Network Security with pfSense

Network Security with pfSense

Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network
Key Features
Explore pfSense, a trusted open source network security solution

Configure pfSense as a firewall and create and manage firewall rules

Test pfSense for failover and load balancing across multiple WAN connections

Book Description
While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world’s most trusted open source network security solution.

Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you’ll understand how to configure and integrate pfSense as a Squid proxy server.

By the end of this book, you will be able to leverage the power of pfSense to build a secure network.
What you will learn
Understand what pfSense is, its key features, and advantages

Configure pfSense as a firewall

Set up pfSense for failover and load balancing

Connect clients through an OpenVPN client

Configure an IPsec VPN tunnel with pfSense

Integrate the Squid proxy into pfSense

Who this book is for
Network Security with pfSense is for IT administrators, security administrators, technical architects, chief experience officers, and individuals who own a home or small office network and want to secure it.

Download Now Read Online

Leave a Reply

Your email address will not be published. Required fields are marked *