Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learn pfSense 2.4
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learn pfSense 2.4

Learn pfSense 2.4

By : David Zientara
3 (1)
close
close
Learn pfSense 2.4

Learn pfSense 2.4

3 (1)
By: David Zientara

Overview of this book

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this – and this book explains how to install and configure pfSense in such a way that even a networking beginner can successfully deploy and use pfSense. This book begins by covering networking fundamentals, deployment scenarios, and hardware sizing guidelines, as well as how to install pfSense. The book then covers configuration of basic services such as DHCP, DNS, and captive portal and VLAN configuration. Careful consideration is given to the core firewall functionality of pfSense, and how to set up firewall rules and traffic shaping. Finally, the book covers the basics of VPNs, multi-WAN setups, routing and bridging, and how to perform diagnostics and troubleshooting on a network.
Table of Contents (14 chapters)
close
close

Questions

  1. (a) Identify one example of an application that requires low latency. (b) Identify one example of an application where latency is less important than bandwidth.
  2. Identify the three types of queuing supported by the pfSense traffic shaper.
  3. What option in the traffic shaping wizard allows us to limit the bandwidth of a certain IP address?
  4. What queue was developed to address perceived shortcomings in Random Early Detection, and Random Early Detection In and Out?
  5. Why are large buffers problematic when detecting congestion on TCP connections?
  6. What settings do traffic shaping rules have in the Action drop-down box?
  7. We are creating a rule to prioritize VoIP traffic. What protocol is this rule likely to use?
  8. What option should we choose if blocking P2P traffic on our network is important?

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY