← Back to Guides Homepage

How to Automatically Back Up pfSense (Free)

In this guide, you will learn how to automatically back up your pfSense firewall using the free AutoConfigBackup (ACB) service provided by Netgate. While manual local backups are possible via Diagnostics > Backup and Restore, ACB offers a secure, encrypted cloud alternative.

Part 1: Enabling AutoConfigBackup

The AutoConfigBackup service is built into pfSense Community Edition but must be explicitly enabled and configured.

1. Access the Service

Log in to your pfSense web interface. Navigate to Services and select AutoConfigBackup.

2. Configure Settings

In the "Settings" tab, configure the following fields:

3. Device Key and Encryption (Critical)

The Device Key is unique to your installation. This key works for both physical hardware and virtual machines.

Important: Copy your Device Key and save it in a secure location, such as a password manager. You will need this key to restore your configuration if you reinstall pfSense.

Next, set an Encryption Password. This password encrypts your data before it is sent to Netgate's servers. Choose a strong password and verify it.

4. Optional Identifiers

You can set a "Hint/Identifier" (e.g., "TSS firewall one") to help identify the device if you need support or have multiple firewalls.

Once configured, click Save.

Part 2: Creating and Restoring Backups

Once enabled, the system will back up automatically on changes, but you can also trigger manual backups and restore from the cloud.

1. Run a Manual Backup

Go to the Backup Now tab within the AutoConfigBackup menu.

2. How to Restore

To verify the backup works, you can simulate a failure (e.g., deleting a dashboard widget). To recover:

  1. Navigate to the Restore tab.
  2. Locate the backup you wish to use (e.g., "Test 1"). You can view the configuration or download it before restoring.
  3. Click the Restore icon (often a circular arrow).
  4. Confirm the prompt "Are you sure you wish to restore..." by clicking OK.

The system will confirm that the configuration has been reverted. While some changes take effect immediately (like dashboard widgets), it is recommended to reboot the firewall to fully activate critical changes like rules or interface assignments.

← Back to Guides Homepage