Kategorie
Ebooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komputer w biurze
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Multimedialne szkolenia
- Nieruchomości
- Perswazja i NLP
- Podatki
- Polityka społeczna
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Raporty, analizy
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
E-prasa
- Architektura i wnętrza
- Biznes i Ekonomia
- Dom i ogród
- E-Biznes
- Finanse
- Finanse osobiste
- Firma
- Fotografia
- Informatyka
- Kadry i płace
- Komputery, Excel
- Księgowość
- Kultura i literatura
- Naukowe i akademickie
- Ochrona środowiska
- Opiniotwórcze
- Oświata
- Podatki
- Podróże
- Psychologia
- Religia
- Rolnictwo
- Rynek książki i prasy
- Transport i Spedycja
- Zdrowie i uroda
-
Historia
-
Informatyka
- Aplikacje biurowe
- Bazy danych
- Bioinformatyka
- Biznes IT
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronika
- Fotografia cyfrowa
- Grafika komputerowa
- Gry
- Hacking
- Hardware
- IT w ekonomii
- Pakiety naukowe
- Podręczniki szkolne
- Podstawy komputera
- Programowanie
- Programowanie mobilne
- Serwery internetowe
- Sieci komputerowe
- Start-up
- Systemy operacyjne
- Sztuczna inteligencja
- Technologia dla dzieci
- Webmasterstwo
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poemat
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Podręczniki szkolne
-
Popularnonaukowe i akademickie
- Archeologia
- Bibliotekoznawstwo
- Filmoznawstwo
- Filologia
- Filologia polska
- Filozofia
- Finanse i bankowość
- Geografia
- Gospodarka
- Handel. Gospodarka światowa
- Historia i archeologia
- Historia sztuki i architektury
- Kulturoznawstwo
- Lingwistyka
- Literaturoznawstwo
- Logistyka
- Matematyka
- Medycyna
- Nauki humanistyczne
- Pedagogika
- Pomoce naukowe
- Popularnonaukowa
- Pozostałe
- Psychologia
- Socjologia
- Teatrologia
- Teologia
- Teorie i nauki ekonomiczne
- Transport i spedycja
- Wychowanie fizyczne
- Zarządzanie i marketing
-
Poradniki
-
Poradniki do gier
-
Poradniki zawodowe i specjalistyczne
-
Prawo
- BHP
- Historia
- Kodeks drogowy. Prawo jazdy
- Nauki prawne
- Ochrona zdrowia
- Ogólne, kompendium wiedzy
- Podręczniki akademickie
- Pozostałe
- Prawo budowlane i lokalowe
- Prawo cywilne
- Prawo finansowe
- Prawo gospodarcze
- Prawo gospodarcze i handlowe
- Prawo karne
- Prawo karne. Przestępstwa karne. Kryminologia
- Prawo międzynarodowe
- Prawo międzynarodowe i zagraniczne
- Prawo ochrony zdrowia
- Prawo oświatowe
- Prawo podatkowe
- Prawo pracy i ubezpieczeń społecznych
- Prawo publiczne, konstytucyjne i administracyjne
- Prawo rodzinne i opiekuńcze
- Prawo rolne
- Prawo socjalne, prawo pracy
- Prawo Unii Europejskiej
- Przemysł
- Rolne i ochrona środowiska
- Słowniki i encyklopedie
- Zamówienia publiczne
- Zarządzanie
-
Przewodniki i podróże
- Afryka
- Albumy
- Ameryka Południowa
- Ameryka Środkowa i Północna
- Australia, Nowa Zelandia, Oceania
- Austria
- Azja
- Bałkany
- Bliski Wschód
- Bułgaria
- Chiny
- Chorwacja
- Czechy
- Dania
- Egipt
- Estonia
- Europa
- Francja
- Góry
- Grecja
- Hiszpania
- Holandia
- Islandia
- Litwa
- Łotwa
- Mapy, Plany miast, Atlasy
- Miniprzewodniki
- Niemcy
- Norwegia
- Podróże aktywne
- Polska
- Portugalia
- Pozostałe
- Rosja
- Rumunia
- Słowacja
- Słowenia
- Szwajcaria
- Szwecja
- Świat
- Turcja
- Ukraina
- Węgry
- Wielka Brytania
- Włochy
-
Psychologia
- Filozofie życiowe
- Kompetencje psychospołeczne
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Audiobooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Nieruchomości
- Perswazja i NLP
- Podatki
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
Historia
-
Informatyka
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Popularnonaukowe i akademickie
-
Poradniki
-
Poradniki zawodowe i specjalistyczne
-
Prawo
-
Przewodniki i podróże
-
Psychologia
- Filozofie życiowe
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Kursy video
-
Bazy danych
-
Big Data
-
Biznes, ekonomia i marketing
-
Cyberbezpieczeństwo
-
Data Science
-
DevOps
-
Dla dzieci
-
Elektronika
-
Grafika/Wideo/CAX
-
Gry
-
Microsoft Office
-
Narzędzia programistyczne
-
Programowanie
-
Rozwój osobisty
-
Sieci komputerowe
-
Systemy operacyjne
-
Testowanie oprogramowania
-
Urządzenia mobilne
-
UX/UI
-
Web development
-
Zarządzanie
Podcasty
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.
pfSense 2 Cookbook. This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall’s full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features
Matt Williamson, Matthew D Williamson
Ebook
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment's security needs.
pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With the help of step-by-step instructions and detailed screenshots of the pfSense interface you will be able to configure every general and advanced feature from creating a firewall rule to configuring multi-WAN failover. Each recipe includes tips and offers advice on variations of the topic or references to other related recipes and additional information that can be found from other sources.
pfSense 2.0 Cookbook covers the gamut of available features and functionality. The first three chapters will take you from a non-existent system to a basic pfSense firewall. The next chapter focuses on configuring any number of the VPN services available, a very important and sought-after feature for anyone implementing a firewall. The following two chapters describe how to configure the most advanced features available in pfSense; features that may only be relevant to the most experienced network admins. Chapter 7 is dedicated to understanding and configuring the grab-bag of features that are available in pfSense, but are often stand-alone options and unrelated to each other. The first appendix explains how to use the status monitoring tools available for many of the features. The second appendix wraps up with helping you to decide how and where pfSense may be incorporated into your system and what type of hardware is required based on your throughput needs.
pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With the help of step-by-step instructions and detailed screenshots of the pfSense interface you will be able to configure every general and advanced feature from creating a firewall rule to configuring multi-WAN failover. Each recipe includes tips and offers advice on variations of the topic or references to other related recipes and additional information that can be found from other sources.
pfSense 2.0 Cookbook covers the gamut of available features and functionality. The first three chapters will take you from a non-existent system to a basic pfSense firewall. The next chapter focuses on configuring any number of the VPN services available, a very important and sought-after feature for anyone implementing a firewall. The following two chapters describe how to configure the most advanced features available in pfSense; features that may only be relevant to the most experienced network admins. Chapter 7 is dedicated to understanding and configuring the grab-bag of features that are available in pfSense, but are often stand-alone options and unrelated to each other. The first appendix explains how to use the status monitoring tools available for many of the features. The second appendix wraps up with helping you to decide how and where pfSense may be incorporated into your system and what type of hardware is required based on your throughput needs.
- pfSense 2 Cookbook
- Table of Contents
- pfSense 2 Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Initial Configuration
- Introduction
- Applying basic settings in General Setup
- Getting ready
- How to do it...
- See also
- Identifying and assigning interfaces
- Getting ready
- How to do it...
- How it works...
- Theres more...
- See also
- Configuring the WAN interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring the LAN interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring optional interfaces
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Enabling the Secure Shell (SSH)
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Generating authorized RSA keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring SSH RSA key authentication
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Accessing the Secure Shell (SSH)
- Getting ready
- How to do it...
- How it works...
- See also
- 2. Essential Services
- Introduction
- Configuring the DHCP server
- Getting ready
- How to do it...
- How it works...
- Theres more...
- Deny Unknown Clients
- DNS Servers
- Gateway
- Domain Name
- Default Lease Time
- Maximum Lease Time
- Failover Peer IP
- Static ARP
- Dynamic DNS
- Additional BOOTP/DHCP Options
- See also
- Creating static DHCP mappings
- Getting ready
- How to do it...
- How it works...
- Theres more...
- See also
- Configuring the DHCP relay
- Getting ready
- How to do it...
- How it works...
- Append Circuit ID and Agent ID to Requests
- Relay requests to the WAN DHCP server
- See also
- Specifying alternate DNS servers
- Getting ready
- How to do it...
- How it works...
- Using the DNS Forwarder
- Using your WAN DNS servers
- See also
- Configuring the DNS Forwarder
- Getting ready
- How to do it...
- How it works...
- See also
- Configuring a standalone DHCP/DNS server
- How to do it...
- How it works...
- Register DHCP Leases in DNS Forwarder
- See also
- Configuring dynamic DNS
- Getting ready
- How to do it...
- How it works...
- Pre-configured service types (dynamic DNS providers)
- Specifying an alternative service using RFC 2136
- 3. General Configuration
- Introduction
- Creating an alias
- How to do it...
- How it works...
- There's more...
- Host alias
- Network alias
- Port alias
- OpenVPN Users alias
- URL alias
- URL Table alias
- Using an alias
- Editing an alias
- Deleting an alias:
- Bulk-importing aliases
- See also
- Creating a NAT port forward rule
- Getting ready
- How to do it...
- How it works...
- There's more...
- Port redirection
- See also
- Creating a firewall rule
- Getting ready
- How to do it...
- How it works...
- There's more...
- We rarely know the source port!
- Ordering firewall rules
- Duplicating a firewall rule
- Advanced features
- See also
- Creating a schedule
- Getting ready
- How to do it...
- How it works...
- There's more...
- Selecting days or days of the week
- See also
- Remote desktop access, a complete example
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 4. Virtual Private Networking
- Introduction
- Creating an IPsec VPN tunnel
- Getting ready
- How to do it...
- How it works...
- See also
- Configuring the L2TP VPN service
- Getting ready
- How to do it...
- How it works...
- Connecting from a Windows 7 client
- See also
- Configuring the OpenVPN service
- How to do it...
- How it works...
- Encryption algorithms
- OpenVPN Client Export
- See also
- Configuring the PPTP VPN service
- How to do it...
- How it works...
- Connecting from a Windows 7 client
- Connecting from a Ubuntu 10.10 client
- Connect from an Apple Mac OSx Client
- See also
- 5. Advanced Configuration
- Introduction
- Creating a virtual IP
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuring a CARP virtual IP address
- Configuring a Proxy ARP virtual IP address
- Configuring an IP alias virtual IP address
- See also
- Configuring a 1:1 NAT rule
- How to do it...
- How it works...
- There's more...
- See also
- Creating an outbound NAT rule
- Getting ready
- How to do it...
- How it works...
- See also
- Creating a gateway
- Getting ready
- How to do it...
- How it works...
- There's more...
- Gateway Groups
- See also
- Creating a static route
- Getting ready
- How to do it...
- How it works...
- See also
- Configuring traffic-shaping (QoS, Quality of Service)
- Getting ready
- How to do it...
- How it works...
- Bridging interfaces
- How to do it...
- How it works...
- There's more...
- See also
- Creating a virtual LAN
- Getting ready
- How to do it...
- How it works...
- See also
- Creating a captive portal
- Getting ready
- How to do it...
- How it works...
- There's more...
- 6. Redundancy, Load Balancing, and Failover
- Introduction
- Configuring multiple WAN interfaces
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring multi-WAN load balancing
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring multi-WAN failover
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Configuring a web server load balancer
- Getting ready
- How to do it...
- How it works...
- There's more
- See also
- Configuring a web server failover
- Getting ready
- How to do it...
- How it works...
- See also
- Configuring CARP firewall failover
- Getting ready
- How to do it...
- How it works...
- See also
- 7. Services and Maintenance
- Introduction
- Enabling OLSR
- How to do it...
- How it works...
- There's more...
- Enabling PPPoE
- How to do it...
- How it works...
- Enabling RIP
- How to do it...
- How it works...
- Enabling SNMP
- How to do it...
- How it works...
- There's more...
- See also
- Enabling UPnP and NAT-PMP
- How to do it...
- How it works...
- There's more...
- Security warning
- See also
- Enabling OpenNTPD
- How to do it...
- How it works...
- See also
- Enabling Wake On LAN (WOL)
- How to do it...
- How it works...
- There's more...
- Wake All
- See also
- Enabling external logging (syslog server)
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using ping
- How to do it...
- How it works...
- See also
- Using traceroute
- How to do it...
- How it works...
- See also
- Backing up the configuration file
- Getting ready...
- How to do it...
- How it works...
- There's more...
- Backup areas
- See also
- Restoring the configuration file
- Getting ready...
- How to do it...
- How it works...
- There's more...
- Restore areas
- See also
- Configuring automatic configuration file backup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Updating pfSense firmware
- Getting ready
- How to do it...
- How it works...
- There's more...
- Upgrade in progress
- System Dashboard shortcut
- See also
- A. Monitoring and Logging
- Introduction
- Customizing the Status Dashboard
- How to do it...
- How it works...
- There's more...
- Monitoring current traffic
- How to do it...
- How it works...
- See also
- Configuring SMTP e-mail notifications
- Getting ready
- How to do it...
- How it works...
- There's more...
- Viewing system logs
- How to do it...
- How it works...
- There's more...
- Firewall log: Normal View
- Firewall log: Dynamic View
- Firewall log: Summary View
- See also
- Configuring an external syslog server
- Getting ready
- How to do it...
- How it works...
- Running a syslog service in Linux/Mac OS
- Running a syslog service in Windows
- See also
- Viewing RRD graphs
- How to do it...
- How it works...
- System
- Traffic
- Packets
- Quality
- VPN
- Custom
- See also
- Viewing DHCP leases
- How to do it...
- How it works...
- Adding a static DHCP mapping
- Sending a wake on LAN mapping
- See also
- Managing services
- How to do it...
- How it works...
- See also
- Monitoring the packet filter with pfInfo
- How to do it...
- How it works...
- See also
- Monitoring traffic with pfTop
- How to do it...
- How it works...
- See also
- Monitoring system activity
- How to do it...
- How it works...
- See also
- B. Determining our Hardware Requirements
- Introduction
- Determining our deployment scenario
- Getting ready
- How to do it...
- How it works...
- Theres more...
- Determining our throughput requirements
- Getting ready
- How to do it...
- How it works...
- Theres more...
- List of available packages
- See also
- Determining our interface requirements
- Getting ready
- How to do it...
- How it works...
- Theres more...
- pfSense 2.0: Minimum interface requirements
- Choosing a standard or embedded Image
- Getting ready
- How to do it...
- How it works...
- Theres more...
- See also
- Choosing a Form Factor
- Getting ready
- How to do it
- How it works...
- Theres more...
- Installing the embedded platform on a desktop/server/laptop
- Installing the standard platform on an appliance
- See also
- Index
- Tytuł: pfSense 2 Cookbook. This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall‚Äôs full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features
- Autor: Matt Williamson, Matthew D Williamson
- Tytuł oryginału: pfSense 2 Cookbook. This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall‚Äôs full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features.
- ISBN: 9781849514873, 9781849514873
- Data wydania: 2011-03-23
- Format: Ebook
- Identyfikator pozycji: e_3b8o
- Wydawca: Packt Publishing