Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Learn pfSense 2.4

You're reading from   Learn pfSense 2.4 Get up and running with Pfsense and all the core concepts to build firewall and routing solutions

Arrow left icon
Product type Paperback
Published in Jul 2018
Publisher
ISBN-13 9781789343113
Length 346 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
David Zientara David Zientara
Author Profile Icon David Zientara
David Zientara
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
1. Getting Started with pfSense FREE CHAPTER 2. Installing pfSense 3. Configuring pfSense 4. Captive Portal 5. Additional pfSense Services 6. Firewall and NAT 7. Traffic Shaping 8. Virtual Private Networks 9. Multiple WANs 10. Routing and Bridging 11. Diagnostics and Troubleshooting 1. Assessments 2. Other Books You May Enjoy Index

Preface

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this – and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense.This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.

Who this book is for

This book is towards any network security professionals who want to get introduced to the world of firewalls and network configurations using Pfsense. No prior knowledge of PfSense is required.

What this book covers

Chapter 1, Getting Started with pfSense, discusses about a brief history of the pfSense project and the role it can play in a network and in the pfSense community

Chapter 2, Installing pfSense, discusses the role a pfSense router/firewall plays in a typical network considering the different deployment scenarios. The initial process is covered from the initial installion from either CD or USB memstick through the completion of the web GUI setup wizard

Chapter 3, Configuring pfSense, takes us through advanced options such as customizing the web GUI, SSH login, configuring additional interfaces, and IPv6 configuration along with how to back up, restore and update your pfSense system

Chapter 4, Captive Portal, describes how to set up a captive portal in pfSense, how to leverage the numerous options available, and how to implement different authentication options and how to use vouchers

Chapter 5, Additional pfSense Services, takes through services such as DNS, Dynamic DNS, NTP, and SNMP in detail along with their examples

Chapter 6, Firewall and NAT, covers using firewall rules to block and allow traffic, and how to use scheduling and aliases to make the process easier. 

Chapter 7, Traffic Shaping, covers how to use traffic shaping, including traffic shaping using the wizard and manual configuration, as well as how to configure floating rules for traffic shaping, as well as options for deep packet inspection

Chapter 8, Virtual Private Networks, includes when and how to use virtual private networks (VPNs) to provide an encrypted tunnel. L2TP, IPsec and OpenVPN protocols are discussed, as well as how to set up both a peer-to-peer and client-server tunnel

Chapter 9, Multiple WANs, covers common scenarios for using multiple WANs, such as bandwidth aggregation and failover, and how to set up gateways and gateway groups in pfSense

Chapter 10, Routing and Bridging, discusses what routing and bridging are, when it is possible or necessary to employ them, as well as how to perform static and dynamic routing in pfSense

Chapter 11, Diagnostics and Troubleshooting, deals with what to do when pfSense does not function as expected. A step-by-step process for solving and documenting problems is outlined, common problems are enumerated, different diagnostic tools are discussed, and example problems are presented

To get the most out of this book

Some familiarity with Linux and/or BSD would be helpful, as well as access to a computer that is capable of running pfSense (any modern PC should do). The specifications for such a PC will be discussed in detail in the section regarding hardware sizing guidelines, but in brief, you will need a PC with a 64-bit, AES-NI-capable processor, 1 GB of RAM, and 1 GB of storage.

To get along with the book, you can find detailed technical requirement at the beginning of each chapter.

 

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "There is a packet with a source address of 192.168.2.1"

A block of code is set as follows:

html, body, #map {
 height: 100%; 
 margin: 0;
 padding: 0
}

Any command-line input or output is written as follows:

ping: unknown host google.com

Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "To begin, navigate to Firewall | Rules."

Note

Warnings or important notes appear like this.

Note

Tips and tricks appear like this.

Get in touch

Feedback from our readers is always welcome.

General feedback: Email [email protected] and mention the book title in the subject of your message. If you have questions about any aspect of this book, please email us at [email protected].

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packtpub.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.

Piracy: If you come across any illegal copies of our works in any form on the Internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Reviews

Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!

For more information about Packt, please visit packtpub.com.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime
Visually different images