万本电子书0元读

万本电子书0元读

顶部广告

pfSense 2.x Cookbook电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:David Zientara

出  版  社:Packt Publishing

出版时间:2018-12-17

字       数:25.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
A practical, example-driven guide to configuring even the most advanced features of pfSense 2.x Key Features *Build a high-availability fault-tolerant security system with pfSense 2.x *Leverage the latest version of pfSense to secure your cloud environment *A recipe-based guide that will help you enhance your on-premise and cloud security principles Book Description pfSense is an open source distribution of the FreeBSD-based firewall that provides a platform for ?exible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important compared to other offerings. pfSense 2.x Cookbook – Second Edition starts by providing you with an understanding of how to complete the basic steps needed to render a pfSense firewall operational. It starts by showing you how to set up different forms of NAT entries and firewall rules and use aliases and scheduling in firewall rules. Moving on, you will learn how to implement a captive portal set up in different ways (no authentication, user manager authentication, and RADIUS authentication), as well as NTP and SNMP configuration. You will then learn how to set up a VPN tunnel with pfSense. The book then focuses on setting up traffic shaping with pfSense, using either the built-in traffic shaping wizard, custom ?oating rules, or Snort. Toward the end, you will set up multiple WAN interfaces, load balancing and failover groups, and a CARP failover group. You will also learn how to bridge interfaces, add static routing entries, and use dynamic routing protocols via third-party packages. What you will learn *Configure the essential pfSense services (namely, DHCP, DNS, and DDNS) *Create aliases, firewall rules, NAT port-forward rules, and rule schedules *Create multiple WAN interfaces in load-balanced or failover configurations *Configure firewall redundancy with a CARP firewall failover *Configure backup/restoration and automatic configuration-file backup *Configure some services and perform diagnostics with command-line utilities Who this book is for This book is intended for all levels of network administrators. If you are an advanced user of pfSense, then you can flip to a particular recipe and quickly accomplish the task at hand; if you are new to pfSense, on the other hand, you can work through the book chapter by chapter and learn all of the features of the system from the ground up.
目录展开

Title Page

Copyright and Credits

pfSense 2.x Cookbook Second Edition

About Packt

Why subscribe?

PacktPub.com

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Get in touch

Reviews

Initial Configuration

Introduction

Applying basic settings to General Setup

Getting ready

How to do it...

See also

Identifying and assigning interfaces

Getting ready

How to do it...

See also

Configuring a WAN interface

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring a LAN interface

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring optional interfaces from the console

Getting ready

How to do it...

How it works...

There's more...

See also

Enabling SSH access

How to do it...

How it works...

There's more...

See also

Generating authorized RSA keys

Getting ready

How to do it...

How it works...

See also

Configuring SSH RSA key authentication

Getting ready

How to do it...

How it works...

There’s more...

See also

Accessing the SSH

Getting ready

How to do it...

How it works...

See also

Configuring VLANs

Getting ready

How to do it...

How it works...

There's more...

See also

Assigning interfaces from the console

Getting ready

How to do it...

How it works...

See also

Configuring a WAN interface from the console

Getting ready

How to do it...

How it works...

See also

Configuring a LAN interface from the console

Getting ready

How to do it...

How it works...

See also

Configuring optional interfaces from the console

Getting ready

How to do it...

How it works...

See also

Configuring VLANs from the console

Getting ready

How to do it...

How it works...

See also

Essential Services

Introduction

Configuring the DHCP server

Getting ready

How to do it...

How it works...

There's more...

Deny unknown clients

DNS servers

Gateway

Domain name

Default lease time

Maximum lease time

Failover peer IP

Static ARP

Dynamic DNS

Additional BOOTP/DHCP options

See also

Configuring the DHCP6 server

Getting ready

How to do it...

How it works...

There's more...

Prefix delegation

See also

Configuring static DHCP mappings

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring the DHCP relay

Getting ready

How to do it...

How it works...

There's more...

See also

Specifying alternate DNS servers

Getting ready

How to do it...

How it works...

Using the DNS resolver

Using your WAN DNS servers

See also

Configuring the DNS resolver

Getting ready

How to do it...

How it works...

See also...

Configuring a stand-alone DHCP/DNS server

How to do it...

How it works...

Register DHCP leases in DNS resolver

See also

Configuring dynamic DNS

Getting ready

How to do it...

How it works...

Specifying an alternative service using RFC 2136

Adding a wireless access point

Getting ready

How to do it...

How it works...

See also

Firewall and NAT

Introduction

Creating and using aliases

How to do it...

How it works...

There's more...

Using an alias

Editing an alias

Deleting an alias

Bulk importing aliases

See also

Creating a firewall rule

How to do it...

How it works...

There's more...

The source port

Ordering firewall rules

Duplicating firewall rules

Advanced features

See also

Setting a firewall rule schedule

How to do it...

How it works...

There's more...

Selecting dates or days of the week

See also

Creating a floating rule

How to do it...

How it works...

There's more...

See also

Creating a NAT port forwarding entry

Getting ready

How to do it...

How it works...

There's more...

Port redirection

Port redirection example

See also

Creating an outbound NAT entry

How to do it...

How it works...

There's more...

See also

Creating a 1:1 NAT entry

How to do it...

There's more...

See also

Creating an NPt entry

How to do it...

How it works...

Enabling UPnP and NAT-PnP

How to do it...

How it works...

There's more...

Security warning

See also

Additional Services

Introduction

Creating a captive portal without authentication

Getting ready

How to do it...

How it works...

There's more...

See also

Creating a captive portal with voucher authentication

How to do it...

How it works...

There's more...

See also

Creating a captive portal with User Manager authentication

How to do it...

How it works...

See also

Creating a captive portal with RADIUS authentication

Getting ready

How to do it...

How it works...

See also

Configuring NTP

How to do it...

There's more...

Configuring SNMP

Getting ready

How to do it...

There's more...

See also

Virtual Private Networking

Introduction

Choosing the right VPN server

Configuring the IPsec OpenVPN server – peer-to-peer

How to do it...

How it works...

There's more...

Configuring the IPsec VPN service – client/server

How to do it...

How it works...

There's more...

Connecting to the IPsec VPN service

Getting ready

How to do it...

Configuring the OpenVPN service

How to do it...

There's more...

Connecting to the OpenVPN service

Getting ready

How to do it...

There's more...

Configuring the L2TP VPN service

How to do it...

Traffic Shaping

Introduction

Configuring traffic shaping using the traffic-shaping wizard

How to do it...

How it works...

There's more...

See also

Configuring traffic shaping using floating rules

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring traffic shaping using Snort

How to do it...

How it works...

There's more...

See also

Redundancy, Load Balancing, and Failover

Introduction

Adding multiple WAN interfaces

Getting ready

How to do it...

How it works...

There's more...

Configuring server load balancing

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring a CARP failover group

Getting ready

How to do it...

How it works...

There's more...

See also

Routing and Bridging

Introduction

Routing

Dynamic routing

Bridging

Bridging interfaces

How to do it...

How it works...

There's more...

Adding a static route

How to do it...

How it works...

There's more...

Configuring RIP using routed

How to do it...

How it works...

Configuring BGP using FRR

How to do it...

How it works...

Configuring OSPF using FRR

Getting ready

How to do it...

How it works...

Services and Maintenance

Introduction

A structured approach to problem solving

Enabling Wake-on-LAN

How to do it...

How it works...

There's more...

See also

Configuring PPPoE

How to do it...

How it works...

There's more...

See also

Configuring external logging with a syslog server

Getting ready

How to do it...

Using ping

How to do it...

How it works...

See also

Using traceroute

How to do it...

How it works...

See also

Using netstat

How to do it...

Using pfTop

How to do it...

See also

Using tcpdump

How to do it...

Using tcpflow

How to do it...

Backing Up and Restoring pfSense

Introduction

Backing up pfSense

How to do it...

How it works...

There's more...

See also

Restoring pfSense

How to do it...

How it works...

There's more...

Updating pfSense

How to do it...

How it works...

There's more...

See also

Determining Hardware Requirements

Determining our deployment scenario

Determining our throughput requirements

Determining our interface requirements

Choosing a standard or embedded image

Choosing a form factor

Installing the embedded platform on a desktop/server/laptop

Installing the standard platform on an appliance

Summary

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部