Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Mastering pfSense

You're reading from   Mastering pfSense Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4

Arrow left icon
Product type Paperback
Published in May 2018
Publisher
ISBN-13 9781788993173
Length 450 pages
Edition 2nd Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
David Zientara David Zientara
Author Profile Icon David Zientara
David Zientara
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Title Page
Dedication
Packt Upsell
Contributors
Preface
1. Revisiting pfSense Basics FREE CHAPTER 2. Advanced pfSense Configuration 3. VLANs 4. Using pfSense as a Firewall 5. Network Address Translation 6. Traffic Shaping 7. Virtual Private Networks 8. Redundancy and High Availability 9. Multiple WANs 10. Routing and Bridging 11. Extending pfSense with Packages 12. Diagnostics and Troubleshooting 1. Assessments 2. Another Book You May Enjoy Index

Index

A

  • access control list (ACL) / HAProxy – a brief overview, Squid
  • Address Resolution Protocol (ARP) / Nmap, ping
  • Advanced Encryption Standard (AES) / AES-NI
  • Advanced RISC Machines (ARM) / pfSense project overview
  • AES-GCM / pfSense project overview
  • AES-NI / AES-NI
  • aliases
    • about / Aliases
    • creating / Aliases
    • creating, from DNS lookup / Creating aliases from a DNS lookup
    • bulk import / Bulk import
  • Authentication Headers (AH) / IPsec
  • automatic interface assignment / Configuration from the console
  • automatic IP assignment / DHCP configuration at the console
  • autonomous system (AS) / Quagga OSPF

B

  • backup designated router (BDR) / Quagga OSPF
  • black hole / Black holes
  • Border Gateway Protocol (BGP) / Possible deployment scenarios, Routing
  • bridging
    • about / Bridging, Bridging
    • advantages / Bridging
    • limitations / Bridging
    • spanning tree, implementing / Bridging
    • interfaces / Bridging interfaces
    • issues / Special issues
    • with CARP / Special issues
    • example / Bridging example
    • troubleshooting / Troubleshooting
  • bufferbloat / Changes to queues

C

  • C-Ports (community) / Example 2 – IoT network
  • captive portal
    • about / Captive portal
    • implementing / Implementing captive portal
    • user manager authentication / User manager authentication
    • voucher authentication / Voucher authentication
    • RADIUS authentication / RADIUS authentication
    • other settings / Other settings
    • troubleshooting / Troubleshooting captive portal
  • Certificate Authority (CA) / IPsec peer/server configuration, Squid
  • Certificate Revocation List (CRL) / IPsec mobile client configuration
  • Challenge Handshake Authentication Protocol (CHAP) / RADIUS authentication, L2TP
  • Cisco Discovery Protocol (CDP) / Troubleshooting, Important packages
  • Cisco switch
    • about / VLAN configuration example 2 – Cisco switches
    • static VLAN creation / Static VLAN creation
    • Dynamic Trunking Protocol (DTP) / Dynamic Trunking Protocol
    • VLAN Trunking Protocol / VLAN Trunking Protocol
  • Cisco switches, command-line tools
    • showip route / Troubleshooting
    • showip interface brief / Troubleshooting
    • showcdp neighbors / Troubleshooting
  • class-based queuing (CBQ) / Queuing policies, Class-based queuing, The Multiple LAN/WAN Configuration wizard
  • Classless Inter-Domain Routing (CIDR) / NAT essentials
  • client-side load balancing / Basic concepts
  • Code Red worm / Firewall fundamentals
  • Common Address Redundancy Protocol (CARP)
    • about / DHCP configuration in the web GUI, Creating and editing firewall rules, Basic concepts
    • configuration / CARP configuration
    • with two firewalls, example / Example 1 – CARP with two firewalls
    • with N firewalls, example / Example 2 – CARP with N firewalls
    • with load balancing, example / An example of both load balancing and CARP
    • troubleshooting / Troubleshooting
    • with multi-WAN, example / Example – multi-WAN and CARP
    • bridged interfaces, using / Special issues
  • Common Name (CN) / Other settings
  • Coordinated Universal Time (CUT) / NTP
  • cross-site request forgery (CSRF) / General setup options

D

  • dashboard / Dashboard
  • DCC (Direct Client-to-Client) / Example 1 – setting up DCC
  • DDNS
    • about / DDNS
    • updating / DDNS updating
    • RFC 2136, updating / RFC 2136 updating
    • troubleshooting / Troubleshooting DDNS
  • Dedicated Links wizard / The Dedicated Links wizard
  • deep packet Inspection (DPI) / Layer 7 traffic shaping
  • delegated prefixes / DHCP and DHCPv6 leases
  • demilitarized zone (DMZ) / Possible deployment scenarios
  • designated port (DP) / Bridging
  • designated router (DR) / Quagga OSPF
  • distance-vector routing protocols / Routing
  • DMZ network / An example of both load balancing and CARP
  • DNS
    • about / DNS
    • DNS resolver / DNS resolver
    • DNS forwarder / DNS forwarder
    • firewall rules / DNS firewall rules
    • considerations, for multi-WAN / DNS considerations
  • DNS lookup
    • aliases, creating / Creating aliases from a DNS lookup
  • DNS resolver
    • general settings / General Settings
    • DNSSEC support, enabling / Enable DNSSEC support
    • Host Overrides / Host Overrides and Domain Overrides
    • Domain Overrides / Host Overrides and Domain Overrides
    • access lists / Access Lists
  • Don't Fragment (DF) flag / Black holes
  • Don't Route or Peer (DROP) / Best practices for egress filtering
  • double tagging / Hardware, configuration, and security considerations
  • dummynet / Limiters
  • Dynamic Host Configuration Protocol (DHCP)
    • about / Possible deployment scenarios, DHCP
    • configuration, at console / DHCP configuration at the console
    • configuration, in web GUI / DHCP configuration in the web GUI
    • DHCPv6 configuration, in web GUI / DHCPv6 configuration in the web GUI
    • and DHCPv6 relay / DHCP and DHCPv6 relay
    • and DHCPv6 leases / DHCP and DHCPv6 leases
  • Dynamic NAT / NAT essentials
  • dynamic routing
    • about / Routing, Dynamic routing
    • third-party packages / Dynamic routing
    • RIP / RIP
    • OpenBGPD / OpenBGPD
    • Quagga OSPF / Quagga OSPF
    • FRRouting (FRR) / FRRouting
  • dynamic routing, protocols
    • Routing Information Protocol (RIP) / Routing
    • Open Shortest Path First (OSPF) / Routing
    • Interior Gateway Routing Protocol (IGRP) / Routing
    • Enhanced Interior Gateway Routing Protocol (EIGRP) / Routing
    • Border Gateway Protocol (BGP) / Routing
  • Dynamic Trunking Protocol (DTP) / Dynamic Trunking Protocol

E

  • egress filtering
    • best practices / Best practices for egress filtering
  • Emerging Threats (ET) / Snort
  • Encapsulating Security Payload (ESP) / IPsec
  • Enhanced Interior Gateway Routing Protocol (EIGRP) / Routing
  • Extended Authentication (Xauth) / IPsec mobile client configuration
  • Extensible Authentication Protocol (EAP)
    • about / IPsec mobile client configuration, RADIUS issues
    • EAP Transport Layer Security (EAP-TLS) / RADIUS issues
    • Protected Extensible Authentication Protocol (PEAP) / RADIUS issues
    • EAP Tunneled Transport Layer Security (EAP-TTLS) / RADIUS issues
    • EAP Flexible Authentication via Secure Tunneling (EAP-FAST) / RADIUS issues
  • Extensible Markup Language – Remote Procedure Call (XML-RPC) / Basic concepts
  • Extreme Discovery Protocol (EDP) / Important packages

F

  • Far end crosstalk (FEXT) / Physical issues
  • firewall
    • technical requisites / Technical requirements
    • example network / An example network
    • fundamentals / Firewall fundamentals
    • best practices / Firewall best practices
    • ingress filtering, best practices / Best practices for ingress filtering
    • egress filtering, best practices / Best practices for egress filtering
  • firewall rules
    • creating / Creating and editing firewall rules
    • editing / Creating and editing firewall rules
    • Pass rule / Creating and editing firewall rules
    • Block rule / Creating and editing firewall rules
    • Reject rule / Creating and editing firewall rules
    • floating firewall rules, creating / Floating rules
    • example / Example rules
    • website, blocking / Example 1 – block a website
    • traffic, blocking from other networks / Example 2 – block all traffic from other networks
    • default allow rule, implementing / Example 3 – the default allow rule
    • troubleshooting / Troubleshooting firewall rules
  • firewall states
    • viewing / Firewall states
    • States / States
    • States Summary / States summary
    • pfTop / pfTop
  • first come, first served (FCFS) / Queuing policies
  • Foundry Discovery Protocol (FDP) / Important packages
  • FRRouting (FRR) / FRRouting, FRRouting
  • fully qualified domain name (FQDN) / General setup options, Aliases, Traffic graphs

G

  • gateway load balancing / Basic concepts
  • Global Positioning System (GPS) / NTP
  • gwled / Third-party packages

H

  • hardware requisites / Hardware requirements and sizing guidelines, Minimum hardware requirements
  • hardware sizing guidelines / Hardware requirements and sizing guidelines, Hardware sizing guidelines
  • Hash Algorithm / IPsec peer/server configuration
  • Hierarchical Fair Service Curve (HFSC) / Queuing policies, Hierarchical Fair Service Curve, The Multiple LAN/WAN Configuration wizard
  • High Availability Proxy (HAProxy)
    • overview / HAProxy – a brief overview
    • about / HAProxy – a brief overview, HAProxy
    • web server, load balancing / Example – load balancing a web server
  • hop / Routing

I

  • Identity Association (IA) / DHCP and DHCPv6 leases
  • ingress filtering
    • best practices / Best practices for ingress filtering
    • network ingress filtering / Best practices for ingress filtering
    • for multihomed networks / Best practices for ingress filtering
  • interfaces
    • bridging / Bridging interfaces
    • about / Interfaces
  • Interior Gateway Routing Protocol (IGRP) / Routing
  • Internet Control Message Protocol (ICMP) / ping
  • Internet Engineering Task Force (IETF) / Best practices for ingress filtering
  • Internet Key Exchange (IKE) / IPsec
  • Internet Relay Chat (IRC) / Example 1 – setting up DCC
  • Internet Security and Key Management Protocol (ISAKMP) / IPsec
  • IPsec
    • about / IPsec, IPsec 
    • configuration / IPsec peer/server configuration
    • mobile client configuration / IPsec mobile client configuration
    • site-to-site IPsec configuration / Example 1 – Site-to-site IPsec configuration
    • tunnel, using for remote access / Example 2 – IPsec tunnel for remote access
  • IPsec connection mode
    • transport mode / IPsec
    • tunnel mode / IPsec

K

  • Kerberized Internet Negotiation of Keys (KINK) / IPsec

L

  • L2TP Access Concentrator (LAC) / L2TP
  • L2TP Network Server (LNS) / L2TP
  • LAN IP address / Configuration from the web GUI
  • Layer 2 Tunneling Protocol (L2TP) / Configuration from the web GUI, L2TP, L2TP
  • layer 7 traffic shaping / Layer 7 traffic shaping
  • limiters
    • about / Limiters
    • adding / Example 1 – adding limiters
  • link-state routing protocols / Routing
  • link aggregation / Link aggregation
  • Link Layer Discovery Protocol (LLDP) / Important packages
  • load balancing
    • about / Basic concepts
    • server load balancing / Basic concepts
    • gateway load balancing / Basic concepts
    • with CARP, example / An example of both load balancing and CARP
    • troubleshooting / Troubleshooting

M

  • managed address configuration / DHCPv6 configuration in the web GUI
  • management information bases (MIBs) / SNMP
  • maximum segment size (MSS) / Black holes
  • maximum transmission unit (MTU) / Hardware sizing guidelines, Hardware, configuration, and security considerations, Black holes
  • MD5 / IPsec peer/server configuration
  • Media Gateway Control Protocol (MGCP) / The Multiple LAN/WAN Configuration wizard
  • metropolitan area networks (MANs) / Physical issues
  • Microsoft Management Console (MMC) / Choosing a VPN protocol
  • modes, Snort
    • packet sniffing mode / Snort
    • packet logging mode / Snort
    • network intrusion prevention mode / Snort
  • monitoring / Monitoring
  • MS-CHAPv2 / L2TP
  • multi-WAN
    • technical requisites / Technical requirements
    • basic concepts / Basic concepts
    • Service Level Agreement (SLA) / Service Level Agreement 
    • configuring / Multi-WAN configuration
    • DNS configuration / Multi-WAN configuration
    • gateway, setting up / Multi-WAN configuration
    • gateway group, configuring / Multi-WAN configuration
    • failover groups, configuring / Multi-WAN configuration
    • floating rule, creating / Multi-WAN configuration
    • static route, setting up / Multi-WAN configuration
    • gateway group, verifying / Multi-WAN configuration
    • DNS, considerations / DNS considerations
    • Network Address Translation (NAT), considerations / NAT considerations
    • third-party packages / Third-party packages
    • with CARP, example / Example – multi-WAN and CARP
    • troubleshooting / Troubleshooting
  • Multiple Lan/Wan Configuration wizard / The Multiple LAN/WAN Configuration wizard

N

  • Near end crosstalk (NEXT) / Physical issues
  • net neutrality / Traffic shaping essentials
  • netstat / netstat
  • netstat, options
    • -faddress_family / netstat
    • -p protocol / netstat
    • -r / netstat
    • -rs / netstat
    • -n / netstat
    • -W / netstat
  • Network Address Translation (NAT)
    • essentials / NAT essentials
    • considerations, for multi-WAN / NAT considerations
  • networking problems
    • about / Common networking problems
    • wrong subnet mask or gateway / Wrong subnet mask or gateway
    • wrong DNS configuration / Wrong DNS configuration
    • duplicate IP addresses / Duplicate IP addresses
    • network loops / Network loops
    • routing issues / Routing issues
    • port configuration / Port configuration
    • black holes / Black holes
    • physical issues / Physical issues
    • wireless issues / Wireless issues
    • RADIUS issues / RADIUS issues
  • network interface card (NIC) / Possible deployment scenarios
  • network management station (NMS) / SNMP
  • network map (nmap) / Nmap
  • Network Prefix Translation (NPt)
    • about / NAT essentials, Network Prefix Translation
    • IPv6 network, mapping / Example – mapping an IPv6 network
  • Network Time Protocol (NTP) / Configuration from the web GUI, NTP
  • non-broadcast (NMBA) networks / Quagga OSPF
  • ntop / Hardware sizing guidelines
  • ntopng / ntopng

O

  • one-to-one NAT
    • about / 1:1 NAT
    • file server, mapping / Example – mapping a file server
    • troubleshooting / Troubleshooting 
  • OpenBGPD / OpenBGPD
  • Open Shortest Path First (OSPF) / Routing
  • OpenVPN
    • about / OpenVPN, OpenVPN
    • AES-NI / AES-NI
    • URL / Choosing a VPN protocol
    • server configuration / OpenVPN server configuration
    • client configuration / OpenVPN client configuration
    • client-specific overrides / Client-specific overrides
    • server configuration, with wizard / Server configuration with the wizard
    • Client Export Utility / OpenVPN Client Export Utility
    • site-to-site OpenVPN configuration / Example – site-to-site OpenVPN configuration
  • OpenVPN 2.4.x / pfSense project overview
  • Organizationally Unique Identifier (OUI) / Configuration from the web GUI
  • OSI model
    • physical layer / Troubleshooting basics
    • data link layer / Troubleshooting basics
    • network layer / Troubleshooting basics
    • transport layer / Troubleshooting basics
    • session layer / Troubleshooting basics
    • presentation layer / Troubleshooting basics
    • application layer / Troubleshooting basics
  • Outbound NAT
    • about / NAT essentials, Outbound NAT
    • filtering, for single network / Example – filtering outbound NAT for a single network

P

  • P-Ports (promiscuous) / Example 2 – IoT network
  • Password Authentication Protocol (PAP) / RADIUS authentication, L2TP
  • Path MTU Discovery (PMTUD) / IPsec mobile client configuration, Black holes
  • Payment Card Industry Data Security Standard (PCI DSS) / Firewall best practices
  • peer-to-peer (P2P) / The Multiple LAN/WAN Configuration wizard
  • peer-to-peer traffic
    • penalizing / Example 2 – penalizing peer-to-peer traffic
  • Penalty Box / The Multiple LAN/WAN Configuration wizard
  • pfBlocker / Hardware sizing guidelines
  • pfBlockerNG / pfBlockerNG
  • pfSense
    • technical requisites / Technical requirements
    • overview / pfSense project overview
    • deployment scenarios / Possible deployment scenarios
    • URL / Minimum hardware requirements
    • configuration, best practices / The best practices for installation and configuration
    • installation, best practices / The best practices for installation and configuration
    • configuration / pfSense configuration
    • configuration, from console / Configuration from the console
    • configuration, from web GUI / Configuration from the web GUI
    • additional interfaces, configuring / Configuring additional interfaces
    • additional WAN configuration / Additional WAN configuration
    • setting up / General setup options
    • configuration, verifying / Verifying pfSense configuration
  • pfSense forum
    • URL / Special issues
  • pfSense packages
    • considerations / Basic considerations
    • installing / Installing packages
    • about / Important packages, Other packages
    • acme / Important packages
    • frr / Important packages
    • lldpd / Important packages
    • net-snmp / Important packages
    • telegraf / Important packages
    • tftpd / Important packages
    • Squid / Squid
    • pfBlockerNG / pfBlockerNG
    • ntopng / ntopng
    • nmap / Nmap
    • HAProxy / HAProxy
    • snort / Snort
    • FRRouting / FRRouting
    • Zabbix / Zabbix
  • ping / Nmap, ping
  • ping, options
    • -c count / ping
    • -D / ping
    • -f / ping
    • -i wait / ping
    • -mttl / ping
    • -S source_addr / ping
    • -s packetsize / ping
    • -t timeout / ping
    • -v / ping
  • Point-to-Point Protocol over Ethernet (PPPoE) / Configuration from the web GUI, CARP configuration
  • Point-to-Point Tunneling Protocol (PPTP) / pfSense project overview, Configuration from the web GUI, Choosing a VPN protocol
  • policy-based routing / Service Level Agreement 
  • port forwarding
    • about / Port forwarding
    • DCC, setting up / Example 1 – setting up DCC
    • port, excluding / Example 2 – excluding a port
    • personal web server, setting up / Example 3 – setting up a personal web server
  • PPP (Point-to-Point Protocol) / Configuration from the web GUI
  • PPS (packets per second) / Troubleshooting traffic shaping
  • Prioritize network gaming traffic / The Multiple LAN/WAN Configuration wizard
  • priority queuing (PRIQ) / Queuing policies, Priority queuing, The Multiple LAN/WAN Configuration wizard
  • private VLANs (PVLANs) / Example 2 – IoT network
  • Protected Access Credential (PAC) / RADIUS issues
  • Pulse Per Second (PPS) / NTP
  • PVID (Port VLAN ID) / VLAN configuration problem

Q

  • QinQ / QinQ
  • Quagga OSPF
    • installing / Quagga OSPF

R

  • Radio frequency interference (RFI) / Physical issues
  • Random Early Detection (RED) / Changes to queues
  • Rapid Spanning Tree Protocol (RSTP) / Bridging interfaces, Network loops
  • Real-Time Control Protocol (RTCP) / Policy-based routing
  • Real-Time Transport Protocol (RTP) / Example 1 – modifying the penalty box, Policy-based routing
  • relayd / Server load balancing
  • Remote Authentication Dial-In User Service (RADIUS) / RADIUS authentication
  • Remote Desktop Protocol (RDP) / VPN fundamentals
  • reverse path forwarding (RPF) / Best practices for ingress filtering
  • RFC 1918 / NAT essentials
  • RFC 2136
    • updating / RFC 2136 updating
  • RFC 7321
    • URL / IPsec
  • RIP next generation (RIPng) / Routing
  • root port (RP) / Bridging
  • round-robin database (RRD) / NTP
  • round-trip time (RTT) / Squid, ping
  • Router Advertisements (RA) / DHCPv6 configuration in the web GUI
  • routing
    • technical requisites / Technical requirements
    • about / Routing, Routing
    • static routing / Routing
    • dynamic routing / Routing, Dynamic routing
    • static routes / Static routes
    • public IP addresses, assigning to firewall / Public IP addresses behind a firewall
    • troubleshooting / Troubleshooting
  • Routing and Addressing Group (ROAD) / NAT essentials
  • Routing Information Protocol (RIP) / Routing, RIP
  • routing protocols
    • distance-vector routing protocols / Routing
    • link-state routing protocols / Routing

S

  • scheduling
    • about / Scheduling
    • example schedule entry / An example schedule entry
  • Security Association (SA) / IPsec
  • server load balancing
    • about / Basic concepts
    • advantages / Basic concepts
    • configuring / Server load balancing
    • example / Example – load balancer for a web server
    • High Availability Proxy (HAProxy) / HAProxy – a brief overview
  • server load balancing, algorithm
    • random / Basic concepts
    • round-robin / Basic concepts
    • weighted round-robin / Basic concepts
    • least connection / Basic concepts
    • least traffic / Basic concepts
    • least latency / Basic concepts
    • IP hash / Basic concepts
    • URL hash / Basic concepts
    • SDN adaptive / Basic concepts
  • Service Curve (sc) / Changes to queues
  • Service Level Agreement (SLA) / Traffic shaping essentials, Service Level Agreement 
  • services / Services
  • service set identifier (SSID) / Wireless issues
  • Session Initiation Protocol (SIP) / The Multiple LAN/WAN Configuration wizard
  • Simple Network Management Protocol (SNMP) / SNMP, Important packages
  • Single DES / pfSense project overview
  • Sloppy / Creating and editing firewall rules
  • Snort
    • about / Hardware sizing guidelines, Snort
    • using, for traffic shaping / Using Snort for traffic shaping
    • installing / Installing  and configuring Snort
    • configuring / Installing  and configuring Snort
    • modes / Snort
    • used, for blocking social media sites / Example – using Snort to block social media sites
  • Software-Defined Networking (SDN) / Basic concepts
  • Spanning Tree Protocol (STP) / Bridging, Bridging interfaces, Network loops
  • Squid
    • about / Hardware sizing guidelines, Squid
    • disadvantages / Issues with Squid
    • reverse proxy server / Squid reverse proxy server
  • SSH login / SSH login
  • Start of Authority (SOA) / General Settings
  • stateful packet inspection / Firewall fundamentals
  • stateless address autoconfiguration (SLAAC) / DHCPv6 configuration in the web GUI
  • static routes / Static routes
  • static routing / Routing
  • stripe / The best practices for installation and configuration
  • subnet mask / Configuration from the web GUI
  • switch
    • configuration / Configuration at the switch
    • TL-SG108E / VLAN configuration example 1 – TL-SG108E
    • Cisco switch / VLAN configuration example 2 – Cisco switches
  • switch spoofing / Hardware, configuration, and security considerations
  • SYN / Nmap
  • SYN ACK packet / Creating and editing firewall rules
  • SYN flood attacks / Creating and editing firewall rules
  • system logs
    • accessing / System logs

T

  • TCP connect() / Nmap
  • tcpdump / tcpdump
  • tcpflow / tcpflow
  • tcpflow, options
    • -bmax_bytes / tcpflow
    • -c / tcpflow
    • -ddebug_level / tcpflow
    • -iiface / tcpflow
    • -p / tcpflow
    • -r file / tcpflow
    • -s / tcpflow
    • -v / tcpflow
  • Temporal Key Integrity Protocol (TKIP) / Wireless issues
  • TFTP (Trivial File Transfer Protocol) / Important packages
  • time to live (TTL) / ping
  • TL-SG108E / VLAN configuration example 1 – TL-SG108E
  • traceroute / traceroute
  • traceroute, options
    • -e / traceroute
    • -ffirst_ttl / traceroute
    • -F / traceroute
    • -d / traceroute
    • -I / traceroute
    • -M first_ttl / traceroute
    • -P proto / traceroute
    • -ssrc_addr / traceroute
    • -S / traceroute
    • -v / traceroute
    • -w / traceroute
  • Traditional NAT / NAT essentials
  • traffic conditioning agreement (TCA) / Traffic shaping essentials
  • traffic graphs / Traffic graphs
  • traffic shaping
    • essentials / Traffic shaping essentials
    • policies, queuing / Queuing policies
    • priority queuing (PRIQ) / Priority queuing
    • class-based queuing / Class-based queuing
    • Hierarchical Fair Service Curve (HFSC) / Hierarchical Fair Service Curve
    • configuring / Configuring traffic shaping in pfSense
    • Multiple LAN/WAN Configuration wizard / The Multiple LAN/WAN Configuration wizard
    • Dedicated Links wizard / The Dedicated Links wizard
    • advanced configuration / Advanced traffic shaping configuration
    • queues, modifying / Changes to queues
    • limiters / Limiters
    • layer 7 traffic shaping / Layer 7 traffic shaping
    • rules, adding / Adding and changing traffic shaping rules
    • rules, modifying / Adding and changing traffic shaping rules
    • penalty box, modifying / Example 1 – modifying the penalty box
    • EchoLink, prioritizing / Example 2 – prioritizing EchoLink
    • examples / Traffic shaping examples
    • limiters, adding / Example 1 – adding limiters
    • peer-to-peer traffic, penalizing / Example 2 – penalizing peer-to-peer traffic
    • Snort, using / Using Snort for traffic shaping
    • troubleshooting / Troubleshooting traffic shaping
  • Transaction Signature (TSIG) / RFC 2136 updating
  • Transport Control Protocol (TCP) / DHCP configuration in the web GUI
  • troubleshooting
    • about / Troubleshooting basics
    • common networking problems / Common networking problems
    • real-world scenario / Troubleshooting scenarios
    • VLAN configuration problem / VLAN configuration problem
  • troubleshooting tools
    • about / pfSense troubleshooting tools
    • system logs / System logs
    • dashboard / Dashboard
    • interfaces / Interfaces
    • services / Services
    • monitoring / Monitoring
    • traffic graphs / Traffic graphs
    • firewall states, viewing / Firewall states
    • tcpdump / tcpdump
    • tcpflow / tcpflow
    • traceroute / ping, traceroute and netstat
    • netstat / ping, traceroute and netstat
    • ping / ping, traceroute and netstat
  • Tunnelblick
    • URL / Choosing a VPN protocol

