Enter your ideas here, and vote for suggestions that other members of our community have made.
Please be sure to add the reason why you need the feature, and if you can give an example of why you need it, all the better.
This area is specifically for Untangle NG Firewall
If you have feedback on Untangle Command Center, please add it to our Command Center feature request community.

Let's Encrypt

Suggested by: Pety (15 Aug, '18) Upvoted: today Comments: 15
Under consideration

dns over tls

Suggested by: Don (07 Aug, '18) Upvoted: 29 Nov Comments: 3
Under consideration

More IPv6 support (DHCPv6-PD) on external

Suggested by: Josh (13 Aug, '18) Upvoted: 2 days ago Comments: 18
Planned

mDNS Service to support certain IoT devices on other VLANs/subnets

Suggested by: Jason Bottjen (09 Aug, '18) Upvoted: today Comments: 11
Under consideration

Support for DHCPv6

Suggested by: Ben Bidwell (15 Aug, '18) Upvoted: 29 Nov Comments: 4
Under consideration

Mobile app to monitor and manage one or more NG Firewalls

Suggested by: Vimal (19 Sep, '18) Upvoted: today Comments: 16
Under consideration

Add Full DNScrypt Package Integration

Suggested by: Tyler Vincent (04 Mar) Upvoted: 02 Dec Comments: 4
Under consideration

Add 2-factor auth to management login

Suggested by: Todd Lynch (28 Nov, '18) Upvoted: today Comments: 17
Under consideration

System and CPU temperature widget with default alert

Suggested by: BrianC (02 Nov, '18) Upvoted: 29 Nov Comments: 8
Under consideration

Option to let user request unblocking of blocked site

Suggested by: BrianC (04 Oct, '18) Upvoted: today Comments: 5
Under consideration

Wireguard VPN support

Suggested by: docfuz (29 Oct, '18) Upvoted: 02 Dec Comments: 5
Planned

Ability to delete DHCP lease

Suggested by: Peter (10 Dec, '18) Upvoted: 02 Dec Comments: 0
Under consideration

on the device page, see the IP address of the device

Suggested by: Dan (18 Oct, '18) Upvoted: 26 Nov Comments: 1
Under consideration

Add support for link aggregation (802.3ad & LACP)

Suggested by: Ben M. (11 Mar) Upvoted: 22 Nov Comments: 3
Under consideration

internet speed test

Suggested by: hussain (04 Jan) Upvoted: today Comments: 5
Under consideration

True High Availability, not just failover

Suggested by: Brian (10 Sep, '18) Upvoted: 25 Nov Comments: 4
Under consideration

aliases and groups

Suggested by: ntguru (14 Jan) Upvoted: 01 Dec Comments: 4
Under consideration

Time quota-based policy management.

Suggested by: Rob (25 Aug, '18) Upvoted: yesterday Comments: 4
Under consideration

Support for Raspberry Pi 4

Suggested by: Phil Burgess (26 Jun) Upvoted: today Comments: 2
Under consideration

Support for Untangle install on UEFI BIOS MB

Suggested by: Daniel Alexoiu (22 Dec, '18) Upvoted: 25 Nov Comments: 6
Under consideration

Implement IP Address Groups to simplify rule creation

Suggested by: BrianC (27 Nov, '18) Upvoted: yesterday Comments: 3
Under consideration

Country info to new Intrusion Prevention

Suggested by: Jason Statham (18 Nov, '18) Upvoted: 29 Nov Comments: 0
Under consideration

Dark Mode UI

Suggested by: TommyC (11 Mar) Upvoted: yesterday Comments: 1
Under consideration

ZeroTier

Suggested by: Adam Markley (05 Feb) Upvoted: today Comments: 0
Under consideration

UPS support

Suggested by: RainCaster (29 May) Upvoted: yesterday Comments: 1
Under consideration

Share license with hot spare Untangle (VRRP)

Suggested by: Miguel (04 Dec, '18) Upvoted: 01 Nov Comments: 7
Under consideration

Keyword Filter - block web content exceeding keyword threshold

Suggested by: BrianC (29 Aug, '18) Upvoted: 20 Jul Comments: 2
Under consideration

IFTTT Integration with Untangle

Suggested by: Jason Bottjen (09 Aug, '18) Upvoted: 10 Sep Comments: 2
Under consideration

IPTV and igmp / igmp-proxy (and multicast?)

Suggested by: Ole Simen (13 Dec, '18) Upvoted: 29 Nov Comments: 0
Under consideration

Easy way to block IP's, or ranges, from Port Forward reports

Suggested by: Heather P (29 Oct, '18) Upvoted: 26 Nov Comments: 0
Under consideration

Please keep rack theme

Suggested by: Don (19 Sep, '18) Upvoted: 25 Oct Comments: 9
Done

Implement service definitions to simplify rule creation

Suggested by: BrianC (14 Aug, '18) Upvoted: 26 Nov Comments: 5
Under consideration

Force kid-friendly search engine

Suggested by: Rick Guetter (26 Nov, '18) Upvoted: 22 Nov Comments: 2
Planned

cake for better bufferbloat and latency management

Suggested by: Dave Taht (29 Jul) Upvoted: yesterday Comments: 1
Under consideration

SSL Inspector- Add Ignore rule this cert

Suggested by: Jason (02 Jan) Upvoted: 28 Nov Comments: 1
Under consideration

easy way to allow all Microsoft 365 URLs

Suggested by: Dan C. (20 Nov, '18) Upvoted: 04 Nov Comments: 4
Under consideration

Web Filter Block Page Customization

Suggested by: Brian Jefferson (08 Nov, '18) Upvoted: 26 Nov Comments: 2
Under consideration

Dynamic DNS for WAN2 public IP

Suggested by: Geric George (02 Nov, '18) Upvoted: 27 Oct Comments: 3
Under consideration

Image Altering for images on pages allowed through filter

Suggested by: Charles (22 Jan) Upvoted: 25 Jul Comments: 0
Under consideration

allow adding DNS static entries from static DHCP.

Suggested by: Geric George (02 Nov, '18) Upvoted: 25 Nov Comments: 0
Under consideration

Bypass by URL

Suggested by: Adam (28 Jan) Upvoted: 02 Dec Comments: 1
Under consideration

Zero Touch Provisioning

Suggested by: Feature Upvote Team (15 Jun, '18) Upvoted: 15 Nov Comments: 2
Done

Tunnel DNS over VPN.

Suggested by: Tony (25 Jan) Upvoted: yesterday Comments: 0
Under consideration

DNS Blocking with PiHole like integration

Suggested by: Austin Theen (16 Apr) Upvoted: 12 Nov Comments: 1
Under consideration

Add more filtering conditions to TunnelVPN

Suggested by: Ron Abellera (19 Jan) Upvoted: 28 Nov Comments: 1
Under consideration

HotSpot Voucher

Suggested by: Rogelino Calma (16 Aug, '18) Upvoted: 08 Oct Comments: 0
Under consideration

Have traffic logs in standard formats

Suggested by: Pablo Destefanis (28 Sep, '18) Upvoted: 12 Sep Comments: 3
Under consideration

Recently Updated

Suggested by: Jonathan Gaedke (03 Apr) Upvoted: 21 Sep Comments: 1
Under consideration

OpenVPN - Set one address as primary and one as secondary, go back to primary after fail

Suggested by: Dennis Cantrell (04 Feb) Upvoted: 11 Oct Comments: 1
Under consideration

Add new