Talk:PfSense

{{Old AfD multi | date = 20 July 2015 | result = keep | page = PfSense}}

{{WikiProject banner shell|class=Start|

{{WikiProject Computing |importance=low |software=yes |software-importance=Low |security=y |security-importance=Low}}

}}

{{COI editnotice}}

{{Connected contributor (paid)

|User1=Gonzopancho |U1-employer=Netgate |U1-EH=yes |U1-otherlinks=Employment disclosed here.

}}

OPNsense

Mention the fork OPNsense and the ongoing controversy about pfSense not being actually free software (not all the source code is available). — Preceding unsigned comment added by 193.144.103.218 (talkcontribs) 09:42, 30 November 2017 (UTC)

seconded. this is not open source as pfsense cannot be built from source out of the repos. — Preceding unsigned comment added by 2603:8001:6B00:833:9EED:986D:5A4A:1744 (talk) 04:11, 26 January 2021 (UTC)

:Here someone appears to have collected evidence on this: https://github.com/rapi3/pfsense-is-closed-source. Someone should have a critical look at this, other sources and/or try to build pfSense. If and when the evidence is deemed credible, the article should be changed. Hulten (talk) 12:35, 26 January 2021 (UTC)

::Agreed, pfSense is not open source - the source code cannot be reproducibly built outside of the owning organization. I'm not a master on Wikipedia policies but I urge someone who is to review the above linked repository and consider removing "open source" from the article as it's very disingenuous. Also, be prepared for a wave of edits as this is breaking on hackernews. 2003:EC:371C:5700:35CB:F105:A8EC:AE12 (talk) — Preceding undated comment added 16:12, 26 January 2021 (UTC)

:::They recently launched a closed source branch called pfSense Plus which I have updated the article to reflect. The closed source github keeps being removed due to complaints but is valid to my knowledge; I'm not sure how that should be noted given that the majority of the code remains open source even if it can't be built.Cyrix2k (talk) 02:16, 13 March 2021 (UTC)

2013 note

It might be a good idea to organize popular packages into a table rather than a list — Preceding unsigned comment added by 216.114.236.63 (talk) 19:34, 4 September 2013 (UTC)

Question

Can anyone shed further light on the reasons why this page is being considered for deletion?Jenglish02 (talk) 05:08, 6 August 2015 (UTC)

PfSense website content

Moved here from the article. This is unsourced and is content for the product website. WP is not a proxy for their website.

;Hardware requirements

pfSense 2.1 through 2.3 has low minimum system requirements (for example 256 MB RAM and 500 MHz CPU){{cite web | url = https://www.pfsense.org/hardware/#requirements | accessdate = 5 August 2015 | publisher = Electric Sheep Fencing LLC | title = Hardware}} and can be installed on hardware with x86 or x86-64 architecture. Since 2.4, pfSense requires the x86-64 architecture, ending support for 32-bit installations.{{cite web | url = https://doc.pfsense.org/index.php/Does_pfSense_support_64_bit_systems | accessdate = 7 May 2017 | publisher = Electric Sheep Fencing LLC | title = 64-bit support}} Starting with 2.5, plans are to require cryptographic hardware acceleration, such as AES-NI.{{cite web | url = https://www.netgate.com/blog/pfsense-2-5-and-aes-ni.html | accessdate = 25 September 2017 | publisher = Electric Sheep Fencing LLC | title = pfSense 2.5 and AES-NI}} It is also available for embedded system hardware using Compact Flash or SD cards. pfSense also supports virtualized installation.

;Features

class=wikitable style="font-size:90%"
Install, update, packages, management* ISO CD and USB stick installer images (VGA and serial console variants) are available. NanoBSD/embedded installs supported with 2.3.x only.

