On 1/7/2012 5:47 PM, Eugen Leitl wrote:
Are there any JunOS features you consider killer that
are not in pfSense 2.1? What would be these features?

Thanks.

A couple of features that pfSense is lacking according to me (not only compared to SRX/JunOS though):

- Zone-based FW, to replace the current "incoming interface based" system. Or to get the choice between both at the beginning. This is mainly to ease the maintenance. Say I've 8 interfaces/vlans, and 1 is a guest that should only get Internet access. Then I've to create 7 drop rules on this interface to say "to int1_subnet" > block, "to int2_subnet > block", etc until I can safely have a "to any" > pass rule. I can perhaps workaround this by putting some rules in the floating tab, but if I start using it, I must keep in mind that for any interface, there might also be rules for it in the floating tab.

- Better logging: I believe it has been discussed numerous of time and I might have not found the final answer on "why it's not possible to log locally". If you run the nano version on a flash card, OK. But if you run it on a traditional hard drive, I see no reason why you could not keep more logs on the box, with rotation every day/week and to have a search module. (I'm not talking about best practice to export logs, etc, just technically, why couldnt we do local?)

- Integrate packages: while the packages system is a good idea to get extra functionnalities, i'm always hesitating whether to use it or not. There are several reason, like the fact that many packages are marked as ALPHA/BETA (which should means not production proof), or the fact that they are not maintained by pfSense's people (which means they could [i'm only guessing here] be broken during an upgrade, or commercial support wont cover issue you get with extra packages [guessing again]). That's why having most used (ie: Squid/Snort) integrated right into pfSense would be more comfortable.

- Identity-based FW, to have in addition to the source IP, the source User/Group. There are several ways to implement this, agent-based or agentless, transparent or explicit. The final objective is of course to get it working in a Windows Active Directory domain. - Real application awareness. I know there are some L7 capabilities under Traffic Shapper (btw I wonder why it's located there), but as far as i've seen, it's quite limited and it allow only to block (when it works) and not to allow. >> These 2 are big "must have" in today's firewalling (it's not my personnal opinion, it's just a fact) so I believe pfSense must definitely get into it.

And what has been said (CLI, commit, ...) in the other answers as well.

Appart from that, pfSense is a great piece of software which a rich set of features and is clearly the best free/open-source FW appliance i've used/tested by now.

Keep up good work.

_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to