0%

Book Description

Install, Configure and Setup different connections with pfSense

Key Features

  • Build firewall and routing solutions with PfSense.
  • Learn how to create captive portals, how to connect Pfsense to your https environment and so on.
  • Practical approach towards building firewall solutions for your organization

Book Description

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this ? and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense.

This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.

What you will learn

  • Install pfSense
  • Configure additional interfaces, and enable and configure DHCP
  • Understand Captive portal
  • Understand firewalls and NAT, and traffic shaping
  • Learn in detail about VPNs
  • Understand Multi-WAN
  • Learn about routing and bridging in detail
  • Understand the basics of diagnostics and troubleshooting networks

Who this book is for

This book is towards any network security professionals who want to get introduced to the world of firewalls and network configurations using Pfsense. No knowledge of PfSense is required

Table of Contents

  1. Title Page
  2. Copyright and Credits
    1. Learn pfSense 2.4
  3. Packt Upsell
    1. Why subscribe?
    2. PacktPub.com
  4. Contributors
    1. About the author
    2. About the reviewer
    3. Packt is searching for authors like you
  5. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
      1. Conventions used
    4. Get in touch
      1. Reviews
  6. Getting Started with pfSense
    1. Technical requirements
    2. The pfSense project
    3. What pfSense can do
    4. The pfSense community
    5. Objectives of this book
    6. Summary
    7. Questions
    8. Further reading
  7. Installing pfSense
    1. Technical requirements
    2. Networking fundamentals
      1. The seven-layer OSI model
        1. LANs, WANs, and MANs
        2. Client-server and peer-to-peer networking
        3. Layers 1 and 2 — topology and data link protocols
        4. Layers 3 and 4 — network and transport
        5. IP addressing
    3. Typical pfSense deployment scenarios
    4. Hardware requirements and sizing guidelines
      1. Minimum requirements
      2. Hardware sizing guidelines
        1. Budget-priced options
          1. Using an old desktop system
          2. Using a thin client
          3. Using an old laptop
    5. Installing pfSense
      1. Step-by-step installation guide
    6. Initial pfSense configuration
      1. Configuration from the console
      2. Configuration from the web GUI
      3. Advanced WAN configuration
      4. Additional setup options
      5. SSH login
    7. Summary
    8. Questions
    9. Further reading
  8. Configuring pfSense
    1. Technical requirements
    2. IPv4 and IPv6 addressing
    3. Additional setup options
    4. SSH login
    5. Adding interfaces
      1. Configuration of LAN-type interfaces
      2. WAN configuration
    6. Adding a DHCP server
      1. DHCP configuration at the console
      2. DHCP configuration in the web GUI
        1. DHCP static configuration
      3. DHCPv6 configuration in the web GUI
      4. DHCP and DHCPv6 relay
      5. DHCP and DHCPv6 leases
    7. VLAN configuration
      1. VLAN configuration at the console
      2. VLAN configuration in the web GUI
      3. QinQ and link aggregation
      4. Remaining considerations
    8. Summary
    9. Questions
    10. Further reading
  9. Captive Portal
    1. Technical requirements
    2. Captive portal basics
    3. Captive portal best practices
    4. Enabling a captive portal
      1. Authentication options
        1. Local User Manager/Vouchers
          1. Local user manager
          2. Voucher authentication
        2. RADIUS authentication
      2. Additional captive portal options
    5. Captive portal examples
      1. Example #1 – no authentication
      2. Example #2 – authentication with vouchers
      3. Example #3 – RADIUS authentication
        1. Step 1 – RADIUS installation and configuration
        2. Step 2 – captive portal prerequisites
        3. Step 3 – captive portal configuration
    6. Troubleshooting captive portals
    7. Summary
    8. Questions
    9. Further reading
  10. Additional pfSense Services
    1. Technical requirements
    2. Introduction to DNS
    3. Configuring DNS
      1. DNS Resolver
      2. DNS Forwarder
      3. DNS firewall rules
    4. DDNS
      1. Updating DDNS
      2. RFC 2136 updating
      3. Checking IP services
      4. Troubleshooting DDNS
    5. NTP
      1. Configuring NTP
      2. Troubleshooting NTP
    6. SNMP
      1. Troubleshooting SNMP
    7. Summary
    8. Questions
    9. Further reading
  11. Firewall and NAT
    1. Technical requirements
    2. Firewall fundamentals
    3. Firewall best practices
      1. Best practices for ingress filtering
      2. Best practices for egress filtering
    4. Creating firewall rules
      1. Floating rules
      2. Example rules
        1. Example #1 – rule to block a website
        2. Example #2 – universal allow any rule
        3. Example #3 – rule to prevent SYN flood attacks
    5. Scheduling
      1. Example – blocking a website only during certain hours
    6. Aliases and virtual IPs
      1. Aliases
        1. Example – creating an alias and making a block rule based on the alias
      2. Virtual IPs
    7. NAT
      1. Port-forwarding
        1. Example – DCC port-forwarding
      2. Outbound NAT
      3. 1:1 NAT
    8. Troubleshooting
    9. Summary
    10. Questions
    11. Further reading
  12. Traffic Shaping
    1. Technical requirements
    2. Traffic shaping fundamentals
      1. Queuing disciplines
        1. Priority queuing
        2. Class-based queuing
        3. Hierarchical Fair Service Curve – HFSC
    3. Configuring traffic shaping
      1. The Multiple Lan/Wan configuration wizard
      2. The Dedicated Links wizard
      3. Advanced traffic shaping configuration
        1. Changes to queues
        2. Limiters
    4. Manual rule configuration
      1. Example #1 – modifying the penalty box
      2. Example #2 – prioritizing EchoLink
    5. Using Snort for traffic shaping
      1. Installing and configuring Snort
    6. Troubleshooting
    7. Summary
    8. Questions
    9. Further reading
  13. Virtual Private Networks
    1. Technical requirements
    2. VPN fundamentals
      1. IPsec
      2. L2TP
      3. OpenVPN
      4. Choosing a VPN protocol
      5. VPN hardware
    3. Configuring a VPN tunnel
      1. IPsec configuration
        1. IPsec peer/server congfiguration
        2. IPsec mobile client configuration
        3. Pre-shared keys
        4. Advanced settings
        5. Example 1 – Site-to-site IPsec configuration
        6. Example 2 – IPsec tunnel for mobile remote access
      2. L2TP
      3. OpenVPN
        1. OpenVPN server configuration
        2. OpenVPN client configuration
        3. Server configuration with the wizard
        4. OpenVPN Client Export Utility
    4. Troubleshooting VPNs
    5. Summary
    6. Questions
    7. Further reading
  14. Multiple WANs
    1. Technical requirements
    2. Multi-WAN fundamentals
      1. Service-level agreement
      2. Policy-based routing
      3. Failover and load balancing
      4. When is a gateway down?
    3. Configuring multiple WANs
      1. DNS considerations
      2. NAT considerations
      3. Third-party packages
    4. Troubleshooting
    5. Summary
    6. Questions
    7. Further reading
  15. Routing and Bridging
    1. Technical requirements
    2. Routing and bridging fundamentals
      1. Bridging fundamentals
      2. Routing fundamentals
    3. Routing
      1. Static routes
      2. Public IP addresses behind a firewall
      3. Dynamic routing
      4. RIP (routed)
      5. OpenBGPD
      6. Quagga OSPF
      7. FRRouting
    4. Bridging
      1. Bridging interfaces
      2. The other issues
    5. Troubleshooting
    6. Summary
    7. Questions
    8. Further reading
  16. Diagnostics and Troubleshooting
    1. Technical requirements
    2. Troubleshooting fundamentals
      1. A seven-step approach to troubleshooting
      2. Common networking problems
        1. Wrong subnet mask or gateway
        2. Wrong DNS configuration
        3. Duplicate IP addresses
        4. Network loops
        5. Routing issues
        6. Port configuration
        7. Black holes
        8. Physical issues
        9. Wireless issues
        10. RADIUS issues
    3. pfSense troubleshooting tools
      1. Dashboard
      2. System logs
      3. Interfaces
      4. Services
      5. Monitoring
      6. Traffic graphs
      7. Firewall states
        1. States
        2. State summary
        3. pfTop
      8. tcpdump
      9. tcpflow
      10. ping, traceroute, and netstat
        1. ping
      11. traceroute
      12. netstat
    4. A troubleshooting scenario
      1. A user cannot connect to a website
    5. Summary
    6. Questions
    7. Further Reading
  17. Assessments
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
  18. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
3.145.63.136