Cisco Catalyst 8000 Edge Platforms deliver secure, high-performance SD-WAN built for hybrid work, multicloud access, and 5G-ready networks. Powered by Cisco IOS XE, these devices combine flexible routing, SASE integration, and cloud-native agility to support AI-driven networking and edge computing needs.
N/A
pfSense
Score 8.6 out of 10
N/A
pfSense is a firewall and load management product available through the open source pfSense Community Edition, as well as a the licensed edition, pfSense Plus (formerly known as pfSense Enterprise). The solution provides combined firewall, VPN, and router functionality, and can be deployed through the cloud (AWS or Azure), or on-premises with a Netgate appliance. It as scalable capacities, with functionality for SMBs. As a firewall, pfSense offers Stateful packet inspection, concurrent…
With the flexibility of sizing options, the Cisco Catalyst 8000 Edge Platforms has worked to deliver solutions for our various needs. Smaller systems offer strong connectivity for office developments. Mid-range options have served our larger campuses well. Our data center deployments of the larger systems have provided up to 100G connectivity and advanced routing solutions. The Cisco Catalyst 8000 Edge Platforms continues to meet our needs and exceed our expectations.
I believe PFSense is well suited for both home lab environments as well as up to small to mid-size business environments on a tight budget. However, I would implore that anything in production requires the use of the authorized hardware that PFSense sells to receive support. However, in my experience, PFSense is a solid set-and-forget firewall solution.
Easy to use. Good user interface design! Easy to understand and easy to set up.
Lower hardware requirement. 3 years ago, we used an old PC to run it. Now, we have changed to a router device with Celeron CPU and 8GB RAM. It runs smoothly with a 1000G commercial broadband.
I did kind of mention a Con in the Pro section with OpenVPN.
When I create a config for an employee other employees are able to login to that config.
I could be doing something wrong when I am making it - I am not afraid to admit that as I am pretty new to all of this, but it seems like it builds a key and I would think the key would be unique in some way to each employee, but I could be wrong.
I actually do not have a lot of Con's for this software - I did not get to set this up on our work network so I am not sure of any downfalls when installing.
I installed this on my personal machine in a Hyper-V environment to get a feel for it before I started working on it at work and it seemed pretty smooth. I didn't run into any issues.
Because I have had no issues with this product line and have grown go really trust in it. One of the besr thing is that this has had less vulnerabilities that the past cisco router that I have dealt with. In my line of work needing to upgrade code is always something that needs to be done after hours and most likely on weekends.
Either you deploy those routers as a standalone, or as part of the SD-WAN fabric, the amount of features and settings you can configure on them, is well beyond any other vendor or product on the market. While this may bring some configuration complexity, availability of support for variaty of different protocols and features allows you to solve almost any network challenge you may face
The pfSense UI is easy to navigate and pretty go look at. It is much better than some high dollar firewalls that just throw menus you you. The pfSense UI is quick and responsive and makes sense 99% of the time. Changes are committed quickly and the hardware rarely requires a reboot. It just runs.
I have always had great response time and have never been let down by cisco support. I have had issues where the person who was assisting me was not able to provide a resolution but by utilizing his team members they where able to come together to provide a answer and resplve the situation.
Compared to the Cisco 2000 Series Connected GRID Routers, CGR2010, the Cisco Catalyst 8000 Edge Platforms is more powerful in processing, and it has the capability to do the segment routing. It is easier to install physically and occupies less space in the rack, consumes less power, and saves more for the company.
Meraki has a unified management login for all devices, which is nice. It also has decent content filtering, both areas where pfSense is weaker. Where pfSense far ouclasses Meraki is in the ease of use and the other width of features. These include features such as better VPN interoperability, non-subscription based pricing, auditability, not relying on the infrastructure of a third party, more transparency of what's actually going on, easier to deploy replacements if hardware fails. Additionally, the NAT management for pfSense seems to be a bit better, as you can NAT between any network segment and not just the LAN segments out the WAN interfaces.
pfSense can be installed on commodity hardware with no licensing fees. With a simple less than 10 minute restore time, on most hardware, it's an extremely inexpensive way to achieve the same results that some of the more expensive vendors provide.
The easy to use interface has allowed configuration management to be preformed by lower level technicians with quick and easy training.