Book Image

Mastering pfSense - Second Edition

By : David Zientara
Book Image

Mastering pfSense - Second Edition

By: David Zientara

Overview of this book

pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features.
Table of Contents (15 chapters)

Network Address Translation

At some point, you will likely need to utilize Network Address Translation (NAT), which, as the name implies, is a way of mapping one address space into another address space. When commonly referred to, NAT is often equated with port forwarding, a form of NAT that allows a computer on a public network (such as the internet) to connect to a computer on a private network by remapping the IP address and port. In reality, however, there are two broad categories of NAT. 1:1 NAT is a form of remapping public IP addresses to private IP addresses in such a way that each public IP address corresponds to a single private IP address. One-to-many NAT, on the other hand, deals with the scenario in which there is a single public IP address shared by several nodes with private IP addresses.

The goal of this chapter is to demonstrate NAT in all its forms. If you have...