Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learn pfSense 2.4
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learn pfSense 2.4

Learn pfSense 2.4

By : David Zientara
3 (1)
close
close
Learn pfSense 2.4

Learn pfSense 2.4

3 (1)
By: David Zientara

Overview of this book

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this – and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense. This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.
Table of Contents (14 chapters)
close
close

Questions

  1. Abbreviate 2001:00ba:0000:0000:0000:0000:3257:0652 by eliminating the leading zeroes and using double colon notation.
  2. (a) Identify the three primary types of IPv6 addresses. (b) What prefix is used for IPv6 site-local addresses?
  3. What method can we use to remotely log in to a pfSense system without using a password?
  4. What option can we use if we have a device (for example, a file server) that must have the same IP address at all times?
  5. What is the minimum requirement for the DHCP range?
  6. If I enable a DHCP relay, can I enable the DHCPv6 server on any interface?
  7. Identify two different methods we can use to create VLANs.
  8. What is the tag used to identify VLAN traffic called?
  9. (a) What is the range of valid values for a VLAN tag? (b) Can we have a greater number of VLANs on our network than this range provides, and if so, how?
  10. What type of switch do we need to implement VLANs...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY