In the beginning I also searched for a linux alternative, but for my needs IPfire was not enough.
Best to install opnsense and ipfire in a VM and play around
> Can OPNSense go the pfSense route? As in, can Deciso pull a Netgate and either reserve features or worse close source on certain features?To be fair, you never know, can you? The thing that matters most to me personally is that OPNsense in the way it is distributed to the community is (easily) reproducible from a third party build system with all the sources off GitHub:https://github.com/opnsense/tools#setting-up-a-build-system......So we intend to keep it this way and the community can always fork and continue if we don't. Sort of checks and balances in my opinion where either side can break a promise i.e. community can fork OPNsense and leave us here alone, too.
> openvpn-client-export -- for easy export of VPN server config -- ??Included in core since almost forever. Let me look.... it was March 25, 2015[1]. An API for it was added as well in 2019.
> pfBlockerNg-Devel -- Ad blocking and such -- I might be able to replace this with a pi-hole LXC container on my Proxmox server. Other Ideas are welcome...Michael has done a lot of work to provide feasible plugin alternatives. And, TBH, pfBlockerNg is a great piece of software and it is hard to replace in a singular way on substitute projects.
Interface setup emulation is surely no issue the way you had it in pfSense. This is much harder to do in a new environment like IPFire though.
Let me know if the drive is not detected, but I think a lot happened in between the last try for it to work fine now.
i.e. IPFire will be harder to make it work or will require adjustments to your setup / approach.
On the other hand, IPFire has Linux so there are less hardware issues to worry about and it's a nice distribution aimed a bit lower in scope that pfSense/OPNsense is.
But if it works, it works.
I will have to read up on this a bit more, but from what you are saying, does it mean that even if Deciso or anyone else does make OPNSense closed source in the future, the current code can be easily replicated using a build system and then forked?
But it does mean that in the even that OPNSense is made closed source -- the newly developed features (whatever those may be) -- will not be available unless a new developer/team/company then takes over and starts implementing and maintaining the forked codebase?
Would you be able to elaborate why it would be difficult in IPFire -- Is it only because of Linux vs *BSD or are you alluding to some other issues.
At the risk of repeating my earlier question, is this only because of paradigm differences in Linux vs *BSD or some other ?
2. See https://github.com/opnsense/update#opnsense-bootstrap -- installing FreeBSD 12.1 ZFS and installing OPNsense afterwards. You can even drop the preconfigured config to /conf/config.xml so it'll bootstrap right into the final config. It's not a super-tedious procedure.3. Need more infos on APU4 "fiddly and time consuming", also which OPNsense version (up to 20.1 maybe?) misbehaved. Maybe someone else can share their experience with the box.
I'm new to networking and firewalls but I have some experience with IP Fire and I would advice you to stay away from it, they can hack your IP Fire installation and compromise it, if they don't like you.That is what happened to me and I changed from IP Fire. They didn't like hearing hard truths about firewall distros, so they developed a grudge and hacked my IP Fire installation and made all rules ineffective. I could block access entirely to allow entirely.
I'd be very careful to post such things. It's quite unfair for the distro and may distribute untruths.Why should a community (mostly 2 core devs) putting hours of coding into it do this to someone like you and not everyone?