Again, you should be able to work though the examples in this chapter with a working pfSense system with at least a WAN and LAN interface with at least one node on the LAN network. It is helpful to have different types of software with which different traffic shaping scenarios can be simulated (for example, VoIP software to simulate cases where low latency is important; peer-to-peer (p2p) software for cases where high levels of latency can be tolerated, but we may want to absorb as much excess bandwidth as possible).

Mastering pfSense
By :

Mastering pfSense
By:
Overview of this book
pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you.
You’re in control – you can exploit and customize pfSense around your security needs.
Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI.
The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features.
Table of Contents (15 chapters)
Preface
Revisiting pfSense Basics
Advanced pfSense Configuration
VLANs
Using pfSense as a Firewall
Network Address Translation
Traffic Shaping
Virtual Private Networks
Redundancy and High Availability
Multiple WANs
Routing and Bridging
Extending pfSense with Packages
Diagnostics and Troubleshooting
Assessments
Another Book You May Enjoy
How would like to rate this book
Customer Reviews