  • Packaged support for extensions (see "Packages support" below)
  • Multi-language
  • Console, web-based GUI, SSH (if enabled) and serial management
  • RRD graphs reporting
  • Traffic shaping and filtering
  • Real-time information using Ajax
Functionality and connectivity* Virtual Private Networks using IPsec, L2TP, or OpenVPN
  • PPPoE server
  • High availability clustering; redundancy and failover including CARP and pfsync
  • Outbound and inbound load balancing
  • Quality of Service (QoS)
  • Dynamic DNS
  • Captive portal
  • uPnP
  • Multi-WAN
  • VLAN (802.1q)
  • DHCP server and relay
  • IPv6 support
  • Multiple public IP addresses/multi-NAT
  • RADIUS/LDAP
  • Multiple resolvers (DNS forwarder, Unbound, TinyDNS, other)
  • Aliases supported for rules, IP addresses, ports, computers, and other entities
  • Firewall and routing* Stateful firewall
  • Network Address Translation
  • Filtering by source/destination IP address, protocol, OS/network fingerprinting
  • Flexible routing
  • It is also used as a Proxy Detection service. [https://www.staminus.com.tr/yazi/staminus-web-proxy-vpn-blocker source] — Preceding unsigned comment added by 46.2.169.255 (talk) 18:59, 21 March 2024 (UTC)
  • Per-rule configurable logging and per-rule limiters (IP addresses, connections, states, new connections, state types), Layer 7 protocol inspection, policy filtering (or packet marking), TCP flag state filtering, scheduling, gateway
  • Packet scrubbing
  • Layer 2/bridging capable
  • State table "up to several hundred thousand" states (1 KB RAM per state approx)
  • State table algorithms customizable including low latency and low-dropout
  • Packages supportPackages available with GUI install and configuration, among others:
  • Snort Intrusion detection and prevention
  • Suricata Intrusion detection and prevention
  • [https://forum.pfsense.org/index.php?topic=86212.0 pfBlockerNG]
  • OpenBGPD
  • FRR
  • HAProxy
  • Squid caching and reverse proxy with SquidGuard and ClamAV
  • FreeRADIUS
  • ntopNG
  • nmap
  • multiple monitoring and statistics packages (Darkstat, Zabbix Agent/Proxy, softflowd)
  • ;Version history

    {{Collapse top|Version history}}

    class="wikitable"
    Version

    ! Release date

    ! Significant changes

    1.0

    | October 4, 2006

    |

    • The first official release.
    1.0.1{{cite web|url=//www.netgate.com/blog/101-released.html|title=1.0.1-RELEASED!|first=Scott|last=Ullrich|date=October 29, 2006|work=pfSense Digest}}

    | October 29, 2006

    |

    • Bug fixes
    1.2{{cite web|url=//www.netgate.com/blog/12-beta-1-released.html|title=1.2-BETA-1 released!|first=Scott|last=Ullrich|date=April 29, 2007|work=pfSense Digest}}{{cite web|url=//www.netgate.com/blog/12-beta-1-released.html|title=1.2 Release Available!|first=Chris|last=Buechler|date=February 25, 2008|work=pfSense Digest}}

    | February 25, 2008

    |

    • FreeBSD updated to 6.2
    • Reworked load balancing pools which allow for round robin or failover
    • Miniupnpd added to the base install
    • Much enhanced RRD graphs
    • Numerous Squid Package fixes
    • dnsmasq updated to 2.36
    • olsrd updated to 0.4.10
    • BandwidthD package added
    • PHP upgraded to 4.4.6
    • Lighttpd upgraded to 1.4.15
    • Numerous Bug fixes
    1.2.1{{cite web|url=//www.netgate.com/blog/pfsense-121-released.html|title=pfSense 1.2.1 released!|first=Chris|last=Buechler|date=December 26, 2008|work=pfSense Digest}}

    | December 26, 2008

    |

    • FreeBSD updated to 7.0
    • Bug fixes
    1.2.2{{cite web|url=http://www.netgate.com/blog/pfsense-122-released.html|title=pfSense 1.2.2 released!|first=Chris|last=Buechler|date=January 9, 2009|work=pfSense Digest}}

    | January 9, 2009

    |

    • Setup wizard fix
    • SVG graphs fixed
    • (IPsec reload fix specific to large (100+ site) deployments
    • Bridge creation code changes
    • FreeBSD updates for two security advisories
    1.2.3{{cite web|url=http://www.netgate.com/blog/1-2-3-release-available.html|title=pfSense 1.2.3 released!|first=Chris|last=Buechler|date=December 10, 2009|work=pfSense Digest}}

    | December 10, 2009

    |

    • Upgrade to FreeBSD 7.2
    • Embedded switched to nanobsd
    • Dynamic interface bridging bug fix
    • IPsec connection reloading improvements
    • Dynamic site to site IPsec
    • Sticky connections enable/disable
    • Ability to delete DHCP leases
    • Polling fixed
    • ipfw state table size
    • Server load balancing
    • UDP state timeout increases
    • Disable auto-added VPN rules option
    • Multiple servers per-domain in DNS forwarder overrides
    • No XMLRPC Sync rules fixed
    • Captive portal locking replaced
    • DNS Forwarder
    • Outbound load balancer replaced
    2.0

    | September 17, 2011

    |

    • Upgrade to FreeBSD 8.1
    • [https://doc.pfsense.org/index.php/2.0_New_Features_and_Changes Significant enhancements to almost every portion of the system (Full Change log)]
    2.0.1{{cite web|url=//www.netgate.com/blog/2-0-1-release-now-available.html|title=2.0.1 release now available!|first=Chris|last=Buechler|date=December 20, 2011|work=pfSense Digest}}

    | December 20, 2011

    |

    • Improved accuracy of automated state killing in various cases (#1421)
    • Various fixes and improvements to relayd
    • Fixed path to FreeBSD packages repo for 8.1
    • Various fixes to syslog
    • Removed/silenced some irrelevant log entries
    • Fixed various typos
    • Fixes for RRD upgrade/migration and backup (#1758)
    • Prevent users from applying NAT to CARP which would break CARP in various ways (#1954)
    • Fixed policy route negation for VPN networks (#1950)
    • Fixed “Bypass firewall rules for traffic on the same interface” (#1950)
    • Fixed VoIP rules produced by the traffic shaper wizard (#1948)
    • Fixed uname display in System Info widget (#1960)
    • Fixed LDAP custom port handling
    • Fixed Status > Gateways to show RTT and loss like the widget
    • Improved certificate handling in OpenVPN to restrict certificate chaining to a specified depth – CVE-2011-4197
    • Improved certificate generation to specify/enforce type of certificate (CA, Server, Client) – CVE-2011-4197
    • Clarified text of serial field when importing a CA (#2031)
    • Fixed MTU setting on upgrade from 1.2.3, now upgrades properly as MSS adjustment (#1886)
    • Fixed Captive Portal MAC passthrough rules (#1976)
    • Added tab under Diagnostics > States to view/clear the source tracking table if sticky is enabled
    • Fixed CARP status widget to properly show “disabled” status.
    • Fixed end time of custom timespan RRD graphs (#1990)
    • Fixed situation where certain NICs would constantly cycle link with MAC spoofing and DHCP (#1572)
    • Fixed OpenVPN ordering of client/server IPs in Client-Specific Override entries (#2004)
    • Fixed handling of OpenVPN client bandwidth limit option
    • Fixed handling of LDAP certificates (#2018, #1052, #1927)
    • Enforce validity of RRD graph style
    • Fixed crash/panic handling so it will do textdumps and reboot for all, and not drop to a db> prompt.
    • Fixed handling of hostnames in DHCP that start with a number (#2020)
    • Fixed saving of multiple dynamic gateways (#1993)
    • Fixed handling of routing with unmonitored gateways
    • Fixed Firewall > Shaper, By Queues view
    • Fixed handling of spd.conf with no phase 2’s defined
    • Fixed synchronization of various sections that were leaving the last item on the slave (IPsec phase 1, Aliases, VIPs, etc.)
    • Fixed use of quick on internal DHCP rules so DHCP traffic is allowed properly (#2041)
    • Updated ISC DHCP server to 4.2.3 (#1888) – this fixes a denial of service vulnerability in dhcpd.
    • Added patch to mpd to allow multiple PPPoE connections with the same remote gateway
    • Lowered size of CF images to again fix on newer and ever-shrinking CF cards.
    • Clarified text for media selection (#1910)
    2.0.2{{cite web|url=//www.netgate.com/blog/2-0-2-release-now-available.html|title=2.0.2 release now available!|first=Chris|last=Buechler|date=December 21, 2012|work=pfSense Digest}}

