Book Image

Mastering pfSense - Second Edition

By : David Zientara
Book Image

Mastering pfSense - Second Edition

By: David Zientara

Overview of this book

pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features.
Table of Contents (15 chapters)

Summary

In this chapter, we covered NAT, the reasons it was implemented, and the issues that it raises. We also covered both Static NAT, or 1:1 NAT, and Dynamic NAT, which covers both Outbound NAT and Port Forwarding. Although understanding all of these types of NAT are key to a thorough understanding of the technology, we also acknowledged that Port Forwarding is most commonly equated with NAT, and is probably the most likely form of NAT you will utilize. We also covered NPt, which is a rarely used method of mapping IPv6 public addresses to IPv6 private addresses, but does have its applications, particularly with multihoming.

Understanding this chapter is important, as we will return to NAT in subsequent chapters. For example, in Chapter 7, Virtual Private Networks (VPNs), we will use Outbound NAT to redirect traffic when setting up VPN tunnels. At the very least, you will want...