Home ★ Dynamic VPN Detection ⇋ Site-to-Site IPsec VPN Problems We Solve Firewall Rules IDS/IPS DNS Security GeoIP Blocking CrowdSec Remote Access VPN Integration Health Why SecureEdge Best Practices See It In Action Pricing About the Builder NMS Portal About ▶ Live Demo Request Consultation →
S 5NinesNet SecureEdge · Featuring Dynamic VPN Detection

Take control of your firewall
without living inside
the firewall UI.

Turn OPNsense into a complete security operations platform.

OPNsense is powerful. SecureEdge makes it operational.

A modern security workspace for firewall control, VPN visibility, threat detection, DNS protection, and safer network changes. Featuring real-time VPN / proxy / Tor detection that catches rotating residential proxies every 10 seconds — a capability no other firewall at this price point offers.

Dynamic VPN Detection
★ EXCLUSIVE · 10s SCAN · SESSION-KILL
OPNsense 26.1
API-DRIVEN · NO PLUGIN LOCK-IN
Suricata 8 + CrowdSec
IDS/IPS · COMMUNITY THREAT FEEDS
5NinesNet SecureEdge · Control Panel
★ FLAGSHIP
⚡ Dynamic VPN Detection · Blocking
847
VPNs blocked 24h
10s
Scan Cycle
↯ kill
Active Sessions
⛨ Firewall · Live Status
1,847
Rules Hit/hr
23
Active Rules
99.99%
Uptime 30d
🛡 Threat Intelligence · Last 24h
🌍 GeoIP blocks4,218 pkts
👥 CrowdSec bouncer847 IPs banned
🦠 Suricata alerts12 high
🌐 DNS queries blocked18,433
◆ OPNsense Integration Health
SSH key✓ valid
DNSBL hook✓ installed
Unbound paths✓ correct
Suricata config✓ loaded

Most firewalls are powerful, but not easy to operate.

OPNsense is extremely capable, but daily operations can become time-consuming: rule order, DNS blocklists, Suricata rules, GeoIP aliases, VPN policies, CrowdSec services, NAT reloads, packet captures, and troubleshooting are scattered across different screens.

5NinesNet SecureEdge brings those workflows into one modern control panel.

🔥Firewall · Rules
🛡IDS/IPS · 40+ rulesets
🌐DNS · Unbound · blocklists
🌍GeoIP · aliases · CSV
👥CrowdSec · bouncers
🔒VPN · users · profiles
NAT · reloads · aliases
📡Packet capture · troubleshooting

SecureEdge sits on top of OPNsense
and turns advanced security operations
into a clean, guided control panel.

"A custom network security management layer for OPNsense."

SecureEdge simplifies daily firewall operations, DNS security, IDS/IPS rule management, VPN administration, GeoIP policy enforcement, CrowdSec protection, and troubleshooting workflows through a modern web interface. Built on a device-based routing architecture, the portal scales from a single firewall to multi-location MSP deployments without rearchitecting.

THE FLAGSHIP FEATURE · EXCLUSIVE TO SECUREEDGE

Your GeoIP block is a comfort blanket.
Attackers are already inside.

The overwhelming majority of inbound attacks today — credential stuffing, account takeover, fraud, scraping, command-and-control callbacks — originate from anonymized IPs: commercial VPNs, residential proxies, and Tor exit nodes. They don't come from "bad countries" — they come from clean US residential IPs that your GeoIP rules happily allow through.

SecureEdge's Dynamic VPN/Proxy/Tor Detection is the one firewall capability at this price point that sees past the disguise — scanning live pf states every 10 seconds, verifying every connecting IP against a live 17M+ record threat database, and killing active sessions the moment anonymized traffic is detected.

Why the big vendors can't solve this

Enterprise firewalls detect VPN/proxy traffic using static IP reputation lists updated daily or weekly. That works for fixed datacenter exits — it fails completely against services like ExpressVPN, Surfshark, or residential proxy networks that rotate through thousands of IPs per hour.

SecureEdge takes the opposite approach: instead of checking IPs against a stale list, it asks a live database about every connecting IP, in real time, and blocks them before they finish their first HTTP request.