    | December 21, 2012

    |

    • Bug fixes
    • Security fixes
    2.0.3{{cite web|url=//www.netgate.com/blog/2-0-3-release-now-available.html|title=2.0.3 release now available!|first=Chris|last=Buechler|date=April 15, 2013|work=pfSense Digest}}

    | April 15, 2013

    |

    • Bug fixes
    • Security fixes
    2.1

    | September 15, 2013

    |

    • IPv6 Support
    • Upgrade to FreeBSD 8.3
    • Updated Atheros drivers
    • OpenSSL 1.0.1e (or later) used by OpenVPN, PHP, IPsec, etc.
    • PHP to 5.3.x
    • OpenVPN to 2.3.x
    • Added mps kernel module
    • Added ahci kernel module
    • Updated ixgbe driver
    • Numerous Bug fixes
    • Security fixes
    2.1.1{{cite web|url=//www.netgate.com/blog/2-1-1-release-now-available.html|title=2.1.1-RELEASE now available|first=Jim|last=Thompson|date=April 4, 2014|work=pfSense Digest}}

    | April 4, 2014

    |

    • Security fixes
    2.1.2{{cite web|url=//www.netgate.com/blog/2-1-2-release-now-available.html|title=2.1.2 Release Now available|first=Jim|last=Thompson|date=April 10, 2014|work=pfSense Digest}}

    | April 10, 2014

    |

    • Heartbleed OpenSSL Security fixes
    • Bug fixes
    2.1.3{{cite web|url=//www.netgate.com/blog/2-1-3-release-now-available.html|title=2.1.3 RELEASE Now available|first=Jared|last=Dillard|date=May 2, 2014|work=pfSense Digest}}

    | May 2, 2014

    |

    • Security fixes
    • Bug fixes
    2.1.4{{cite web|url=//www.netgate.com/blog/2-1-4-release-now-available.html|title=2.1.4 RELEASE Now available|first=Jared|last=Dillard|date=June 25, 2014|work=pfSense Digest}}

    | June 25, 2014

    |

    • Security fixes
    • Bug fixes
    2.1.5{{cite web|url=//www.netgate.com/blog/2-1-5-release-now-available.html|title=2.1.5 RELEASE Now available|first=Jared|last=Dillard|date=August 27, 2014|work=pfSense Digest}}

    | August 27, 2014

    |

    • Security fixes
    • Bug fixes
    2.2

    | January 23, 2015

    |

    • Upgrade to FreeBSD 10.1
    • Update the IPsec stack to include AES-GCM, and IKEv2
    • Update PHP backend from FastCGI to PHP-FPM
    • Update PHP to 5.5
    • Change from dnsmasq to the Unbound DNS Resolver
    • Numerous Bug Fixes
    2.2.1{{cite web|url=//www.netgate.com/blog/2-2-1-release-now-available.html|title=2.2.1 RELEASE Now available|first=Chris|last=Buechler|date=March 17, 2015|work=pfSense Digest|accessdate=13 April 2015}}

    | March 17, 2015

    |

    • Security fixes
    • Bug fixes
    2.2.2{{cite web|url=//www.netgate.com/blog/2-2-2-release-now-available.html|title=2.2.2 RELEASE Now available!|first=Chris|last=Buechler|date=April 15, 2015|work=pfSense Digest|accessdate=15 April 2015}}

    | April 15, 2015

    |

    • Security fixes
    • Bug fixes
    2.2.3{{cite web|url=//www.netgate.com/blog/2-2-3-release-now-available.html|title=2.2.3 RELEASE Now available!|first=Chris|last=Buechler|date=June 25, 2015|work=pfSense Digest|accessdate=7 July 2015}}

    | June 25, 2015

    |

    • Security fixes
    • Bug fixes
    2.2.4{{cite web|url=//www.netgate.com/blog/2-2-4-release-now-available.html|title=2.2.4 RELEASE Now available!|first=Chris|last=Buechler|date=July 27, 2015|work=pfSense Digest|accessdate=27 July 2015}}

    | July 27, 2015

    |

    • Security fixes
    • Bug fixes
    2.2.5{{cite web|url=//www.netgate.com/blog/2-2-5-release-now-available.html|title=2.2.5 RELEASE Now available!|first=Chris|last=Buechler|date=November 5, 2015|work=pfSense Digest|accessdate=1 December 2015}}

    | November 5, 2015

    |

    • Security fixes
    • Bug fixes
    2.2.6{{cite web|url=//www.netgate.com/blog/2-2-6-release-now-available.html|title=2.2.6-RELEASE Now available!|first=Chris|last=Buechler|date=December 21, 2015|work=pfSense Digest|accessdate=1 December 2015}}

    | December 21, 2015

    |

    • Security fixes
    • Bug fixes
    2.3

    | April 12, 2016

    |

    • Upgrade to FreeBSD 10.3
    • Rewrite of the webGUI utilizing Bootstrap
    • Numerous Bug Fixes
    2.3.1 {{cite web|url=//www.netgate.com/blog/pfsense-2-3-1-release-now-available.html|title=2.3.1-RELEASE Now available!|first=Chris|last=Buechler|date=May 18, 2016|work=pfSense Digest|accessdate=18 May 2016}}

    | May 18, 2016

    |

    • Security fixes
    • Bug fixes
    2.3.2 {{cite web|url=//www.netgate.com/blog/pfsense-2-3-2-release-now-available.html|title=2.3.2-RELEASE Now available!|first=Chris|last=Buechler|date=July 25, 2016|work=pfSense Digest|accessdate=25 July 2016}}

    | July 25, 2016

    |

    • Security fixes
    • Bug fixes
    2.3.3 {{cite web|url=//www.netgate.com/blog/pfsense-233-release-now-available.html|title=pfSense 2.3.3 RELEASE Now Available!|first=Jim|last=Pingle|date=February 20, 2017|work=pfSense Digest|accessdate=20 February 2017}}

    | February 20, 2017

    |

    • Stability and Bug fixes
    • Fixes for a handful of security issues in the GUI
    • A handful of new features
    2.3.4 {{cite web|url=//www.netgate.com/blog/pfsense-2-3-4-release-now-available.html|title=pfSense 2.3.4 RELEASE Now Available!|first=Jim|last=Pingle|date=May 4, 2017|work=Netgate Blog|accessdate=4 May 2017}}

    | May 4, 2017

    |

    • Stability and Bug fixes
    • Fixes for a handful of security issues in the GUI
    • A handful of new features
    2.4.0 {{cite web|url=//www.netgate.com/blog/pfsense-2-4-0-release-now-available.html|title=pfSense 2.4.0-RELEASE Now Available!|first=Jim|last=Pingle|date=Oct 12, 2017|work=pfSense Digest|accessdate=12 Oct 2017}}

    | Oct 12, 2017

    |

    • FreeBSD updated to 11.1
    • New pfSense installer with support for ZFS, UEFI, and other partition layouts
    • OpenVPN 2.4.x support
    • GUI offers 13 different languages
    • Web GUI improvements
    • Certificate management improvements
    • Captive portal rewritten to include CSR signing and international character support
    Version

    ! Release date

    ! Significant changes

    {{Collapse bottom}}

    {{reflist-talk}}

    -- Jytdog (talk) 00:23, 30 November 2017 (UTC)

    Ownership

    Looking for independent sources on the companies that have been involved in this - Electric Sheep Fencing LLC then Rubicon/Netgate. The business matters around this. Jytdog (talk) 14:49, 30 November 2017 (UTC)

    Removal of content

    User:Gonzopancho please explain why you are removing the content about the WTO matter. Thanks. Jytdog (talk) 17:29, 13 July 2018 (UTC)

    :how on earth does the WIPO matter have anything to do with pfSense (other than to simply promote OPNsense on pfSense wikipedia page?) --Gonzopancho (talk) 17:38, 13 July 2018 (UTC)

    ::This is something that the company actually did. You need to explain why you removed it. Jytdog (talk) 21:29, 13 July 2018 (UTC)

    :::Regardless of the truth of dispute, the paragraph on OPNsense does not belong on the pfsense page as has nothing to do with the open source firewall/router software distribution itself, which is what this article is for. This paragraph would be more appropriately moved to the wiki page for Rubicon Communications, LLC or Netgate, who are the companies involved in this dispute. Furthermore, Wikipedia is not the place for companies to get revenge and to bring up every cases that a company has lost against another. The WIPO case is public and people can find it. If the Decisio or the OPNsense developers fell upset about past events, they can mention such on their website and user forums. Wikipedia is not the place to carry on this argument. Full disclosure: I am not affiliated with either company or software project, but I don't appreciate the negativity that this paragraph brings and the lack of value it provides about helping someone learn about pfsense the firewall/router product. Ice Ardor (talk) 04:00, 24 April 2020 (UTC)

    :::* I'm reverting and reinstating the content (but editing for brevity).

    :::* Also: including material in parent or child articles is standard practice (e.g. Tor (anonymity network)#Tor Browser). Since there is no Negate parent article, such material would belong here (preferably under it's own section heading, for the time being). All are encouraged to boldly create such an article, however.

    :::* WP:IDONTLIKEIT isn't a valid rationale. Nothing "negative" about it either way (it's rather dry, to be honest), and it passes the WP:NPOV test. -- dsprc [talk] 23:40, 25 November 2020 (UTC)

    ::::* I'm again reverting changes made by Ice Ardor as the stated reason of the information being off topic is not the case. As Jytdog pointed out it is something the company actually did. The Netgate page is now a redirect to the pfSense page and therefore any material that would have been included in the Netgate page, that is notable and regards pfSense, should now live here.

    ::::* I further concur that the wording of the paragraph about the WIPO case is "dry" or to put it in more WP terms, neutral. It describes events that took place, no more, no less. It is WP:NPOV.

    ::::* I will also note that such a neutral recounting of facts does not seem to reasonably constitute the carrying on of this argument. Merely that it is being documented as a notable event in this software's history something that would seem to fall well within the bounds of Wikipedia's mission.Generically Named (talk) 11:25, 11 October 2024 (UTC)

    ::::* I have however made the OPNsense section more distinct along with the Wireguard section to ensure clarity. The WIPO case information did not fit in its original location as part of the overview. Generically Named (talk) 11:33, 11 October 2024 (UTC)

    Why no mention of Netgate?

    Why are there no mention of Netgate trying to hurt OPNsense by spreading lies on the Netgate owned domain opnsense.com? — Preceding unsigned comment added by Dustie (talkcontribs) 02:33, 5 November 2020 (UTC)

    Semi-protected edit request on 4 September 2020

    {{edit semi-protected|PfSense|answered=yes}}

    Preview REleases on daily basis

    https://snapshots.pfsense.org/amd64/pfSense_master/installer/ 92.117.174.218 (talk) 10:48, 4 September 2020 (UTC)

    :We usually don't include links like these. – Thjarkur (talk) 13:29, 4 September 2020 (UTC)

    ::The note in the sidebar says that the last 2.5.0 release was over a year ago, which is incorrect and should be updated; right now, the oldest snapshot available via that link is from 02 January 2021. 71.237.199.9 (talk) 23:50, 9 January 2021 (UTC)

    New release

    Now up to version 2.5.1 210.54.90.224 (talk) 01:52, 14 April 2021 (UTC)

    Discussion of reverts

    {{ping|Dashmix}} {{ping|Cyrix2k}} Please discuss your reasoning for the edits you've made here so that we can reach an agreement and not engage in an edit war. Blaze The Wolf | Proud Furry and Wikipedia Editor (talk) (Stupidity by me) 16:01, 10 September 2021 (UTC)

    :{{ping|Cyrix2k}}, You are reverting only the edits pertaining to OPNsense on the page of pfSense. This clearly indicates that you have some vested interest in OPNsense. It appears you are an advocate for OPNsense and is intent on having the pfSense page be an extension of your feelings toward Netgate, rather than fairly and objectively progressing an unbiased history of pfSense software.

    I have restored my edits. Reasoning for my edits:

    • pfSense is completely open source and not partially open source - the gnid source code is not needed to build the pfSense source code.
    • In 2014, a competing open source firewall and routing software project, OPNsense, was forked from pfsense, with the first official release in Jan 2015. Both pfsense and OPNsense are under active development, while the original m0n0wall project has been discontinued - I had removed this line because it looks like self-promotion done by OPNsense as the citation was OPNsense’s own website which does not meet WP:CITE, WP:RS
    • In November 2017, a World Intellectual Property Organization panel found Netgate, the copyright holder of pfSense, utilized OPNsense' trademarks in bad faith to discredit OPNsense, and obligated Netgate to transfer ownership of a domain name to Deciso - I had removed this because - Netgate is not the copyright holder of PfSense, the official website states that states that ‘pfSense software is Copyright 2004-2021 Electric Sheep Fencing, LLC.’ and ‘pfSense is a federally registered trademark of Electric Sheep Fencing, LLC.’ — Preceding unsigned comment added by Dashmix (talkcontribs) 16:14, 10 September 2021 (UTC)

    :: Foremost: focus on content, not contributors, WP:CIV, WP:AGF, and all that jazz…

    :: Further: line on partial, proprietary components was sourced – we'll need a source to back claims stating otherwise. (Per previous comments above on this matter: WP:IDONTLIKEIT isn't a valid rationale.)

    :: Continuing: edit summary of removal stated: "removing content with no correct ref" – material is properly cited and ref'd.

    :: Second ed summary claimed: "excluding possible vandalism by OPNsense" – that's not vandalism, and We ain't no OPNsense…

    :: One-line blurb noting a fork doesn't read as promotional, and is free of puffery. Agree a third-party should be cited to support this claim, however.

    :: Netgate is the commonly known trade name of Rubicon/El Sheep. Thus, presentation of such nomenclature in this manner would be appropriate; particularly since the shell [corp] game is noted by the referenced source. -- dsprc [talk] 22:32, 18 March 2022 (UTC)

    Semi-protected edit request on 1 September 2022

    {{Edit semi-protected|PfSense|answered=yes}}

    Add hyperlink to OPNsense topic where that word appears in the article Clbii (talk) 00:35, 1 September 2022 (UTC)

    :{{done}} ScottishFinnishRadish (talk) 00:40, 1 September 2022 (UTC)

    Infobox edits???

    How can one edit the Infobox to contain both the paid and the community edition versions of pfSense? The paid versions are still happening yet community was last updated over a year ago. — Preceding unsigned comment added by NantucketHistory (talkcontribs) 17:52, 6 April 2023 (UTC)

    Semi-protected edit request on 28 May 2025

    {{edit semi-protected|PfSense|answered=yes}}

    Under "Latest Release" Change Community Edition from 2.7.2 to 2.8.0.

    Under "Latest Release" Change Plus from 23.09.1 to 24.11

    24. 2600:4040:F11E:9001:0:0:0:A08D (talk) 23:18, 28 May 2025 (UTC)

    :{{Already done}} Szmenderowiecki (talk) 16:04, 22 June 2025 (UTC)