Index
A
- access control list (ACL) / HAProxy – a brief overview, Squid
- Address Resolution Protocol (ARP) / Nmap, ping
- Advanced Encryption Standard (AES) / AES-NI
- Advanced RISC Machines (ARM) / pfSense project overview
- AES-GCM / pfSense project overview
- AES-NI / AES-NI
- aliases
- about / Aliases
- creating / Aliases
- creating, from DNS lookup / Creating aliases from a DNS lookup
- bulk import / Bulk import
- Authentication Headers (AH) / IPsec
- automatic interface assignment / Configuration from the console
- automatic IP assignment / DHCP configuration at the console
- autonomous system (AS) / Quagga OSPF
B
- backup designated router (BDR) / Quagga OSPF
- black hole / Black holes
- Border Gateway Protocol (BGP) / Possible deployment scenarios, Routing
- bridging
- about / Bridging, Bridging
- advantages / Bridging
- limitations / Bridging
- spanning tree, implementing / Bridging
- interfaces / Bridging interfaces
- issues / Special issues
- with CARP / Special issues
- example / Bridging example
- troubleshooting / Troubleshooting
- bufferbloat / Changes to queues
C
- C-Ports (community) / Example 2 – IoT network
- captive portal
- about / Captive portal
- implementing / Implementing captive portal
- user manager authentication / User manager authentication
- voucher authentication / Voucher authentication
- RADIUS authentication / RADIUS authentication
- other settings / Other settings
- troubleshooting / Troubleshooting captive portal
- Certificate Authority (CA) / IPsec peer/server configuration, Squid
- Certificate Revocation List (CRL) / IPsec mobile client configuration
- Challenge Handshake Authentication Protocol (CHAP) / RADIUS authentication, L2TP
- Cisco Discovery Protocol (CDP) / Troubleshooting, Important packages
- Cisco switch
- about / VLAN configuration example 2 – Cisco switches
- static VLAN creation / Static VLAN creation
- Dynamic Trunking Protocol (DTP) / Dynamic Trunking Protocol
- VLAN Trunking Protocol / VLAN Trunking Protocol
- Cisco switches, command-line tools
- showip route / Troubleshooting
- showip interface brief / Troubleshooting
- showcdp neighbors / Troubleshooting
- class-based queuing (CBQ) / Queuing policies, Class-based queuing, The Multiple LAN/WAN Configuration wizard
- Classless Inter-Domain Routing (CIDR) / NAT essentials
- client-side load balancing / Basic concepts
- Code Red worm / Firewall fundamentals
- Common Address Redundancy Protocol (CARP)
- about / DHCP configuration in the web GUI, Creating and editing firewall rules, Basic concepts
- configuration / CARP configuration
- with two firewalls, example / Example 1 – CARP with two firewalls
- with N firewalls, example / Example 2 – CARP with N firewalls
- with load balancing, example / An example of both load balancing and CARP
- troubleshooting / Troubleshooting
- with multi-WAN, example / Example – multi-WAN and CARP
- bridged interfaces, using / Special issues
- Common Name (CN) / Other settings
- Coordinated Universal Time (CUT) / NTP
- cross-site request forgery (CSRF) / General setup options
D
- dashboard / Dashboard
- DCC (Direct Client-to-Client) / Example 1 – setting up DCC
- DDNS
- about / DDNS
- updating / DDNS updating
- RFC 2136, updating / RFC 2136 updating
- troubleshooting / Troubleshooting DDNS
- Dedicated Links wizard / The Dedicated Links wizard
- deep packet Inspection (DPI) / Layer 7 traffic shaping
- delegated prefixes / DHCP and DHCPv6 leases
- demilitarized zone (DMZ) / Possible deployment scenarios
- designated port (DP) / Bridging
- designated router (DR) / Quagga OSPF
- distance-vector routing protocols / Routing
- DMZ network / An example of both load balancing and CARP
- DNS
- about / DNS
- DNS resolver / DNS resolver
- DNS forwarder / DNS forwarder
- firewall rules / DNS firewall rules
- considerations, for multi-WAN / DNS considerations
- DNS lookup
- aliases, creating / Creating aliases from a DNS lookup
- DNS resolver
- general settings / General Settings
- DNSSEC support, enabling / Enable DNSSEC support
- Host Overrides / Host Overrides and Domain Overrides
- Domain Overrides / Host Overrides and Domain Overrides
- access lists / Access Lists
- Don't Fragment (DF) flag / Black holes
- Don't Route or Peer (DROP) / Best practices for egress filtering
- double tagging / Hardware, configuration, and security considerations
- dummynet / Limiters
- Dynamic Host Configuration Protocol (DHCP)
- about / Possible deployment scenarios, DHCP
- configuration, at console / DHCP configuration at the console
- configuration, in web GUI / DHCP configuration in the web GUI
- DHCPv6 configuration, in web GUI / DHCPv6 configuration in the web GUI
- and DHCPv6 relay / DHCP and DHCPv6 relay
- and DHCPv6 leases / DHCP and DHCPv6 leases
- Dynamic NAT / NAT essentials
- dynamic routing
- about / Routing, Dynamic routing
- third-party packages / Dynamic routing
- RIP / RIP
- OpenBGPD / OpenBGPD
- Quagga OSPF / Quagga OSPF
- FRRouting (FRR) / FRRouting
- dynamic routing, protocols
- Routing Information Protocol (RIP) / Routing
- Open Shortest Path First (OSPF) / Routing
- Interior Gateway Routing Protocol (IGRP) / Routing
- Enhanced Interior Gateway Routing Protocol (EIGRP) / Routing
- Border Gateway Protocol (BGP) / Routing
- Dynamic Trunking Protocol (DTP) / Dynamic Trunking Protocol
E
- egress filtering
- best practices / Best practices for egress filtering
- Emerging Threats (ET) / Snort
- Encapsulating Security Payload (ESP) / IPsec
- Enhanced Interior Gateway Routing Protocol (EIGRP) / Routing
- Extended Authentication (Xauth) / IPsec mobile client configuration
- Extensible Authentication Protocol (EAP)
- about / IPsec mobile client configuration, RADIUS issues
- EAP Transport Layer Security (EAP-TLS) / RADIUS issues
- Protected Extensible Authentication Protocol (PEAP) / RADIUS issues
- EAP Tunneled Transport Layer Security (EAP-TTLS) / RADIUS issues
- EAP Flexible Authentication via Secure Tunneling (EAP-FAST) / RADIUS issues
- Extensible Markup Language – Remote Procedure Call (XML-RPC) / Basic concepts
- Extreme Discovery Protocol (EDP) / Important packages
F
- Far end crosstalk (FEXT) / Physical issues
- firewall
- technical requisites / Technical requirements
- example network / An example network
- fundamentals / Firewall fundamentals
- best practices / Firewall best practices
- ingress filtering, best practices / Best practices for ingress filtering
- egress filtering, best practices / Best practices for egress filtering
- firewall rules
- creating / Creating and editing firewall rules
- editing / Creating and editing firewall rules
- Pass rule / Creating and editing firewall rules
- Block rule / Creating and editing firewall rules
- Reject rule / Creating and editing firewall rules
- floating firewall rules, creating / Floating rules
- example / Example rules
- website, blocking / Example 1 – block a website
- traffic, blocking from other networks / Example 2 – block all traffic from other networks
- default allow rule, implementing / Example 3 – the default allow rule
- troubleshooting / Troubleshooting firewall rules
- firewall states
- viewing / Firewall states
- States / States
- States Summary / States summary
- pfTop / pfTop
- first come, first served (FCFS) / Queuing policies
- Foundry Discovery Protocol (FDP) / Important packages
- FRRouting (FRR) / FRRouting, FRRouting
- fully qualified domain name (FQDN) / General setup options, Aliases, Traffic graphs
G
- gateway load balancing / Basic concepts
- Global Positioning System (GPS) / NTP
- gwled / Third-party packages
H
- hardware requisites / Hardware requirements and sizing guidelines, Minimum hardware requirements
- hardware sizing guidelines / Hardware requirements and sizing guidelines, Hardware sizing guidelines
- Hash Algorithm / IPsec peer/server configuration
- Hierarchical Fair Service Curve (HFSC) / Queuing policies, Hierarchical Fair Service Curve, The Multiple LAN/WAN Configuration wizard
- High Availability Proxy (HAProxy)
- overview / HAProxy – a brief overview
- about / HAProxy – a brief overview, HAProxy
- web server, load balancing / Example – load balancing a web server
- hop / Routing
I
- Identity Association (IA) / DHCP and DHCPv6 leases
- ingress filtering
- best practices / Best practices for ingress filtering
- network ingress filtering / Best practices for ingress filtering
- for multihomed networks / Best practices for ingress filtering
- interfaces
- bridging / Bridging interfaces
- about / Interfaces
- Interior Gateway Routing Protocol (IGRP) / Routing
- Internet Control Message Protocol (ICMP) / ping
- Internet Engineering Task Force (IETF) / Best practices for ingress filtering
- Internet Key Exchange (IKE) / IPsec
- Internet Relay Chat (IRC) / Example 1 – setting up DCC
- Internet Security and Key Management Protocol (ISAKMP) / IPsec
- IPsec
- about / IPsec, IPsec
- configuration / IPsec peer/server configuration
- mobile client configuration / IPsec mobile client configuration
- site-to-site IPsec configuration / Example 1 – Site-to-site IPsec configuration
- tunnel, using for remote access / Example 2 – IPsec tunnel for remote access
- IPsec connection mode
- transport mode / IPsec
- tunnel mode / IPsec
K
- Kerberized Internet Negotiation of Keys (KINK) / IPsec
L
- L2TP Access Concentrator (LAC) / L2TP
- L2TP Network Server (LNS) / L2TP
- LAN IP address / Configuration from the web GUI
- Layer 2 Tunneling Protocol (L2TP) / Configuration from the web GUI, L2TP, L2TP
- layer 7 traffic shaping / Layer 7 traffic shaping
- limiters
- about / Limiters
- adding / Example 1 – adding limiters
- link-state routing protocols / Routing
- link aggregation / Link aggregation
- Link Layer Discovery Protocol (LLDP) / Important packages
- load balancing
- about / Basic concepts
- server load balancing / Basic concepts
- gateway load balancing / Basic concepts
- with CARP, example / An example of both load balancing and CARP
- troubleshooting / Troubleshooting
M
- managed address configuration / DHCPv6 configuration in the web GUI
- management information bases (MIBs) / SNMP
- maximum segment size (MSS) / Black holes
- maximum transmission unit (MTU) / Hardware sizing guidelines, Hardware, configuration, and security considerations, Black holes
- MD5 / IPsec peer/server configuration
- Media Gateway Control Protocol (MGCP) / The Multiple LAN/WAN Configuration wizard
- metropolitan area networks (MANs) / Physical issues
- Microsoft Management Console (MMC) / Choosing a VPN protocol
- modes, Snort
- packet sniffing mode / Snort
- packet logging mode / Snort
- network intrusion prevention mode / Snort
- monitoring / Monitoring
- MS-CHAPv2 / L2TP
- multi-WAN
- technical requisites / Technical requirements
- basic concepts / Basic concepts
- Service Level Agreement (SLA) / Service Level Agreement
- configuring / Multi-WAN configuration
- DNS configuration / Multi-WAN configuration
- gateway, setting up / Multi-WAN configuration
- gateway group, configuring / Multi-WAN configuration
- failover groups, configuring / Multi-WAN configuration
- floating rule, creating / Multi-WAN configuration
- static route, setting up / Multi-WAN configuration
- gateway group, verifying / Multi-WAN configuration
- DNS, considerations / DNS considerations
- Network Address Translation (NAT), considerations / NAT considerations
- third-party packages / Third-party packages
- with CARP, example / Example – multi-WAN and CARP
- troubleshooting / Troubleshooting
- Multiple Lan/Wan Configuration wizard / The Multiple LAN/WAN Configuration wizard
N
- Near end crosstalk (NEXT) / Physical issues
- net neutrality / Traffic shaping essentials
- netstat / netstat
- netstat, options
- -faddress_family / netstat
- -p protocol / netstat
- -r / netstat
- -rs / netstat
- -n / netstat
- -W / netstat
- Network Address Translation (NAT)
- essentials / NAT essentials
- considerations, for multi-WAN / NAT considerations
- networking problems
- about / Common networking problems
- wrong subnet mask or gateway / Wrong subnet mask or gateway
- wrong DNS configuration / Wrong DNS configuration
- duplicate IP addresses / Duplicate IP addresses
- network loops / Network loops
- routing issues / Routing issues
- port configuration / Port configuration
- black holes / Black holes
- physical issues / Physical issues
- wireless issues / Wireless issues
- RADIUS issues / RADIUS issues
- network interface card (NIC) / Possible deployment scenarios
- network management station (NMS) / SNMP
- network map (nmap) / Nmap
- Network Prefix Translation (NPt)
- about / NAT essentials, Network Prefix Translation
- IPv6 network, mapping / Example – mapping an IPv6 network
- Network Time Protocol (NTP) / Configuration from the web GUI, NTP
- non-broadcast (NMBA) networks / Quagga OSPF
- ntop / Hardware sizing guidelines
- ntopng / ntopng
O
- one-to-one NAT
- about / 1:1 NAT
- file server, mapping / Example – mapping a file server
- troubleshooting / Troubleshooting
- OpenBGPD / OpenBGPD
- Open Shortest Path First (OSPF) / Routing
- OpenVPN
- about / OpenVPN, OpenVPN
- AES-NI / AES-NI
- URL / Choosing a VPN protocol
- server configuration / OpenVPN server configuration
- client configuration / OpenVPN client configuration
- client-specific overrides / Client-specific overrides
- server configuration, with wizard / Server configuration with the wizard
- Client Export Utility / OpenVPN Client Export Utility
- site-to-site OpenVPN configuration / Example – site-to-site OpenVPN configuration
- OpenVPN 2.4.x / pfSense project overview
- Organizationally Unique Identifier (OUI) / Configuration from the web GUI
- OSI model
- physical layer / Troubleshooting basics
- data link layer / Troubleshooting basics
- network layer / Troubleshooting basics
- transport layer / Troubleshooting basics
- session layer / Troubleshooting basics
- presentation layer / Troubleshooting basics
- application layer / Troubleshooting basics
- Outbound NAT
- about / NAT essentials, Outbound NAT
- filtering, for single network / Example – filtering outbound NAT for a single network
P
- P-Ports (promiscuous) / Example 2 – IoT network
- Password Authentication Protocol (PAP) / RADIUS authentication, L2TP
- Path MTU Discovery (PMTUD) / IPsec mobile client configuration, Black holes
- Payment Card Industry Data Security Standard (PCI DSS) / Firewall best practices
- peer-to-peer (P2P) / The Multiple LAN/WAN Configuration wizard
- peer-to-peer traffic
- penalizing / Example 2 – penalizing peer-to-peer traffic
- Penalty Box / The Multiple LAN/WAN Configuration wizard
- pfBlocker / Hardware sizing guidelines
- pfBlockerNG / pfBlockerNG
- pfSense
- technical requisites / Technical requirements
- overview / pfSense project overview
- deployment scenarios / Possible deployment scenarios
- URL / Minimum hardware requirements
- configuration, best practices / The best practices for installation and configuration