HOW WE COMPARE
Palo Alto / Fortinet Signature-based IP reputation (daily updates) $30K+/yr
pfSense / OPNsense native Country-level GeoIP only · no VPN detection Not available
CrowdSec alone Behavior-based (requires attack first) · no proactive VPN list Reactive
SecureEdge DynVPN Live pf state scan · 10s cycle · session-kill on detection INCLUDED
SCAN INTERVAL
10seconds
Configurable 2–55s
THREAT DB
17M+records
Refreshed every few seconds
DETECTS
VPN · Proxy
Tor · Relay
All four in one query
SESSION KILL
Active
connections
Not just new SYN
LIVE DETECTION · BLOCKING MODE
refreshed 3s ago
847
Blocked · 24h
12,438
Evaluations
421
API calls today
Healthy
Engine Status
Recently Blocked · Live Feed
Source IP · ProviderTypeAction
198.51.100.82
ExpressVPN · Gibraltar
VPN ↯ session killed
203.0.113.47
Tor Exit · exitnode-42
TOR ✕ blocked
192.0.2.201
Residential Proxy · Oxylabs
PROXY ✕ blocked
198.51.100.133
NordVPN · Netherlands
VPN ↯ session killed
203.0.113.201
Cloudflare WARP · Relay
RELAY ✕ blocked
173.245.52.14
Comcast Residential
CLEAN ✓ allowed
ISP Whitelist · Active
247 CIDR ranges · protects legitimate residential users
✓ enabled
Why GeoIP Alone Fails

"I block everything outside the US, I'm fine."

This is the most common — and most dangerous — misconception in firewall operations. Here's how a credential-stuffing attack from Russia reaches your US-only infrastructure in four hops. Every one of these hops is cheap, automated, and happens at scale every second of every day.

Hop 1 · Origin
🎯
Attacker
🇷🇺 Moscow
Russia
Hop 2 · Cloak
🛡
Commercial VPN
ExpressVPN
new exit every 3min
Hop 3 · Geo-Spoof
🏠
Residential Proxy
🇺🇸 Comcast
Dallas, TX
Hop 4 · Arrival
🏢
Your Firewall
Source IP: US
GeoIP check: ✓ allowed
✗ With GeoIP Only

The attacker presents a clean US residential IP. Your "block everything outside US" rule does exactly what you asked it to do — it lets the attack through. The credential stuffing runs, the fraud completes, and your logs show a normal-looking Dallas connection.

✓ With SecureEdge DynVPN

The connecting IP is checked against a 17M+ record database within 10 seconds. The Comcast residential IP is flagged as an active residential proxy exit. Session killed. Attack never completes. GeoIP rules still hold; DynVPN is the second layer that catches what GeoIP was never designed to.

Independent sources confirm: CISA & FBI joint advisory AA20-183A details how attackers use Tor and VPN/proxy infrastructure for reconnaissance, C2, and ransomware delivery. Cisco Talos: "attacks can come from anywhere — even the same IP space your employees use for their VPNs." SpyCloud 2025 Identity Exposure Report: 91% of organizations experienced identity-related cyber incidents in 2024 — nearly doubling year-over-year, with VPN/proxy cloaking a primary vector.
🔒
The Question Every Admin Asks

"Will this break my corporate VPN or my employees' remote access?"

No — and this is what separates DynVPN from crude "block all VPNs" approaches. The detection engine distinguishes between consumer anonymization services (designed to hide identity) and enterprise VPN infrastructure (designed for legitimate remote access).

✗ Blocked — Consumer Anonymization
  • — ExpressVPN, NordVPN, Surfshark
  • — CyberGhost, PrivateInternetAccess
  • — Tor exit nodes + relays
  • — Residential proxy networks (Oxylabs, Bright Data)
  • — Data-center datacenter VPN exits
  • — Cloudflare WARP, Apple Private Relay
  • — Public/open proxies & SOCKS5
✓ Allowed — Legitimate Access
  • — Your corporate site-to-site VPN
  • — Employee OpenVPN / WireGuard / IPsec
  • — OPNsense remote-access VPN users
  • — Cisco AnyConnect / GlobalProtect
  • — Legitimate ISP customers (residential)
  • — Mobile carrier IPs (under whitelist)
  • — Explicit IP allowlist (your call)
How the engine knows the difference

The threat database is curated from active exit-point crawling — the detection service literally connects to commercial VPN providers, enrolls in residential proxy networks, and fingerprints their exit IPs. Your OpenVPN or WireGuard endpoint doesn't sell exits to consumers, so its IP never appears in the database. Additionally, SecureEdge provides an explicit ISP whitelist (247+ CIDR ranges by default, fully customizable) for any edge case — and a monitor-first mode that logs what would be blocked for 24–48 hours before enforcement, so you see every potential false positive before any real user feels it.

Always Current. Always Verifiable.

Updated continuously by the data provider. Never by you.

The threat database refreshes every few seconds — as VPN exits rotate, as residential proxy networks add new compromised nodes, as Tor relays enter and leave the network. Your SecureEdge appliance queries the live database in real time; there is no local database to update, no signature file to subscribe to, no weekly push to miss.

~seconds
Data Refresh

Continuous 24/7 crawling of VPN/proxy infrastructure. Fresh exits appear in the database within seconds of going live.

95–98%
Detection Accuracy

Third-party verified accuracy on commercial VPN, proxy, and Tor detection. Higher than signature-based enterprise appliances.

17M+
Verified Records

Each entry is validated against live infrastructure before inclusion. Retired IPs purged automatically to minimize false positives.

Zero
Admin Maintenance

No signature files to download. No weekly ruleset updates. No cron jobs to babysit. The service updates; your firewall benefits automatically.

Compare the update model
Palo Alto / Fortinet
Signature file · daily-weekly
MaxMind GeoIP2 Anonymous IP
Weekly database download
SecureEdge DynVPN
Live query · every few seconds
Who Actually Needs This
🎰 Gambling & Fintech

Stop users from spoofing jurisdiction with consumer VPNs. Regulatory requirement in most US states, UK, and EU.

🎮 Gaming & Streaming

Enforce geo-licensing for content. Block account-sharing services. Catch competitive cheaters on rotating residential proxies.

🛡 Anti-Fraud & E-Commerce

Card testing, coupon stacking, and account takeover attempts almost always originate from VPNs, proxies, or Tor.

🔐 Zero-Trust & Corporate

Force employees onto the corporate VPN instead of consumer VPN services. Close the "I'll use ExpressVPN on public Wi-Fi" loophole.

Powered by live pf state inspection · vpnapi.io enrichment · pf table enforcement · session-kill via pfctl -k
SITE-TO-SITE IPSEC · ENTERPRISE-GRADE TUNNEL MANAGEMENT

Build a tunnel to AWS, Azure, or GCP
in six clicks.

Site-to-Site IPsec is the backbone of every multi-cloud and multi-site network — and the OPNsense native UI makes setting one up an afternoon of cross-referencing vendor docs and second-guessing IKE proposals. SecureEdge replaces all of it with a 6-step wizard, 5 cloud presets researched against vendor documentation, and a 4-LED dashboard borrowed from Palo Alto Networks so you know exactly which phase failed when something doesn't come up.

SCREEN 01 · TUNNELS DASHBOARD

Four LEDs. One glance. You know the answer.

When a tunnel goes down at 3am, "is it phase 1 or phase 2?" is the question that costs you an hour. SecureEdge surfaces both — plus the tunnel interface state and live traffic — as four color-coded LEDs on every tunnel card. Same convention Palo Alto Networks ships in PAN-OS, now on top of OPNsense.

Green · UP — SA established, traffic flowing
Yellow · NEG — mid-negotiation, problem brewing
Red · DOWN — configured but not connected
Grey · N/A — disabled or no telemetry
For Reference

OPNsense's native IPsec UI shows tunnel status as a single boolean (connected / not connected). Diagnosing why something isn't coming up means SSH-ing in and reading swanctl --list-sas output. SecureEdge surfaces all four states inline.

/vpn/site-to-site · IPsec Tunnels
strongSwan service
RUNNING · 4 SAs established · 18d uptime
RestartReload
Total
5
Up
4
Down
1
Disabled
0
aws-us-east-1 → 54.184.x.x · IKEv2 · VTI
UP · 12d 4h
IKE Phase 1UP
IKE Phase 2UP
Tunnel IFUP
TrafficUP
azure-west-eu → 52.157.x.x · IKEv2 · VTI
UP · 6d 11h
Phase 1UP
Phase 2UP
Tunnel IFUP
TrafficUP
🌐 gcp-us-central1 → 34.71.x.x · IKEv2 · VTI
NEGOTIATING · 23s
Phase 1UP
Phase 2NEG
Tunnel IFN/A
TrafficN/A
🐧 branch-office-dallas → 71.42.x.x · IKEv2 · policy
UP · 47d 8h
Phase 1UP
Phase 2UP
Tunnel IFUP
TrafficUP
backup-dc-phoenix → 198.51.x.x · IKEv2 · policy
DOWN · check peer
Phase 1DOWN
Phase 2N/A
Tunnel IFN/A
TrafficN/A
Add Tunnel · Step 1 of 6
1
Template
2
Peer
3
Phase 1
4
Phase 2
5
Routing
6
Review
Pick a Template

Cloud presets configured against vendor docs. Phase 1/2 proposals, lifetimes, and routing mode are pre-set — you only edit if you need something custom.

Amazon Web Services
AWS Site-to-Site VPN — VTI/route-based
Microsoft Azure
Azure VPN Gateway — IKEv2 custom policy
🌐
Google Cloud Platform
Cloud VPN — HA VPN with BGP
🐧
strongSwan / Linux
OPNsense ↔ strongSwan defaults
Custom
Build it yourself — full control
Custom presets
added per request
AWS Preset Note

AWS only supports route-based (VTI) tunnels. Wizard will configure tunnel_type=vti automatically. Configure AWS Customer Gateway with same PSK · BGP over VTI for dynamic routing.

Step 1 of 6 · Template
← Back Next: Peer →
SCREEN 02 · 6-STEP WIZARD

Five cloud presets. Researched against vendor docs.

Building an IPsec tunnel to AWS isn't hard — it's just full of gotchas. Wrong DH group on Azure? Tunnel won't establish. Forgot AWS only supports VTI? Stuck for an hour. SecureEdge ships with five presets where every gotcha is already pre-solved:

AWS — VTI auto-set · BGP-over-VTI warning · AES256-GCM-SHA384-ECP384
Azure — DH14 minimum (skips weak default) · custom IKE/IPsec policy · Route-based SKU warning
🌐
GCP — HA VPN 2-tunnel reminder · BGP ASN required · 36000s P1 lifetime
🐧
strongSwan — sensible defaults for OPNsense ↔ strongSwan · policy mode
Custom — every parameter exposed for power users who know what they need

Cloud presets researched against vendor documentation as of April 2026. New cloud providers (Oracle, Alibaba, OCI) added on customer request as part of the SecureEdge engagement.

SCREEN 03 · TOPOLOGY VIEW

See your tunnels like a network diagram.

An animated hub-and-spoke SVG with your firewall at the center and every IPsec peer arranged around it. Each spoke shows live link state and active traffic. Hover any peer for IKE proposals, lifetimes, and last-renegotiation time — without leaving the page.

Field Use

Built for the moment a CTO walks over and asks "what's connected to where?" — point at the screen, done. No PDF diagrams to maintain, no Visio file going stale.

/vpn/site-to-site · Topology
YOUR FIREWALL AWS us-east-1 · UP AZURE west-eu · UP 🌐 GCP us-central1 · NEG 🏢 DALLAS branch · UP phoenix · DOWN
UP · animated
Negotiating
Down
What Else Ships With S2S IPsec

Beyond setup — operational depth.

IKE Event Log

Live event stream of every IKE phase 1/2 negotiation, child SA rekey, and DPD timeout. Filter by tunnel, severity, or time window. The same data swanctl --log shows — just searchable.

Tunnel Monitor

Configurable ICMP/TCP keepalive across the tunnel — catches "tunnel says UP, traffic doesn't flow" cases that vanilla IPsec misses. Auto-restart on monitor failure.

Uptime Widget

Per-tunnel uptime tracking with rolling 30-day SLA visibility. Goes red below 99.9%. Exportable as CSV for compliance reports.

Cascade Delete + Toggle

Delete a tunnel and the wizard removes the connection, child SAs, PSK, firewall rules, and routes — all at once. Or just toggle disabled to test without losing config.

🔑
PSK Rotation

Rotate the pre-shared key on schedule or on-demand. Wizard handles the rekey window so the tunnel doesn't drop more than the configured DPD timeout.

VTI & Policy Modes

Both routed (VTI, required for AWS/Azure/GCP) and policy-based (the OPNsense default). Wizard sets correctly per cloud provider's requirement.

Setting up an AWS Site-to-Site VPN

From OPNsense afternoon to SecureEdge six clicks.

✗ OPNsense Native
  1. VPN → IPsec → Connections (figure out routed vs policy)
  2. Look up AWS-required Phase 1 proposals in vendor docs
  3. VPN → IPsec → Pre-Shared Keys (paste PSK)
  4. Interfaces → Other Types → VTI · create the VTI
  5. System → Routes → add routes for VTI
  6. Firewall → Rules → create allow rules on VTI iface
  7. Apply, watch logs, fix proposal mismatch, retry
  8. ~45–90 minutes if you've done it before
✓ SecureEdge Wizard
  1. 1. Click "Add Tunnel" → pick AWS preset
  2. 2. Enter AWS endpoint IP + paste PSK
  3. 3. Phase 1 (pre-filled) → Next
  4. 4. Phase 2 (pre-filled) → Next
  5. 5. Routing (VTI auto-set for AWS) → Next
  6. 6. Review → Apply
  7. ~3 minutes including the AWS-side setup
  8. VTI, routes, firewall rules created automatically

The reasons admins actually call us.

Stripped of marketing language, here are the five security operations problems that drive buyers to SecureEdge. If any of these sound like your OPNsense deployment, we should talk.

✗ THE PROBLEM

"Users bypass geo-restrictions and DLP controls with ExpressVPN. Our GeoIP rules are useless because their exit IPs rotate every 3 minutes. Signature-based IP reputation never catches them."

✓ THE SOLUTION

DynVPN scans live pf states every 10 seconds against a 17M+ record VPN/proxy/Tor threat database. Kills active sessions on detection — not just new connections. The only firewall under $30K/year that does this.

