With the improvements that have come to the networking stack, how many of made the jump to a UDM device from pfsense, opnsense, Sophos XG etc. I’m running these on ex Sophos XG hardware, XG 135 Rev3 and XG230 Rev2 units, been rock solid.
I’ve been running Unifi networking for a while, but not used their gateway products since getting a UDM-PRO in 2020, was left very unimpressed that I went back to a 3rd party gateway.
Those that have migrated, have you stayed with the Unfi solution or migrated back?
It’s just a home setup, but multiple S2S VPNs, Wireguard, OpenVPN and IPSec in use.
I have a NVR and cloud gateway plus in the rack and the benefit would be that I’d consolidate these into the SE. I currently use Network, Talk and Protect. NVR has a pair of 12TB WD Purple drives, yes I know the SE is only a single drive.
Unifi stack compromises of:
US-8, Switch Flex, Switch Flex 2.5G 5, USW Flex Mini, USW-Lite-16-PoE, USW-Pro-48-PoE, AC Mesh, U6-Pro
The 48 Port is less than half populated, but I picked it up on a decent deal and could use the 10Gb DAC connection between the SE as an uplink. Equally I could migrate all the downlink connections to the SE and change to a 24 Port PoE switch etc.
Multi WAN setup, Virgin Media (1000/100) as primary with Smarty as backup, UK ISPs.
The SE is about £474 in the UK, so not a cheap unit at all.
Stick with 3rd party or migrate? I work in enterprise IT, so do spend a fair amount of time spinning up solutions, vMware, Proxmox for hosting things etc.
What I’ve never liked re Unifi is the lack of crypto acceleration unlike AES-NI, QAT etc. If they are they’re not disclosing the SoC capabilities. So what is their real world VPN performance like, I asked them about these items at the UK Unifi conference along with certificate based IPSec connections rather than PSK, they just dodged the questions tbh.
I see things like port forwarding is quite basic unlike the others were I can get more specific relating to ASN / geo source etc. these are leveraged from pfblockerng on pfsense. Sophos XG I can’t import ASNs, so for some of the rules I’ve added the IP subnets to a network group and configured that way, fine for small groups.
Under Sophos XG Home I have VPN connections integrated with AD and Entra connections.
If I recall from Tom’s video it was circa 25w for a UDM-MAX power draw. Power consolidation is another potential benefit due to high energy costs.
I do wonder what is coming network 10 etc. whether they will be more advanced configurations or just refining what is there.