Book Image

pfSense 2.x Cookbook - Second Edition

By : David Zientara
Book Image

pfSense 2.x Cookbook - Second Edition

By: David Zientara

Overview of this book

pfSense is an open source distribution of the FreeBSD-based firewall that provides a platform for ?exible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important compared to other offerings. pfSense 2.x Cookbook – Second Edition starts by providing you with an understanding of how to complete the basic steps needed to render a pfSense firewall operational. It starts by showing you how to set up different forms of NAT entries and firewall rules and use aliases and scheduling in firewall rules. Moving on, you will learn how to implement a captive portal set up in different ways (no authentication, user manager authentication, and RADIUS authentication), as well as NTP and SNMP configuration. You will then learn how to set up a VPN tunnel with pfSense. The book then focuses on setting up traffic shaping with pfSense, using either the built-in traffic shaping wizard, custom ?oating rules, or Snort. Toward the end, you will set up multiple WAN interfaces, load balancing and failover groups, and a CARP failover group. You will also learn how to bridge interfaces, add static routing entries, and use dynamic routing protocols via third-party packages.
Table of Contents (18 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

Creating a 1:1 NAT entry


This recipe will describe how to create a 1:1 NAT entry. 

1:1 NAT allows us to map a single external IP address to a single internal IP address, or we can map an external network to an internal network. We might have a scenario in which we acquired public IP addresses for different resources—for example, a web server. If the web server is a node on one of our private networks, then we must map the public address to the web server’s private address.

How to do it...

  1. Navigate toFirewall | NAT.
  2. Click on the 1:1 tab.
  1. Click on one of the Add buttons to add a new rule.
  2. In the External subnet IP text field, enter the public IP address:
  1. Enter the private IP address in theInternal IPtext field. Leave the drop-down menu set toSingle host.
  2. Leave Destination set to Any.
  3. Enter a brief description in the Description text field.
  4. When you are done making changes, click on the Save button.
  5. Click on the Apply Changes button.

By adding a 1:1 NAT entry, we can translate an external IP address (or...