U

  • Unified Extensible Firmware Interface (UEFI) / pfSense project overview, The best practices for installation and configuration
  • unshielded twisted pair (UTP) / Physical issues
  • User Datagram Protocol (UDP) / DHCP configuration in the web GUI, Nmap

V

  • Virtual Host ID group (VHID) / Virtual IPs
  • Virtual IPs (VIPs)
    • about / Virtual IPs
    • creating / Virtual IPs
  • virtual private networks (VPNs)
    • fundamentals / VPN fundamentals
    • IPSec / IPsec
    • OpenVPN / OpenVPN
    • protocol, selecting / Choosing a VPN protocol
    • troubleshooting / Troubleshooting
  • Virtual Router Redundancy Protocol (VRRP) / Virtual IPs
  • VLAN
    • concepts / Basic VLAN concepts
    • developers and engineering / Example 1 – developers and engineering
    • IoT network / Example 2 – IoT network
    • hardware / Hardware, configuration, and security considerations
    • configuration / Hardware, configuration, and security considerations
    • security considerations / Hardware, configuration, and security considerations
    • configuration, at console / VLAN configuration at the console
    • configuration, in web GUI / VLAN configuration in the web GUI
    • QinQ / QinQ
    • link aggregation / Link aggregation
    • firewall rules, adding / Add firewall rules for VLANs
    • troubleshooting / Troubleshooting VLANs
    • troubleshooting tips / General troubleshooting tips
    • switch configuration, verifying / Verifying switch configuration
    • pfSense configuration, verifying / Verifying pfSense configuration
  • VLAN configuration problem
    • troubleshooting / VLAN configuration problem
  • VLAN Trunking Protocol (VTP) / VLAN Trunking Protocol
  • VNC (Virtual Network Computing) / The Multiple LAN/WAN Configuration wizard
  • VPN tunnel
    • configuring / Configuring a VPN tunnel
    • IPsec / IPsec 
    • IPsec, configuration / IPsec peer/server configuration
    • L2TP / L2TP
    • OpenVPN / OpenVPN
  • VTP pruning / VLAN Trunking Protocol

W

  • weighted fair queuing (WFQ) / Queuing policies
  • Wi-Fi Protected Access (WPA) / Wireless issues
  • Windows Firewall with Advanced Security (WFwAS) / Choosing a VPN protocol
  • Wired Equivalent Privacy (WEP) / pfSense project overview, Wireless issues
  • WPA2 / Wireless issues
  • WPA3 / Wireless issues

Z

  • Zabbix / Zabbix
lock icon The rest of the chapter is locked
arrow left Previous Section
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images