Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering pfSense
  • Table Of Contents Toc
Mastering pfSense

Mastering pfSense - Second Edition

By : David Zientara
3.3 (4)
close
close
Mastering pfSense

Mastering pfSense

3.3 (4)
By: David Zientara

Overview of this book

pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features.
Table of Contents (15 chapters)
close
close

Questions

Answer the following questions:

  1. What is the final step in troubleshooting a networking problem?
  2. A site can be reached by pinging the IP address but pinging the hostname fails. What is a likely cause of this?
  3. Name a wireless standard that uses the 2.4 GHz range (there are two).
  4. Which wireless encryption standard sends challenges in the clear and is generally considered insecure now?
  5. Identify a method of determining whether an interface is up or down from within the pfSense web GUI.
  6. What tool can be used to monitor the pfSense state table, and can be used from within the web GUI or the command line?
  7. What tool can be used to ping a site that blocks ICMP traffic but allows TCP traffic?
  8. What are the two main purposes of traceroute?

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Mastering pfSense
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon