Book Image

Mastering pfSense - Second Edition

By : David Zientara
Book Image

Mastering pfSense - Second Edition

By: David Zientara

Overview of this book

pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features.
Table of Contents (15 chapters)

Chapter 4 – Using pfSense as a Firewall

  1. The principle of least privilege.
  2. Block will drop traffic silently, while Reject will send back a packet (RST for TCP or ICMP Port Unreachable for UDP).
  3. We will be able to connect to Recode; the block rule will have no effect because it was placed after the "Allow LAN to any" rule.
  1. We will not be able to connect to Recode; the block rule will match the traffic to Recode before the “Allow LAN to any” rule.
  2. (a) We will not be able to connect to Recode; the new “default allow” rule will be invoked after the block rule. (b) We will be able to connect to Recode; the new "default allow" rule will be invoked before the block rule. (c) The default "Allow LAN to any" rules have no effect on traffic flow anymore because they are never reached; the floating "default allow&quot...