Learn pfSense 2.4
Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
- 346 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Learn pfSense 2.4
Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
About This Book
Install, Configure and Setup different connections with pfSense
Key Features
- Build firewall and routing solutions with PfSense.
- Learn how to create captive portals, how to connect Pfsense to your https environment and so on.
- Practical approach towards building firewall solutions for your organization
Book Description
As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this â and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense.
This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.
What you will learn
- Install pfSense
- Configure additional interfaces, and enable and configure DHCP
- Understand Captive portal
- Understand firewalls and NAT, and traffic shaping
- Learn in detail about VPNs
- Understand Multi-WAN
- Learn about routing and bridging in detail
- Understand the basics of diagnostics and troubleshooting networks
Who this book is for
This book is towards any network security professionals who want to get introduced to the world of firewalls and network configurations using Pfsense. No knowledge of PfSense is required
Frequently asked questions
Information
Firewall and NAT
- Firewall fundamentals
- Firewall best practices
- Creating firewall rules
- Scheduling
- Aliases and virtual IPs
- Network Address Translation (NAT)
- Troubleshooting
Technical requirements
Firewall fundamentals
- On the WAN interface, the RFC 1918 (private) and bogon (currently unassigned) networks are blocked by default, which makes sense, because we don't want private addresses to be the source or destination of packets sent over the public internet. It is not allowed, and routers on the public internet wouldn't know what to do with them anyway. The same goes for currently unassigned networks. Bogon networks cannot be the source of legitimate traffic; they may very well be the source of an attack, and we can eliminate the possibility of such an attack by blocking them.
- On the LAN interface, there are two default rules: an Allow LAN to any rule for IPv4 traffic, and an Allow LAN to any rule for IPv6. These rules exist to make pfSense as plug-and-play as possible; without them, the LAN network would be blocked from accessing the WAN side of the network (thus, it would likely be blocked from accessing the internet). Note that these default rules are only automatically created on the LAN interface; if we add other interfaces in order to create more private networks, we will have to generate these rules ourselves, or create floating rules that apply to multiple interfaces.
Table of contents
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Preface
- Getting Started with pfSense
- Installing pfSense
- Configuring pfSense
- Captive Portal
- Additional pfSense Services
- Firewall and NAT
- Traffic Shaping
- Virtual Private Networks
- Multiple WANs
- Routing and Bridging
- Diagnostics and Troubleshooting
- Assessments
- Other Books You May Enjoy