✗ THE PROBLEM

"I pushed a firewall rule at 11pm and locked myself out of the OPNsense UI. Had to drive to the office for console access. Second time this year."

✓ THE SOLUTION

Juniper-style commit-confirm for OPNsense. Apply any rule with a 1–30 minute auto-revert timer. Lose your connection? The rule unwinds itself. No console drive, no 2am pain.

✗ THE PROBLEM

"A user says 'this domain should work' and I have 10 blocklists stacked. I don't know which list blocked it, or even if it's really blocked — Unbound just silently returns 0.0.0.0."

✓ THE SOLUTION

Query-level DNS visibility with blocklist attribution. Test any domain, see exactly which list matched, and get real answers for your users — not guesses.

✗ THE PROBLEM

"I want to block TikTok and known-malicious TLS SNI on my network, but writing app-layer Suricata rules by hand and testing them without breaking production is a weekend project."

✓ THE SOLUTION

Visual Suricata rule builder with DNS/TLS/HTTP app-layer presets. Build, preview, and deploy custom rules in minutes. Alert-only mode lets you test safely before enforcement.

✗ THE PROBLEM

"OPNsense upgraded overnight. Now DNS blocklists aren't updating, GeoIP aliases are stale, and my Suricata config got reset. I only noticed because a user complained about ads coming back."

✓ THE SOLUTION

Continuous Integration Health monitoring — 7 checks across SSH keys, DNSBL hooks, Unbound paths, cron jobs, and Suricata config. One "Repair All" button puts everything back. Drift caught in minutes, not weeks.

01 · CORE

Firewall rules
without the confusion.

Create, edit, enable, disable, reorder, and review firewall rules from a cleaner interface designed for real operators. SecureEdge adds plain-English structure, rule position awareness, logging visibility, and safer change control.

Full CRUD Drag-reorder Hit counts from pfctl Commit-confirm timer Auto-revert on lock-out
Best Practice Before blocking a subnet, review rule order and enable logging so you can confirm impact before applying permanent changes. SecureEdge's commit-confirm timer gives you an auto-revert window so a bad rule never leaves you locked out of your own firewall.
/device/fw-01/firewall
LAN_IN · first match wins ⟲ commit-confirm: 15min
#1WANBlock Tor exit nodes · geoip:risky8,442 hitsBLOCK
#2WANCrowdSec bouncer table · community12k hitsBLOCK
#3LANManagement VLAN → firewall UI284 hitsPASS
#4LANGuests → Internet (no LAN)1,203 hitsPASS
#5OPT1Allow admin SSH from mgmt47 hitsPASS
#6WANDefault deny · catch-all0 hitsREJECT
02 · DETECTION

Turn Suricata into a guided security engine.

Manage IDS/IPS mode, alert feeds, rulesets, custom rules, protocol-based blocking, DNS/TLS/HTTP inspection, and signature search — without manually editing rule files or SSHing into the box at 2am.

IPS ↔ IDS toggle 40+ ruleset categories Live alert feed Signature search Stale-rules warning
Example use cases
  • → Block external DNS bypass
  • → Detect DNS tunneling
  • → Block TikTok, YouTube, Facebook
  • → TLS SNI-based policies
  • → Alert-only before enforcing
  • → Custom app-layer HTTP rules
IDS/IPS · Live Alerts
247
High
1.2k
Medium
5.8k
Info
🦠
ET MALWARE Win32/CoinMiner Activity
192.0.2.47 → pool.mining.example · :3333 · just now
sig:2032447
💥
ET EXPLOIT Log4j JNDI RCE attempt
198.51.100.15 → webapp · :443 · 2m ago
sig:2034648
🕸
ET WEB_SPECIFIC_APPS SQLi probe /wp-login
203.0.113.9 → wordpress · :80 · 5m ago
sig:2019714
🎣
ET PHISHING SendGrid brand lookalike
lan-client → sendg1rd.example · DNS · 8m ago
sig:2845112
🔍
ET SCAN NMAP -sS window scan
198.51.100.42 → WAN · multi-port · 12m ago
sig:2010935
03 · PREVENTION

DNS filtering
with visibility.

Protect users from ads, trackers, malware, phishing, adult content, gambling, VPN bypass, and DNS-over-HTTPS bypass using curated blocklists and guided testing. Every blocked query is explained, not silently dropped.

Unbound integration Blocked query tracking Syslog bridge Serialized testing
SecureEdge helps answer the real question "Is this domain blocked, why is it blocked, and which list caused it?" — a question OPNsense's native UI doesn't answer clearly when you have 10 blocklists stacked. SecureEdge's serialized testing prevents the Unbound memory spikes that hit large deployments on blocklist reload.
DNS Security · Query Analyzer
94.2%
Clean Rate · 24h
18,433
Queries Blocked
Top Blocked Domains · Last 1h
doubleclick.net1,284
google-analytics.com892
facebook.com/tr407
tiktokcdn.com331
bing-ads.example189
$ dig +short examplemalware.net
→ 0.0.0.0 · blocked by list: StevenBlack-hosts
04 · GEO-PROTECTION

Country-based
firewall protection.

Create inbound block, allow, or alert policies by country using MaxMind GeoLite2, high-risk region presets, OFAC-style presets, and IP reputation feeds. Aliases and WAN rules are created automatically — you just pick the policy.

MaxMind GeoLite2 High-risk presets OFAC presets IP reputation feeds FireHOL · Spamhaus · Tor
Best Practice For small businesses with no international exposure, start by blocking high-risk inbound regions, then monitor logs before adding allow-only policies. SecureEdge's invert-match awareness prevents the most common GeoIP misconfiguration — the one where admins think they're allowing US traffic but are actually blocking non-US traffic.
GeoIP Blocking · Active Policy
⚠ High-Risk Regions · Active Block
🇨🇳 CN 🇷🇺 RU 🇰🇵 KP 🇮🇷 IR 🇸🇾 SY 🇨🇺 CU 🇧🇾 BY 🇻🇪 VE
4,218
Packets Blocked · 24h
MaxMind OK
DB age: 2 days
05 · COMMUNITY DEFENSE

Community-powered blocking at firewall speed.

Install and manage CrowdSec directly from the portal. The agent detects attacks; the firewall bouncer blocks malicious IPs using pf tables with minimal performance impact. Console enrollment, API key registration, and decisions-table visibility — all one-click.

One-click install Console enrollment Firewall bouncer auto-register Decisions table
How the three pieces fit together
CrowdSec AgentDetects attack behavior on your logs (SSH brute force, nginx probes, auth failures, etc.)
Firewall BouncerEnforces decisions by adding malicious IPs to pf tables at kernel speed
SecureEdgeManages and explains both — install, enroll, register, monitor from one UI
CrowdSec · Active Decisions
847
Active Bans
34.2k
Community Pool
live
Bouncer
IP / Reason Source TTL
203.0.113.47
ssh-bf 🇷🇺
SSH BF23h
198.51.100.15
community 🇨🇳
HTTP BF4d
192.0.2.201
nginx-probe 🇻🇳
PROBE18h
203.0.113.88
community 🇰🇵
MALWARE6d
198.51.100.202
auth-fail 🇧🇷
BRUTE11h
06 · ACCESS

Remote Access VPN
management, done right.

This is the letting-people-in side of VPN (separate from the DynVPN detection engine above, which keeps unwanted VPN traffic out). Create VPN users, download .ovpn profiles, manage sessions, integrate LDAP/TOTP, and build firewall policies around VPN user groups — the workflow that usually takes 8 OPNsense screens now takes one.

One-click .ovpn download LDAP · TOTP / MFA VPN user aliases Live sessions Per-user firewall policy
For MSPs delivering managed VPN User aliases let you write firewall rules like "allow vpn_devops → prod_databases" and "deny vpn_contractors → prod" without maintaining IP lists by hand. Users join or leave a group — rules update automatically.
Remote Access VPN · Users
12 users · 4 online + Add User
JB
Jason Butler
admin · ldap · mfa enabled
online 3h
FB
Farzam B-Eng
netadmin · ldap · mfa enabled
online 18m
RM
R. Martinez
devops · ldap
offline 6h
AC
A. Chen
devops · ldap · mfa enabled
online 42m
NL
N. Larsen
contractor · local · expires 30d
offline 2d
⬇ download.ovpn profile
⚙ policyfirewall rules
07 · SELF-HEALING

Know when your firewall integration is healthy.

SecureEdge continuously validates the OPNsense integration: SSH keys, DNSBL hooks, Unbound paths, Dynamic VPN cron jobs, GeoIP rebuild jobs, Suricata config, and DNSBL update jobs. When something drifts, a single "Repair All" button puts it back.

7 integration checks Auto-remediation Drift detection Post-upgrade repair
Why this matters OPNsense upgrades occasionally reset custom hooks and cron entries. Without SecureEdge, you discover the problem when a DNS blocklist stops updating or GeoIP aliases go stale. With SecureEdge, the health panel catches drift within minutes and the Repair All workflow restores every hook in one action.
OPNsense Integration Health
INTEGRATION HEALTHY
Last check: 47 seconds ago · 7/7 passing
SSH key (portal → OPNsense)✓ ok
DNSBL block-page hook✓ ok
Unbound config paths✓ ok
Dynamic VPN cron jobs✓ ok
GeoIP rebuild job (daily)✓ ok
Suricata conf.d persistence✓ ok
DNSBL update cron✓ ok

What OPNsense can't do alone.