- installation, best practices / The best practices for installation and configuration
- configuration / pfSense configuration
- configuration, from console / Configuration from the console
- configuration, from web GUI / Configuration from the web GUI
- additional interfaces, configuring / Configuring additional interfaces
- additional WAN configuration / Additional WAN configuration
- setting up / General setup options
- configuration, verifying / Verifying pfSense configuration
- pfSense forum
- URL / Special issues
- pfSense packages
- considerations / Basic considerations
- installing / Installing packages
- about / Important packages, Other packages
- acme / Important packages
- frr / Important packages
- lldpd / Important packages
- net-snmp / Important packages
- telegraf / Important packages
- tftpd / Important packages
- Squid / Squid
- pfBlockerNG / pfBlockerNG
- ntopng / ntopng
- nmap / Nmap
- HAProxy / HAProxy
- snort / Snort
- FRRouting / FRRouting
- Zabbix / Zabbix
- ping / Nmap, ping
- ping, options
- -c count / ping
- -D / ping
- -f / ping
- -i wait / ping
- -mttl / ping
- -S source_addr / ping
- -s packetsize / ping
- -t timeout / ping
- -v / ping
- Point-to-Point Protocol over Ethernet (PPPoE) / Configuration from the web GUI, CARP configuration
- Point-to-Point Tunneling Protocol (PPTP) / pfSense project overview, Configuration from the web GUI, Choosing a VPN protocol
- policy-based routing / Service Level Agreement
- port forwarding
- about / Port forwarding
- DCC, setting up / Example 1 – setting up DCC
- port, excluding / Example 2 – excluding a port
- personal web server, setting up / Example 3 – setting up a personal web server
- PPP (Point-to-Point Protocol) / Configuration from the web GUI
- PPS (packets per second) / Troubleshooting traffic shaping
- Prioritize network gaming traffic / The Multiple LAN/WAN Configuration wizard
- priority queuing (PRIQ) / Queuing policies, Priority queuing, The Multiple LAN/WAN Configuration wizard
- private VLANs (PVLANs) / Example 2 – IoT network
- Protected Access Credential (PAC) / RADIUS issues
- Pulse Per Second (PPS) / NTP
- PVID (Port VLAN ID) / VLAN configuration problem
Q
- QinQ / QinQ
- Quagga OSPF
- installing / Quagga OSPF
R
- Radio frequency interference (RFI) / Physical issues
- Random Early Detection (RED) / Changes to queues
- Rapid Spanning Tree Protocol (RSTP) / Bridging interfaces, Network loops
- Real-Time Control Protocol (RTCP) / Policy-based routing
- Real-Time Transport Protocol (RTP) / Example 1 – modifying the penalty box, Policy-based routing
- relayd / Server load balancing
- Remote Authentication Dial-In User Service (RADIUS) / RADIUS authentication
- Remote Desktop Protocol (RDP) / VPN fundamentals
- reverse path forwarding (RPF) / Best practices for ingress filtering
- RFC 1918 / NAT essentials
- RFC 2136
- updating / RFC 2136 updating
- RFC 7321
- URL / IPsec
- RIP next generation (RIPng) / Routing
- root port (RP) / Bridging
- round-robin database (RRD) / NTP
- round-trip time (RTT) / Squid, ping
- Router Advertisements (RA) / DHCPv6 configuration in the web GUI
- routing
- technical requisites / Technical requirements
- about / Routing, Routing
- static routing / Routing
- dynamic routing / Routing, Dynamic routing
- static routes / Static routes
- public IP addresses, assigning to firewall / Public IP addresses behind a firewall
- troubleshooting / Troubleshooting
- Routing and Addressing Group (ROAD) / NAT essentials
- Routing Information Protocol (RIP) / Routing, RIP
- routing protocols
- distance-vector routing protocols / Routing
- link-state routing protocols / Routing
S
- scheduling
- about / Scheduling
- example schedule entry / An example schedule entry
