Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Network Security with pfSense
  • Table Of Contents Toc
Network Security with pfSense

Network Security with pfSense

By : Aggarwal
5 (3)
close
close
Network Security with pfSense

Network Security with pfSense

5 (3)
By: Aggarwal

Overview of this book

While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or ‘shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world's most trusted open source network security solution. Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you’ll understand how to configure and integrate pfSense as a Squid proxy server. By the end of this book, you will be able to leverage the power of pfSense to build a secure network.
Table of Contents (7 chapters)
close
close

Testing the Squid proxy server

Back in the Windows 7 client machine, let's confirm the IP address for this client machine. Launch the Command Prompt window and execute ipconfig:

Here, the IP address of this machine is 192.168.1.2. If you check, you will see that this client machine can connect to the internet.

You did not have to make any special configuration for assigning a proxy server to this browser. And, the reason why that is working is because of the setup. The Squid proxy server has been configured as a transparent proxy.

Let's switch to the pfSense webConfigurator in the ACLs section for the Squid proxy server. When you scroll down, you find the option called Banned Hosts Addresses. As discussed earlier, if you add an IP address to this list, Squid proxy will actively reject the requests from that IP address. Effectively, the banned IP addresses or the networks...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Network Security with pfSense
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon