Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying pfSense 2.x Cookbook
  • Table Of Contents Toc
pfSense 2.x Cookbook

pfSense 2.x Cookbook - Second Edition

By : David Zientara
5 (1)
close
close
pfSense 2.x Cookbook

pfSense 2.x Cookbook

5 (1)
By: David Zientara

Overview of this book

pfSense is an open source distribution of the FreeBSD-based firewall that provides a platform for ?exible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important compared to other offerings. pfSense 2.x Cookbook – Second Edition starts by providing you with an understanding of how to complete the basic steps needed to render a pfSense firewall operational. It starts by showing you how to set up different forms of NAT entries and firewall rules and use aliases and scheduling in firewall rules. Moving on, you will learn how to implement a captive portal set up in different ways (no authentication, user manager authentication, and RADIUS authentication), as well as NTP and SNMP configuration. You will then learn how to set up a VPN tunnel with pfSense. The book then focuses on setting up traffic shaping with pfSense, using either the built-in traffic shaping wizard, custom ?oating rules, or Snort. Toward the end, you will set up multiple WAN interfaces, load balancing and failover groups, and a CARP failover group. You will also learn how to bridge interfaces, add static routing entries, and use dynamic routing protocols via third-party packages.
Table of Contents (13 chapters)
close
close

Determining our interface requirements

This section will help us determine our interface requirements by analyzing our network design. We will make use of our network diagram to understand how many interfaces our network will require.

Let's begin by analyzing our network design:

We can see that our environment consists of four separate interfaces:

  • Wide Area Network (WAN): Directly connects to our cable modem, which in turn provides access to the internet.
  • Local Area Network (LAN): Our primary internal network.
  • Demilitarized Zone (DMZ): Our internal network, on which we allow external access. Our web servers belong to this interface.
  • Wireless guest network (GUEST WIFI): We've created this network for the convenience of guests. They can all connect with an easy-to-remember password (or perhaps no password at all) and surf the web. We consider this interface insecure...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
pfSense 2.x Cookbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon