Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learn pfSense 2.4
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learn pfSense 2.4

Learn pfSense 2.4

By : David Zientara
3 (1)
close
close
Learn pfSense 2.4

Learn pfSense 2.4

3 (1)
By: David Zientara

Overview of this book

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this – and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense. This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.
Table of Contents (14 chapters)
close
close

Questions

  1. What is the final step in troubleshooting a networking problem?
  2. A site can be reached by pinging the IP address, but pinging the hostname fails. What is the likely cause?
  1. We cannot reach the internet from a computer, but we can access other nodes on the local network. Assume that we have isolated the problem to this computer. What is the likely cause?
  2. Name a wireless standard that uses the 5 GHz range (there are four).
  3. Which wireless encryption standard sends challenges in the clear and is generally considered insecure now?
  4. Name a utility that can be used to monitor the pfSense state table and can be used from the console or within the web GUI.
  5. What problem might we encounter if we try to ping hosts on networks not under our control?
  6. What protocol does traceroute use by default?

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY