Book Image

Network Security with pfSense

By : Manuj Aggarwal
Book Image

Network Security with pfSense

By: Manuj Aggarwal

Overview of this book

While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or ‘shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world's most trusted open source network security solution. Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you’ll understand how to configure and integrate pfSense as a Squid proxy server. By the end of this book, you will be able to leverage the power of pfSense to build a secure network.
Table of Contents (7 chapters)

Prerequisites

Now, let's review some of the prerequisites you need to take care of before setting up IPsec VPN tunnels in pfSense. When you are trying to establish IPsec tunnels between two networks, you must make sure that both locations are using non-overlapping LAN IP subnets. For example, if both sites are using 10.0.0.0/24 on the LAN segment, the IPsec site-to-site VPN will not work. This is not a limitation in pfSense; it's due to basic IP routing. If the pfSense server is not the default gateway on the LAN where it is installed, then some static routes must be added to the default gateway pointing the remote VPN subnet to the IP address on pfSense in the LAN subnet. You must have good communication with the administrator of the remote network so that you can coordinate the activities that are needed to set up the IPsec tunnel. There are a lot of settings that...