|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1039099524 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180608s2018 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d TOH
|d OCLCF
|d DEBBG
|d TEFOD
|d CEF
|d CNCEN
|d G3B
|d UAB
|d VT2
|d C6I
|d UX1
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1175626136
|
020 |
|
|
|a 9781788993470
|q (electronic bk.)
|
020 |
|
|
|a 1788993470
|q (electronic bk.)
|
020 |
|
|
|a 1788993179
|q (Trade Paper)
|
020 |
|
|
|a 9781788993173
|
020 |
|
|
|z 9781788993173
|
024 |
3 |
|
|a 9781788993173
|
035 |
|
|
|a (OCoLC)1039099524
|z (OCoLC)1175626136
|
037 |
|
|
|a CL0500000970
|b Safari Books Online
|
037 |
|
|
|a 389DA84D-2DFB-441B-AE9A-53CE704E660F
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zientara, David,
|e author.
|
245 |
1 |
0 |
|a Mastering pfSense :
|b manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 /
|c David Zientara.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed June 6, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
8 |
|
|a Annotation
|b Install and configure a pfSense router/firewall, and become a pfSense expert in the process. Key FeaturesYou can always do more to secure your software - so extend and customize your pfSense firewallBuild a high availability security system that's fault-tolerant - and capable of blocking potential threatsPut the principles of better security into practice by implementing examples provided in the textBook DescriptionpfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market - but, like the very best open-source software, it doesn't limit you. You're in control - you can exploit and customize pfSense around your security needs. Mastering pfSense - Second Edition, covers features that have long been part of pfSense such as captive portal, VLANs, traffic shaping, VPNs, load balancing, Common Address Redundancy Protocol (CARP), multi-WAN, and routing. It also covers features that have been added with the release of 2.4, such as support for ZFS partitions and OpenVPN 2.4. This book takes into account the fact that, in order to support increased cryptographic loads, pfSense version 2.5 will require a CPU that supports AES-NI. The second edition of this book places more of an emphasis on the practical side of utilizing pfSense than the previous edition, and, as a result, more examples are provided which show in step-by-step fashion how to implement many features. What you will learnConfigure pfSense services such as DHCP, Dynamic DNS, captive portal, DNS, NTP and SNMPSet up a managed switch to work with VLANsUse pfSense to allow, block and deny traffic, and to implement Network Address Translation (NAT)Make use of the traffic shaper to lower and raise the priority of certain types of trafficSet up and connect to a VPN tunnel with pfSenseIncorporate redundancy and high availability by utilizing load balancing and the Common Address Redundancy Protocol (CARP)Explore diagnostic tools in pfSense to solve network problemsWho this book is forThis book is for those with at least an intermediate understanding of networking. Prior knowledge of pfSense would be helpful but is not required. Those who have the resources to set up a pfSense firewall, either in a real or virtual environment, will especially benefit, as they will be able to follow along with the examples in the book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
0 |
|a Routers (Computer networks)
|
650 |
|
0 |
|a Computer interfaces.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
2 |
|a User-Computer Interface
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
6 |
|a Routeurs (Réseaux d'ordinateurs)
|
650 |
|
6 |
|a Interfaces (Informatique)
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer interfaces
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
650 |
|
7 |
|a Routers (Computer networks)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788993173/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|