OPNsense is excellent at the fundamentals — packet filtering, NAT, routing, VPN. But there are operational capabilities that don't ship in any open-source firewall distribution, and that enterprise vendors gate behind subscriptions. SecureEdge adds them as standard.

★ FLAGSHIP
DIFFERENTIATOR · 01

Dynamic VPN / Proxy / Tor Detection

The only OPNsense-grade firewall that scans live connections every 10 seconds, queries a 17M+ record threat database, and kills active VPN/proxy/Tor sessions in real time.

OPNsense native✗ not available
Palo Alto / Fortinet◔ signature-only · $30K+/yr
SecureEdge✓ real-time · included
DIFFERENTIATOR · 02

Commit-Confirm Firewall Rollback

Juniper-style "commit confirmed" for OPNsense. Apply a rule change with a 1–30 minute auto-revert timer. Lock yourself out? The rule unwinds itself. Nobody dispatches to site.

OPNsense native✗ commits instantly
Cisco / Juniper gear◔ CLI-only · no GUI
SecureEdge✓ GUI + countdown + browser alert
DIFFERENTIATOR · 03

Rule Order Awareness & Dead-Rule Warnings

Color-coded rule positions (#1 red, #2 amber, #3 yellow) with a "first match wins" banner. Catches the classic mistake where a catch-all block any rule silently hides everything below it.

OPNsense native✗ flat list · no warnings
SolarWinds / ManageEngine◔ paid add-on modules
SecureEdge✓ inline visual + auto-detect
DIFFERENTIATOR · 04

Visual Suricata App-Layer Rule Builder

Build DNS-tunnel detection, TLS SNI blocks, and HTTP URI filters without writing raw Suricata syntax. App-layer protocol detection catches traffic on any port, not just defaults.

OPNsense native✗ raw text editor only
Snort / Suricata CLI✗ hand-written rules
SecureEdge✓ visual builder + presets
DIFFERENTIATOR · 05

One-Click CrowdSec Community Defense

Agent install, console enrollment, firewall bouncer registration, and API key provisioning — all in one workflow. What's normally a multi-hour setup guide becomes one button.

OPNsense plugin◔ exists · painful setup
Manual install✗ CLI + config drift
SecureEdge✓ one-click · auto-register
DIFFERENTIATOR · 06

Self-Healing Integration Health

Continuous validation of SSH keys, DNSBL hooks, Unbound paths, cron jobs, and Suricata config. When an OPNsense upgrade drifts the integration, "Repair All" puts every hook back in one click.

OPNsense native✗ no drift detection
Ansible / manual checks◔ requires you to write them
SecureEdge✓ continuous + one-click repair

"You can get each of these features individually by bolting together plugins, SSH scripts, and cron jobs — or by paying enterprise vendors five figures a year. SecureEdge gives you all six as standard, on top of the OPNsense you already trust."

Security habits, built into the workflow.

Good firewall operations aren't about having every setting enabled — they're about a handful of habits that prevent the common mistakes. SecureEdge is designed around these six principles so they happen automatically, not by accident.

01

Start in monitor mode

Every new IDS/IPS ruleset, GeoIP block, or DynVPN policy starts in alert-only. Watch what it would have blocked for 24–48 hours before enforcing. Catches every false positive before it breaks production.

✓ Mode toggle · one click · fully reversible
02

Keep rule order visible

Firewall rules are processed top-down, first-match-wins. SecureEdge shows rule position in color (#1 red, #2 amber, #3 yellow) and warns when a catch-all rule silently hides everything below it. No more "why isn't my new rule working?"

✓ Visual ordering · dead-rule detection
03

Use DNS as your first security layer

DNS filtering blocks malicious domains before the connection is ever attempted — cheaper than firewall rules, simpler than IDS. Start with curated blocklists (malware, phishing, ads), then layer firewall and IDS on top.

✓ Curated blocklists · query-level visibility
04

Apply GeoIP with intent, not by reflex

GeoIP is powerful but blunt. Block based on business need (no customers in Region X? Safe to block) — not out of paranoia. The inverse-match misconfiguration (thinking you're allowing US traffic when you're actually blocking non-US) is the #1 GeoIP mistake. SecureEdge prevents it.

✓ Inverse-match detection · preset presets
05

Review VPN access regularly

VPN users accumulate over time — contractor left 8 months ago, account never disabled, firewall still trusts them. Run a quarterly review of active users, last-seen dates, and group membership. SecureEdge surfaces stale accounts automatically.

✓ Last-login tracking · expiry dates · MFA status
06

Every change documented, every rollback one click

When something breaks, the first question is "what changed?" SecureEdge pairs commit-confirm (auto-revert bad rules) with a Git-backed change history — so you can trace every firewall change to a user, timestamp, and reason. Compliance audits become a 5-minute export.

✓ Commit-confirm · Git history · audit export

"Security isn't about having every feature enabled. It's about the habits that prevent the mistakes."

— SECUREEDGE DESIGN PRINCIPLE

Real deployments. Real outcomes.

SecureEdge works across the same three environments where OPNsense itself shines — but removes the operational tax that usually scales with firewall complexity.

🏠

Homelab & Rental Property

Clean DNS filtering for family safety, GeoIP blocking on WAN, daily config backups, VPN access from anywhere. Set up once, auto-heal on OPNsense upgrades.

🏢

Small Office / SMB

Ad blocking, phishing protection, employee VPN with MFA, CrowdSec community defense, TLS SNI policies for productivity apps — without a dedicated security hire.

💼

MSP Managed Services

One portal, many firewalls. Device-based routing scales to dozens of client OPNsense boxes. Standardized rules, audit logs, customer-isolated views, and handoff documentation.

🏭

Retail & Hospitality

PCI-adjacent network segmentation, guest Wi-Fi isolation, PoS egress whitelisting, automated GeoIP blocking for payment terminals. Compliance evidence in one dashboard.

🎓

Education & Nonprofits

DNS-based content filtering that's explainable to parents and boards. Safe-search enforcement, gambling/adult blocking, and clear "why was this blocked?" reports.

🔒

Advanced Home Security

IoT device isolation, smart-home egress control, VPN-only access to sensitive services, Tor exit blocking, and CrowdSec community defense on residential connections.

Design, deploy, and support.

SecureEdge is a service-backed product. You're not downloading a free tool and fighting it at 2am — you're engaging an engineer to deploy, tune, and maintain your firewall stack end-to-end.

SecureEdge Setup
From $1,488
one-time · single appliance

For homelab, rental property, or small office firewall setup — when you want the benefits of OPNsense without the weekend-long learning curve.

  • OPNsense baseline setup & hardening
  • Firewall rule cleanup & documentation
  • DNS filtering with curated blocklists
  • VPN setup (1 admin + 2 user profiles)
  • Basic IDS/IPS with ET Open ruleset
  • Handoff documentation & runbook
  • 30 days of post-setup email support
Request Quote →
SecureEdge Managed
Custom
ongoing · MSP & multi-client pricing

For MSPs and operators with multiple clients or locations — when firewall management becomes a service you deliver, and you need ongoing review, policy updates, and standardized deployment patterns.

  • Multi-device portal structure
  • Standardized firewall policy templates
  • Monthly firewall health review
  • Ongoing security policy updates
  • White-label option (your brand, not ours)
  • Customer-isolated tenancy
  • Change documentation & audit trail
  • Dedicated engineering contact
Talk to Us →

Hardware is not included. SecureEdge runs on your existing OPNsense appliance (bare-metal, Proxmox VM, or supported cloud instance). If you need a new box, we'll spec one with you — typical SMB appliance runs $400–$900.

"

5NinesNet SecureEdge does not replace OPNsense — it makes OPNsense easier to operate, safer to manage, and more useful for real-world security workflows.

— THE 5NINESNET DESIGN PRINCIPLE

The engineer you'll work with.

FB
Farzam Barabian-Eng
CCIE #59401 · NETWORK ARCHITECT
CCIE #59401
CERTIFIED
20+
YEARS
GitHub 5NinesNet

CCIE network architect with 20+ years across enterprise design, operations, and security. Spent that time building, breaking, and rebuilding networks at the layer where vendor marketing meets pf state tables — and got opinionated about what actually matters when something's on fire at 3 AM.

5NinesNet is the home for the work that came out of that — managed network infrastructure that doesn't require a six-figure contract and a year-long deployment to actually use. SecureEdge is part of it: a control plane for OPNsense-based deployments built on the principle that if you can't reproduce it from a clean install in 30 minutes, you don't actually own it.

Production
ISP-scale BGP
Platforms
IOS · ASA · OPNsense
Disciplines
BGP · MPLS · TACACS+

When you engage 5NinesNet, you're not buying a license — you're buying a relationship with the person who wrote the code.

Ready to modernize
your firewall management?

Let 5NinesNet design, deploy, and automate your OPNsense security stack. We'll start with a 30-minute scoping call, review your current setup, and send you a fixed-price package recommendation within 48 hours.

Or email hello@5ninesnet.com directly · typical response within 24 hours