- Security Association (SA) / IPsec
- server load balancing
- about / Basic concepts
- advantages / Basic concepts
- configuring / Server load balancing
- example / Example – load balancer for a web server
- High Availability Proxy (HAProxy) / HAProxy – a brief overview
- server load balancing, algorithm
- random / Basic concepts
- round-robin / Basic concepts
- weighted round-robin / Basic concepts
- least connection / Basic concepts
- least traffic / Basic concepts
- least latency / Basic concepts
- IP hash / Basic concepts
- URL hash / Basic concepts
- SDN adaptive / Basic concepts
- Service Curve (sc) / Changes to queues
- Service Level Agreement (SLA) / Traffic shaping essentials, Service Level Agreement
- services / Services
- service set identifier (SSID) / Wireless issues
- Session Initiation Protocol (SIP) / The Multiple LAN/WAN Configuration wizard
- Simple Network Management Protocol (SNMP) / SNMP, Important packages
- Single DES / pfSense project overview
- Sloppy / Creating and editing firewall rules
- Snort
- about / Hardware sizing guidelines, Snort
- using, for traffic shaping / Using Snort for traffic shaping
- installing / Installing and configuring Snort
- configuring / Installing and configuring Snort
- modes / Snort
- used, for blocking social media sites / Example – using Snort to block social media sites
- Software-Defined Networking (SDN) / Basic concepts
- Spanning Tree Protocol (STP) / Bridging, Bridging interfaces, Network loops
- Squid
- about / Hardware sizing guidelines, Squid
- disadvantages / Issues with Squid
- reverse proxy server / Squid reverse proxy server
- SSH login / SSH login
- Start of Authority (SOA) / General Settings
- stateful packet inspection / Firewall fundamentals
- stateless address autoconfiguration (SLAAC) / DHCPv6 configuration in the web GUI
- static routes / Static routes
- static routing / Routing
- stripe / The best practices for installation and configuration
- subnet mask / Configuration from the web GUI
- switch
- configuration / Configuration at the switch
- TL-SG108E / VLAN configuration example 1 – TL-SG108E
- Cisco switch / VLAN configuration example 2 – Cisco switches
- switch spoofing / Hardware, configuration, and security considerations
- SYN / Nmap
- SYN ACK packet / Creating and editing firewall rules
- SYN flood attacks / Creating and editing firewall rules
- system logs
- accessing / System logs
T
- TCP connect() / Nmap
- tcpdump / tcpdump
- tcpflow / tcpflow
- tcpflow, options
- -bmax_bytes / tcpflow
- -c / tcpflow
- -ddebug_level / tcpflow
- -iiface / tcpflow
- -p / tcpflow
- -r file / tcpflow
- -s / tcpflow
- -v / tcpflow
- Temporal Key Integrity Protocol (TKIP) / Wireless issues
- TFTP (Trivial File Transfer Protocol) / Important packages
- time to live (TTL) / ping
- TL-SG108E / VLAN configuration example 1 – TL-SG108E
- traceroute / traceroute
- traceroute, options
- -e / traceroute
- -ffirst_ttl / traceroute
- -F / traceroute
- -d / traceroute
- -I / traceroute
- -M first_ttl / traceroute
- -P proto / traceroute
- -ssrc_addr / traceroute
- -S / traceroute
- -v / traceroute
- -w / traceroute
- Traditional NAT / NAT essentials
- traffic conditioning agreement (TCA) / Traffic shaping essentials
- traffic graphs / Traffic graphs
- traffic shaping
- essentials / Traffic shaping essentials
- policies, queuing / Queuing policies
- priority queuing (PRIQ) / Priority queuing
- class-based queuing / Class-based queuing
- Hierarchical Fair Service Curve (HFSC) / Hierarchical Fair Service Curve
- configuring / Configuring traffic shaping in pfSense
- Multiple LAN/WAN Configuration wizard / The Multiple LAN/WAN Configuration wizard
- Dedicated Links wizard / The Dedicated Links wizard
- advanced configuration / Advanced traffic shaping configuration
- queues, modifying / Changes to queues
- limiters / Limiters
- layer 7 traffic shaping / Layer 7 traffic shaping
- rules, adding / Adding and changing traffic shaping rules
- rules, modifying / Adding and changing traffic shaping rules
- penalty box, modifying / Example 1 – modifying the penalty box
- EchoLink, prioritizing / Example 2 – prioritizing EchoLink
- examples / Traffic shaping examples
- limiters, adding / Example 1 – adding limiters
- peer-to-peer traffic, penalizing / Example 2 – penalizing peer-to-peer traffic
- Snort, using / Using Snort for traffic shaping
- troubleshooting / Troubleshooting traffic shaping
- Transaction Signature (TSIG) / RFC 2136 updating
- Transport Control Protocol (TCP) / DHCP configuration in the web GUI
- troubleshooting
- about / Troubleshooting basics
- common networking problems / Common networking problems
- real-world scenario / Troubleshooting scenarios
- VLAN configuration problem / VLAN configuration problem
- troubleshooting tools
- about / pfSense troubleshooting tools
- system logs / System logs
- dashboard / Dashboard
- interfaces / Interfaces
- services / Services
- monitoring / Monitoring
- traffic graphs / Traffic graphs
- firewall states, viewing / Firewall states
- tcpdump / tcpdump
- tcpflow / tcpflow
- traceroute / ping, traceroute and netstat
- netstat / ping, traceroute and netstat
- ping / ping, traceroute and netstat
- Tunnelblick
- URL / Choosing a VPN protocol
U
- Unified Extensible Firmware Interface (UEFI) / pfSense project overview, The best practices for installation and configuration
- unshielded twisted pair (UTP) / Physical issues
- User Datagram Protocol (UDP) / DHCP configuration in the web GUI, Nmap
V
- Virtual Host ID group (VHID) / Virtual IPs
- Virtual IPs (VIPs)
- about / Virtual IPs
- creating / Virtual IPs
- virtual private networks (VPNs)
- fundamentals / VPN fundamentals
- IPSec / IPsec
- OpenVPN / OpenVPN
- protocol, selecting / Choosing a VPN protocol
- troubleshooting / Troubleshooting
- Virtual Router Redundancy Protocol (VRRP) / Virtual IPs
- VLAN
- concepts / Basic VLAN concepts
- developers and engineering / Example 1 – developers and engineering
- IoT network / Example 2 – IoT network
- hardware / Hardware, configuration, and security considerations
- configuration / Hardware, configuration, and security considerations
- security considerations / Hardware, configuration, and security considerations
- configuration, at console / VLAN configuration at the console
- configuration, in web GUI / VLAN configuration in the web GUI
- QinQ / QinQ
- link aggregation / Link aggregation
- firewall rules, adding / Add firewall rules for VLANs
- troubleshooting / Troubleshooting VLANs
- troubleshooting tips / General troubleshooting tips
- switch configuration, verifying / Verifying switch configuration
- pfSense configuration, verifying / Verifying pfSense configuration
- VLAN configuration problem
- troubleshooting / VLAN configuration problem
- VLAN Trunking Protocol (VTP) / VLAN Trunking Protocol
- VNC (Virtual Network Computing) / The Multiple LAN/WAN Configuration wizard
- VPN tunnel
- configuring / Configuring a VPN tunnel
- IPsec / IPsec
- IPsec, configuration / IPsec peer/server configuration
- L2TP / L2TP
- OpenVPN / OpenVPN
- VTP pruning / VLAN Trunking Protocol
W
- weighted fair queuing (WFQ) / Queuing policies
- Wi-Fi Protected Access (WPA) / Wireless issues
- Windows Firewall with Advanced Security (WFwAS) / Choosing a VPN protocol
- Wired Equivalent Privacy (WEP) / pfSense project overview, Wireless issues
- WPA2 / Wireless issues
- WPA3 / Wireless issues
Z
- Zabbix / Zabbix