall SG-1000
Screenshot
pfSense Appliance Guidance
The following outlines the best practices for choosing the appliance best suitable for your environment.
Feature Considerations
Most features do not factor into hardware sizing, although a few will have a significant impact on hardware utilization:
Sophos Utm Pfsense
VPN - Heavy use of any of the VPN services included in the pfSense software will increase CPU requirements. Encrypting and decrypting traffic is CPU intensive. The number of connections is much less of a concern than the throughput required. AES-NI acceleration of IPsec significantly reduces CPU requirements on platforms that support it.
Pfsense Sophos Vpn
Captive Portal - While the primary concern is typically throughput, environments with hundreds of simultaneous captive portal users (of which there are many) will require slightly more CPU power than recommended above.
Pfsense Sophos Xg Ipsec
Large State Tables - State table entries require about 1 KB of RAM each. The default state table size is calculated based on 10% of the available RAM in the firewall. For example, a firewall with 1 GB of RAM will default to 100,000 states which when full would use about 100 MB of RAM. For large environments requiring state tables with several hundred thousand connections, or millions of connections, ensure adequate RAM is available.
Packages - Some of the packages increase RAM requirements significantly. Snort and ntop are two that should not be installed on a system with less than 1GB RAM.