Pfsense Training - 2
Pfsense Training - 2
Introduction to pfSense
What is pfSense ?
pfSense is a complete firewall software package that, when used together with
suitable hardware, provides all the important features of commercial firewall
boxes (including ease of use) at a fraction of the price (free software). pfSense is
based on a stripped-down and heavily customized version of FreeBSD, along
with a web server LightTPD, PHPand a few other utilities. The entire system
configuration is stored in one single XML text file to keep things transparent.
pfSense is probably the second UNIX system to have its boot-time configuration
done with PHP, rather than the usual shell scripts, and to have the entire system
configuration stored in XML format. The pfSense project was based
on m0n0wall, which was the first system of this type. pfSense features a
package system that allows the environment to be extended with new features
and functions.
Background
Firewall and Router
Built using FreeBSD
Started in September 2004
Built using the very stable m0n0wall project
Features
Products
Distributed by Netgate
Recommended RAM 2 GB
How to do it
Create on Vitrual Box
Chose Start and select the iso image path in your location
Press N for NO
How to do it
Browse / 192.168.1.1 to your Web Interface ( Chrome )
Enter a Hostname. This name will be used to access the machine by name
instead of the IP address. For example, we can browse to
http:// raid5technology instead of 192.168.1.1
DNS Servers can be specified here. By default, pfSense will act as the primary
DNS server and these fields will be blank
Enter a Time zone and leave the default NTP time server as
0.pfsense.pool.ntp.org.
How to do it
Access the console from the physical machine or enable SSH and connect
remotely (see the Enabling the Secure Shell (SSH) recipe)
The home screen will display a list of interfaces, network ports, and IP
addresses:
Creating Firewall
How to do it
Browse to Firewall | Rules.
Firewall rules are highly configurable. Details of each firewall rule option are as
follows:
Action: The type of action defined will be enforced if the rule is matched.
Pass: If all the criteria match, the packet will be allowed to pass.
Block: If all the criteria matches, the packet will not be allowed to pass
(some refer to this as a silent drop).
Reject: If all the criteria match, the packet will be returned to the sender.
Source Port Range: This is typically any when referring to incoming traffic.
Destination Port Range: This is typically the specific port of the computer
which is servicing this traffic.
match is executed and the rest of the rules are skipped. Many
administrators will include very specific rules at the top and more
generic rules at the bottom. You can ajust the rule by dragging .
Specify the IP address for the gateway—it must be a valid address on the
chosen interface.
We may assign an alternative Monitor IP, or leave it blank to be filled with
the gateway's IP address by default.
Add a Description, such as My new gateway
How to do it
Browse to Firewall | Traffic Shaper
Chose to Limiter and New Limiter
Check on Enable Limiter
Name for Upload and Set Bandwidth to ?? kbit/s
Again for Download
*Test Your BW again , Your VVIP BW is running to default BW not under in your
limitation
Bridge
Network bridging takes place at layer 2 (the Data link layer) of the OSI model.
There are several different types of bridges. A simple bridge isn't much different
than a repeater, except
for the fact that the two network
segments it connects may
use different types of media
(for example, one segment
may use 100 Base-T cabling
and the other may use 1000
Base-T) and the fact that bridges
use a store-and forward
mechanism to forward packets,
Static Route
How to do it
Browse to System | Routing.
Click the Gateways tab.
Click the "plus" button to add a new gateway.
Select the Interface for the new gateway.
Specify a Name for the gateway (no spaces allowed).
Specify the IP address for the gateway; it must be a valid address on the
chosen interface.
We may assign an alternative Monitor IP, or leave blank to be filled with
the gateway's IP address by default.
Add a Description, such as My new gateway.
Bridging Interfaces
How to do it
How to do it
from 1 to 4094.
Add a Description, such as My OPT virtual LAN.
Creating Captive
How to do it
We will configure load-balancing for two separate WAN interfaces. Make sure
that the WAN interfaces are first properly configured .
How to do it
Chose General
Enable Squid Proxy
If you decide to implement a VPN, you can choose from several different forms
of VPN deployments .The most common ones are the following:
Peer-to-peer: In this scenario, a VPN tunnel is created between two networks; for
example themain corporate office and a satellite office location. The general
idea is that setting up a VPN is cheaper than a leased line between the two
locations. Instead of having a router on one end and a mobile client on the
other end, there is a router on each end of the tunnel.
Traceroute :