With the end-of-life of Sophos UTM, many organizations face the question of which firewall solution to migrate to. OPNsense stands out as a powerful, open-source alternative. In this article, we explain why the switch makes sense and how the migration can be carried out successfully.
Why Move Away from Sophos UTM?
End-of-Life and End of Support
Sophos has announced the end-of-life for the UTM product line. This means:
- No more security updates after the end of support
- No new features or improvements
- Growing security risk in ongoing operations
- Migration to Sophos XGS or an alternative is necessary
Rising Licensing Costs
- Annual license fees for Sophos products continue to increase
- Hardware-bound licenses restrict flexibility
- Module-based licensing makes the full feature set more expensive
Why OPNsense?
Open Source and Free of Charge
- No licensing costs — the software is completely free
- No vendor lock-in
- Transparent source code reviewed by the community
- Commercial support options available
Feature Set
OPNsense offers a feature set that competes with commercial solutions:
- Stateful Firewall with an intuitive rule set
- VPN — WireGuard, OpenVPN, IPsec
- IDS/IPS with Suricata
- Web Proxy with caching and filtering
- DNS Resolver with Unbound (including DNS-over-TLS)
- DHCP Server and relay
- Captive Portal for guest networks
- Traffic Shaping and QoS
- High Availability with CARP
- Reporting and Monitoring
Regular Updates
- Bi-weekly security updates
- Two major releases per year
- Active community and professional support
Migration Planning
Preparation
-
Inventory of the current Sophos UTM configuration
- Document firewall rules
- Record VPN connections
- List NAT rules
- Back up DNS and DHCP configuration
- Document network interfaces and VLANs
-
Hardware Planning
- OPNsense runs on standard x86 hardware
- Sizing depends on throughput and features
- Recommendation: Intel-based systems with AES-NI
- Plan for sufficient network interfaces
-
Test Environment
- Set up a parallel test environment
- Test the configuration in advance
- Validate VPN connections in the lab
Migrating Firewall Rules
Sophos UTM rules cannot be imported directly. The migration is performed manually:
- Network objects — create as OPNsense aliases
- Firewall rules — recreate them — OPNsense uses a different rule logic (first match)
- NAT rules — transfer manually
- Note: OPNsense blocks by default — create rules explicitly
Migrating VPN Connections
- Site-to-Site IPsec — carry over parameters (IKE version, cipher, PSK/certificates)
- OpenVPN — migrate configuration and certificates
- WireGuard — evaluate as a modern alternative to OpenVPN
- Reconfigure SSL VPN clients for the new setup
DNS and DHCP
- DHCP scopes — recreate in OPNsense
- DNS entries — configure in the Unbound DNS resolver
- Transfer static DHCP leases
Comparison: Sophos UTM vs. OPNsense
| Feature | Sophos UTM | OPNsense |
|---|---|---|
| Licensing Costs | Yes (annual) | None |
| Firewall | Yes | Yes |
| IDS/IPS | Yes | Yes (Suricata) |
| VPN (IPsec) | Yes | Yes |
| VPN (WireGuard) | No | Yes |
| Web Application Firewall | Yes | Plugin (NGINX) |
| Email Filtering | Yes | Plugin |
| Web Proxy | Yes | Yes |
| Reporting | Yes | Yes |
| High Availability | Yes | Yes (CARP) |
| API | Limited | Full |
| Open Source | No | Yes |
Tips for a Successful Migration
- Take it step by step — do not migrate everything at once
- Documentation — record all changes
- Backup — back up OPNsense configuration regularly
- Maintenance window — plan enough time for the switchover
- Rollback plan — keep Sophos UTM available as a fallback
- Monitoring — monitor firewall logs intensively after the migration
Conclusion
Migrating from Sophos UTM to OPNsense is a worthwhile step. OPNsense offers a comparable feature set without ongoing licensing costs and benefits from an active community as well as regular updates. As an experienced OPNsense integrator, we support you with the planning and execution of the migration — from inventory assessment to production operation.
More on these topics:
More articles
Vaultwarden: Self-Hosted Password Manager for Teams
Run Vaultwarden as a self-hosted password manager: Docker deployment, reverse proxy, SMTP, 2FA enforcement, and backup strategy — the complete guide for teams.
Fail2ban: Automating Brute-Force Protection for Linux Servers
Install and configure Fail2ban: log parsing, jail.local, protecting SSH, Nginx, Postfix, and Dovecot, whitelists, email alerts, and a comparison with CrowdSec, sshguard, and CSF.
TrueNAS Dataset Encryption: ZFS Encryption in Practice
Understanding and implementing TrueNAS ZFS Encryption: dataset vs. pool encryption, passphrase vs. key file, key management, and performance impact with AES-NI.