Cette page est affichée en anglais. Une traduction française est en cours.
SkillsMay 6, 2026·3 min de lecture

OPNsense — Open Source Firewall and Routing Platform

A FreeBSD-based open-source firewall and routing platform with a modern web UI, plugin ecosystem, and enterprise features like intrusion detection, VPN, and traffic shaping.

Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Native · 98/100Policy : autoriser
Surface agent
Tout agent MCP/CLI
Type
Skill
Installation
Single
Confiance
Confiance : Established
Point d'entrée
OPNsense Firewall
Commande CLI universelle
npx tokrepo install 423572f3-48e2-11f1-9bc6-00163e2b0d79

Introduction

OPNsense is a FreeBSD-based firewall and routing platform forked from pfSense in 2015. It provides a polished web interface, weekly security updates, and a plugin system covering intrusion detection, VPN, DNS filtering, and traffic shaping — suitable for home labs through enterprise edge deployments.

What OPNsense Does

  • Stateful packet filtering with NAT, port forwarding, and floating rules
  • Runs Suricata-based intrusion detection and prevention (IDS/IPS) with ET and Abuse.ch rulesets
  • Provides VPN connectivity via WireGuard, OpenVPN, and IPsec with GUI configuration
  • Shapes and prioritizes traffic using CoDel, FQ-CoDel, and HFSC queuing disciplines
  • Manages DNS with Unbound resolver, DHCP, and optional DNS-over-TLS/HTTPS forwarding

Architecture Overview

OPNsense runs on HardenedBSD (a security-focused FreeBSD fork) with pf as its packet filter. The web UI is built with PHP (Phalcon MVC framework) and communicates with the backend via a configd service that applies configuration changes to system daemons. Plugins extend functionality through the OPNsense package repository. The configuration is stored as a single XML file, making backup and version control straightforward.

Self-Hosting & Configuration

  • Install from ISO on bare metal (x86-64) or in a VM with at least two network interfaces
  • Complete initial setup via the web wizard: WAN, LAN, DNS, and admin password
  • Configure firewall rules, NAT, and aliases through the Rules section
  • Enable IDS/IPS under Services > Intrusion Detection with one-click ruleset downloads
  • Install plugins (WireGuard, HAProxy, Crowdsec, etc.) from System > Firmware > Plugins

Key Features

  • Weekly security updates and a transparent release process with changelogs
  • Plugin ecosystem with 80+ packages including HAProxy, FRR routing, Crowdsec, and Telegraf
  • Configuration backup and restore from a single XML file
  • Multi-WAN failover and load balancing with gateway groups
  • API access for automation via REST endpoints with key-based authentication

Comparison with Similar Tools

  • pfSense — The project OPNsense forked from; similar features but less frequent updates and a more restrictive license
  • VyOS — Linux-based network OS with CLI-first configuration; no web UI in the free edition
  • MikroTik RouterOS — Proprietary router OS with powerful features; not open source
  • IPFire — Linux-based firewall; simpler feature set, Pakfire package manager
  • Untangle — Commercial firewall with limited free tier; more appliance-focused

FAQ

Q: What hardware does OPNsense support? A: Any x86-64 system with at least 2 GB RAM and two NICs. Popular choices include Protectli, Netgate, and Minisforum mini PCs.

Q: Can OPNsense replace a commercial firewall? A: Yes. It supports enterprise features like HA (CARP), multi-WAN, IDS/IPS, and centralized logging via syslog or Elasticsearch.

Q: How does OPNsense differ from pfSense? A: OPNsense has a more modern UI, weekly security updates, a broader plugin ecosystem, and uses HardenedBSD with ASLR and other mitigations.

Q: Does it support VLANs? A: Yes. Configure 802.1Q VLANs under Interfaces > Other Types > VLAN and assign them to firewall zones.

Sources

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires