- Видео 138
- Просмотров 354 949
NICCITE - R.Graves
Добавлен 26 фев 2016
IT Projects and Learning
pfSense PF1 IPv4 HTTP & HTTPS NAT and Firewall Rules
pfSense PF1 IPv4 HTTP & HTTPS NAT and Firewall Rules
Просмотров: 105
Видео
OpenSUSE 15.x Leap Wallpaper and Lock Screen
Просмотров 409Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
OpenSUSE 15.x Leap IPv4 & IPv6 Network Manager & Wicked
Просмотров 384Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
OpenSUSE 15.x Leap Software Updates
Просмотров 104Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
OpenSUSE 15.x Leap Installing Software
Просмотров 219Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
Introduction to Linux
Просмотров 119Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
OpenSUSE 15.x Leap IPv4 & IPv6 Troubleshooting
Просмотров 277Год назад
(12:14) Project - Introduction to Linux ruclips.net/video/A31hkV0Cffw/видео.html (16:13) Project - OpenSUSE 15 3 Leap Install on ESXi 7 0 ruclips.net/video/xCTG98Xe6lQ/видео.html (6:19) Project-OpenSUSE 15.2 Leap Installing Software ruclips.net/video/xFCIigfPJVM/видео.html (4:56) Project-OpenSUSE 15.2 Leap Wallpaper and Lock Screen ruclips.net/video/DYHp8RLfVZU/видео.html (1:34) Project-OpenSUS...
ESXi iSCSI Storage
Просмотров 231Год назад
(6:51) ESXi - Adding Storage ruclips.net/video/dim858FKzZk/видео.html (13:24) ESXi - Adding Direct Attached Storage (DAS) ruclips.net/video/LKZ_AhtdDys/видео.html (6:40) ESXi - NFS Storage ruclips.net/video/2NPzRa8jtmI/видео.html (7:39) ESXi - iSCSI Storage ruclips.net/video/ACx_zbxfd34/видео.html
ESXi NFS Storage
Просмотров 721Год назад
(6:51) ESXi - Adding Storage ruclips.net/video/dim858FKzZk/видео.html (13:24) ESXi - Adding Direct Attached Storage (DAS) ruclips.net/video/LKZ_AhtdDys/видео.html (6:40) ESXi - NFS Storage ruclips.net/video/2NPzRa8jtmI/видео.html (7:39) ESXi - iSCSI Storage ruclips.net/video/ACx_zbxfd34/видео.html
ESXi Patching part-2
Просмотров 122Год назад
ESXi Patching part-1 ruclips.net/video/jfVv1s4R_Ps/видео.html
pfSense - *UPDATE* pfBlockerNG 3.0 GeoIP part-5
Просмотров 4,9 тыс.2 года назад
(14:03) pfSense - pfBlockerNG 3.0 Intro & Install (part 1) ruclips.net/video/3akZU0fu5no/видео.html (17:54) pfSense - pfBlockerNG 3.0 Running the Wizard and post-install overview (part 2) ruclips.net/video/GcQaRm 3H8/видео.html (23:16) pfSense - pfBlockerNG 3.0 DNSBL (part 3) ruclips.net/video/ZwY-5H2nCUA/видео.html (20:28) pfSense - pfBlockerNG 3.0 GeoIP (part 4) ruclips.net/video/hqsjnU1OuO8/...
pfSense OpenVPN Client
Просмотров 4092 года назад
Project: pfSense OpenVPN Part-1 Introduction - ruclips.net/video/Ij_djvYTS38/видео.html Part-2 Installation - ruclips.net/video/K-KyXtQGw_E/видео.html Part-3 OpenVPN Client - ruclips.net/video/BZRgpNG5ZYA/видео.html Part-4 Testing - ruclips.net/video/wynKFYbNMrs/видео.html
pfSense OpenVPN Installation
Просмотров 3212 года назад
Project: pfSense OpenVPN Part-1 Introduction - ruclips.net/video/Ij_djvYTS38/видео.html Part-2 Installation - ruclips.net/video/K-KyXtQGw_E/видео.html Part-3 OpenVPN Client - ruclips.net/video/BZRgpNG5ZYA/видео.html Part-4 Testing - ruclips.net/video/wynKFYbNMrs/видео.html
pfSense OpenVPN intro
Просмотров 3082 года назад
Project: pfSense OpenVPN Part-1 Introduction - ruclips.net/video/Ij_djvYTS38/видео.html Part-2 Installation - ruclips.net/video/K-KyXtQGw_E/видео.html Part-3 OpenVPN Client - ruclips.net/video/BZRgpNG5ZYA/видео.html Part-4 Testing - ruclips.net/video/wynKFYbNMrs/видео.html
OpenSUSE Leap 15.x Apache Install Part-2
Просмотров 1252 года назад
OpenSUSE Leap 15.x Apache Install Part-2
OpenSUSE Leap 15.x Apache Install Part-1
Просмотров 4012 года назад
OpenSUSE Leap 15.x Apache Install Part-1
OpenSUSE Leap 15 x DNS Troubleshooting Part-2
Просмотров 1442 года назад
OpenSUSE Leap 15 x DNS Troubleshooting Part-2
OpenSUSE Leap 15 x DNS Troubleshooting Part-1
Просмотров 2872 года назад
OpenSUSE Leap 15 x DNS Troubleshooting Part-1
OpenSUSE Leap 15 x DNS Install Part-2
Просмотров 5002 года назад
OpenSUSE Leap 15 x DNS Install Part-2
OpenSUSE Leap 15 x DNS Install Part-1
Просмотров 7482 года назад
OpenSUSE Leap 15 x DNS Install Part-1
OpenSUSE Leap 15 x DNS pre-conditions
Просмотров 1922 года назад
OpenSUSE Leap 15 x DNS pre-conditions
OpenSUSE 15.x Leap Install on ESXi 7 0
Просмотров 6062 года назад
OpenSUSE 15.x Leap Install on ESXi 7 0
pfSense - IPv6 HTTP & HTTPS Firewall Rules
Просмотров 8 тыс.2 года назад
pfSense - IPv6 HTTP & HTTPS Firewall Rules
pfSense - IPv4 HTTP & HTTPS NAT and Firewall Rules
Просмотров 7 тыс.2 года назад
pfSense - IPv4 HTTP & HTTPS NAT and Firewall Rules
Windows Server IIS and Certificate Install
Просмотров 12 тыс.2 года назад
Windows Server IIS and Certificate Install
pfSense - Importing an SSL Certificate
Просмотров 3,5 тыс.2 года назад
pfSense - Importing an SSL Certificate
pfSense ACME wildcard SSL cert using DNS Manual validation part-1
Просмотров 6 тыс.2 года назад
pfSense ACME wildcard SSL cert using DNS Manual validation part-1
pfSense ACME wildcard SSL cert using DNS Manual validation part-2
Просмотров 2,2 тыс.2 года назад
pfSense ACME wildcard SSL cert using DNS Manual validation part-2
Hi Randy, As you may know, when you use a radius proxy like DUO RRAS bypasses all the other policies like inactivity time out, IP restrictions, etc. Have you found a way to get those policies to work with DUO. I'm also searching for a bit more security to ensure only machines I want can connect by installing a local certificate or something to ensure only our devices can connect. Thoughts?
Hi 99BBrad, Good to receive your message. After working with the RRAS + DUO setup we switched to using a Duo Network Gateway setup. We did this for many of the reasons you mentioned. The only downside to using DNG was that you needed a step up from the basic Duo user accounts. I believe we were paying $9/month per-user. The DNG setup still uses a Windows Domain Controller for Authentication along with the DUO multi-factor. The DNG server itself if pretty light weight, we built ours using their Linux template. You also need both internal and Internet DNS. And, some new rules on your firewall. For our deployment we used Cloudflare for Internet DNS (free) and pfSense (also free) for the firewall. There is no cost to deploy the DNG server(s) themselves other than the users will need a more expensive Duo account. And of course a Windows Server license (which you probably already have). Hope this information is helpful. And Best-of-Success with your project! Merry Christmas, Randy Graves
@AB-rq1rl ruclips.net/video/Bh4g6qLtHOY/видео.html 😂 😊
it actually worked ! thank you so much
Có thể định cấu hình tường lửa cho IPv6 không?
Yes, You can configure pfSense firewall rules specifically for IPv6 traffic. The way to do this is basically the same as creating an IPv4 rule, you just specify IPv6 instead. Hope this information is helpful to You. Best Regards. R.Graves
this video After 3 year still help
Great video. Very helpful even with the latest version of PFSense.
good one, thanks for the nice explanation
Thank you broooo
What a Nice explanation! Thank you!
I have two gateways for internet. One primary and another one act as failover which connect to one of the four switches in router on second network (LAN2). I can connect to devices in LAN2 when the failover is active. I want to be able to connect to LAN2 at all time. I tried adding a new route to LAN2 network through Gateway 2 (which connect directly from Interface 2 to one of LAN2 router's four switch port) but it did not work. How can I make it work?
JackFruit, I think you are on the right track. I've read you comment a couple of time trying to visualize your network setup (I'm not sure I've got it). Setting Gateways (both Default and no-Default) will give you doorways to other networks. With the Gateways you also need an associated Routing Rule. If no Routing Rule is defined that applies to the packets destination then the Default Gateway is used. Lastly you will also likely need Firewall Rules. These rules are needed when pfSense is used as a Router/Firewall. If you are just using pfSense as a router then no Firewall Rules are needed. But when used as a Firewall/Router then rules are needed to allow traffic between the different interface, not just the WAN interfaces but also the LAN interfaces. I hope this overview helps and triggers something that you may have overlooked in your network setup. Best Regards, R. Graves
@@niccite Thank you for your reply and input. Really appreciated. To help you visualize better, following is the network topology of my network: i.stack.imgur.com/QjM3a.jpg
Where do we buy the SSL from? can you suggest a few providers
Rajanikanth, Because SSL certificates are now only valid for 1 year I have been creating my own using the free option of - Let's Encrypt. I use pfSense and the ACME package to help automate certification creation and renewal. In the past I used a free web tool called "Punch Salad". Punch Salad was/is a free web GUI frontend to creating SSL certificates with Let's Encrypt. For SSL certificates that will not be used outside my network I prefer to create my own self-signed certificates. These will only be good internally and not useful on the Internet. But the advantage of creating my own self-signed SSL certificates is that I can create them to last for 3, 5, or even 10 years. My favored tool for creating self-signed certificates is also pfSense. While not a direct answer to your question I Hope this information is helpful! Warm Regards R.Graves
@@niccite Glad you reached out. we are running are ERP system wichuses IIS without SSL. IIS is hosted in house with a static IP. what's the best approash to secure the communication.
@@rajanekanthvs6183 In a situation as You describe, I think I would use an ACME client for IIS and Let's Encrypt. I don't have the name off the top of my head, but I have recently used an ACME client to auto-renew a Let's Encrypt SSL certificate. The Let's Encrypt certificates are only good for 60 days so have a convenient auto-renew option is very helpful! The ACME IIS client I was using was free for education and personal use (sounds like yours is a business use). My 2nd option would be, depending on how many IIS servers you have, to go ahead an purchase an SSL certificate - A purchased SSL certificate will be good for 1 year and costs are reasonable. A 3rd option would be purchase a Wildcard cert and then you could use it on all your SSL enabled hosts. If the certificate is just for internal IT work and not for end users, then I favor a multi-year self-signed. If Users will be access the resource(s) then I favor either th 60 day Let's Encrypt free certificates or purchase a 12 month certificate - depending on how much work you want to do every 60 days or 12 months. Hope this information is helpful! Thanks for the Follow-Up. R.Graves NICCITE
You know before reading 5 Pages, and Watching RUclips Videos for 20 Minutes. Your Video is that what you really need and its awesome you doing it fast and not Complicated. Thanks help me a lot!
Manuel, Thank You for taking the time to comment. I know the key-sequence doesn't work in every situation but Glad it worked for you!
Thanks for the video, possible to install SSL for Esxi host ver8.0U2 in LAN network too? Can advise? thanks
Siowxsen, I'm understanding your question to be about using a self-signed SSL certificate on your ESXi 8.x server? If this is correct then Yes. I prefer using self-signed SSL certificates in a LAN environment as they can be created as valid for longer than 12 months. I typically create mine for 3-5 years. Here is a link to a video I use as a reminder on how to do this. ruclips.net/video/vZpAIKJ9jyA/видео.html . If I am misunderstanding your questions please let me know and ask again. Best Regards, R.Graves
Thank you
OMG! This was just on Point! Thanks a lot
Great Video! Pfsense is great when you know how to use it!
Thank You! And Best Wished to You for 2024.
If a home network has security cameras that can remoted into, should we use GEOIP?
It makes sense to me that you would want to restrict/limit who can access your remote cameras. Not knowing your particular setup - GeoIP filtering has been especially useful to me with in-bound firewall rules. When I have internal IP addresses that should only be accessed from within my Country, I use a GeoIP Alias for my Country as the allowed Source for the in-bound rule. The only “gotcha” I have come across to-date are resources that tie into Cloud Services like AWS. Plex for example, uses AWS and their (Plex) source location changes based on where AWS resources are globally cheapest. Hope this helps and Best Wishes for 2024
@@RKGraves Very insightful. Thank you for sharing. I've been noticing that my APPLETV is having trouble with PfBlockerNG on my network. Whenever I set it up, my APPLETV stops connecting through the WAN. Even more puzzling is that the issue continues even after I disable PfBlockerNG and reset everything multiple times. I've tried assigning a static IP address to my APPLETV, which seems to fix the problem temporarily, but then it stops working again after a few hours. This pattern repeats even if I change the IP address slightly. Despite completely removing PfBlockerNG, the problem persists. However, when I moved my APPLETV to my main LAN, leaving the VLAN, it started working properly. I haven't been able to find a specific whitelist for APPLETV, and when I check, there's an overwhelming amount of traffic trying to connect to it. I'm starting to think that Apple might be taking steps to avoid DNS sinking and VLAN isolation in their network setup. Have others noticed this too?
Great and thanks you so much. It worked for me.
The cabinet is connected to the ESXi hosts via SAS . I try to add a new datastore with this new virtual disc. But it does not appear in the esxi client for being added.
Amir, I have observed this before. In my case I need to prep the SAS drive by removing all existing partitions. Once I wiped the drive clean ESXi was then able to recognize it. The tool that I use for wiping drives is the Microsoft Diskpart tool. Hope this is Helpful!
Excellent Sir!
Thank you, using only what's needed made much more sense
Mate!!!! thats the video i was searching!!! very well explained
why are you installing on pf1, prtr, win10 and then on server1? Why not just on server1? We are talking about the same certificate that you put on IIS over the rest of device?
Rodigo, (off the top of my head). On PF1 you generate the certificate for your domain . By then exporting a copy to Server1 and RTR you can bind the certificate to IIS (Server1) and the Web management interface on RTR. By doing this when Clients connect by https to these devices the certificate will be recognized as valid and the client will not receive an error message. Let me know if I am misunderstanding your question. RKGraves
Worked, thx
Great video. I think a mistake at 10:25 Where Top Spammers you put Deny Inbound. I understand by this statement "Note: pfSense by default implicitly blocks all unsolicited inbound traffic to the WAN interface.". If you don't turn it on it is blocking anyway? By turning on it is logging blocks?
Kim, Thank You for taking the time to comment and raise this question. I'll go back and re-visit this but here are my thoughts off the top of my head. I fully agree that pfSense by default denies all unsolicited inbound connection attempts. My thinking is that the "Deny - Tom Spammers" rule is there to block inbound requests that log as solicited due to some internal user initiated activity. You make a good point and I'll dig deeper into this. Best Regards, Randy Graves
Clear & Simple. thank u
Love it. Thank you!
Thanks for the video. How do I add multiple geoip aliases (let's say I want to allow multiple countries from different regions) to be allowed in a rule?
BGK93, I’m away from a computer to verify but this is how I think I would approach it - I would do my enable/disable for the different GeoIP regions. Then I would create a new Alias and assign the GeoIP regions as members of the new Alias. If that doesn’t look promising another option might be to create a Firewall Allow Rule for each Region. Hope there is some help in this reply!
@@RKGraves Thanks for the reply. I will try that.
GOAT!
So If I have Google for my DNS servers... its not in the drop down list. So I'll have to manually update the key to the google DNS every 90days? there must be a easier way.
Hi Mike, I also have domain names registered with Google (domains.google.com) but am using Cloudflare.com for the DNS for those domains just for that reason. The pfSense ACME clients automates the certificate validation auto renewal for a long list of DNS providers. But last I checked Google DNS wasn't on the list. If you have a web site there are also ACME clients that can validate domain ownership & certificate renewal using http/https.
your explanation is very clear and perfect, thanks
It’s so cool to see you coming up on my subscriptions still! Thanks for the awesome training!
Alex, Thank You for Your Reply! Trust this message finds you well. Have a Good Weekend.
4:27 my man remembered a full ipv6 address like it was nothing
Really love your explanations. Thanks very much.
Thank You! And Thanks for taking the time to let me know. Have a Good Week!
Does this impact the assigned certificates from vCenter? This looks great for a standalone host, but what if you are in a vSphere environment?
Joseph, I don't know how this would integrate with vCenter. Yes, it does work well for standalone ESXi hosts. With the courses I teach, and students I work with, we use the free ESXi license. I have on my "to do" list to learn more about vCenter but not there yet. Have a Good Weekend!
@@RKGraves Thank you for the time to reply. We'll give it a shot in our vSphere environment.
thank You
You are Very Welcome!
added ByPassTPMCheck doesn't help you, add those RAM and SecureBoot bypass aswell not working
Thank you so much for your time and effort to make this video, I am looking for the 'right' way to do this for so long!!!!
Thank you for taking the time to leave a comment. Very-Glad the Video was helpful!
Thanks dude
Deny africa 😢
muchas gracias profesor! , habia intentado esto antes sin exito, estaba viendolo desde una diferente lógica menos directa. Manejas cuenta de patron?, realmente me gustaría invitarle una comida. Saludos camarada!
Thank You My Friend & Merry Christmas! Gracias mi amigo y Feliz Navidad
you save me!
What does it do?
@@Gjunya אחי זה היה לפני חצי שנה מי זוכר
@@gilmoshe854 my bad😂בכל מקרה הבנתי את הבעיה שלי הייתי צריך להשבית את ipv6 כדי שהחיבור הקווי שלי יעבוד על שבב הרשת של אינטל שלי
working great thanks!
great stuff, thanks agian
hi, thanks for this video. i have question. what is that CorpNet? is that router? physical?
Hi Asrul, These videos come from projects students complete as part of the IT training. The CorpNet and DevNet networks are virtual networks created in ESXi. But they could also be physical networks - would make no difference to pfSense. Each student is assigned an ESXi server and build the network as you see in the videos. pfSense is a great product and I hope your project is going well. R.K. Graves
For me this video solution resolved my problem ruclips.net/video/-HXkvBhL7_U/видео.html
shift+f10 doesnt work on web
Thankyou so much ! i added two more 「BypassRAMCheck」「BypassSecureBootCheck」, it works for me
If adding ByPassTPMCheck doesn't help you, add those RAM and SecureBoot bypass aswell.
Wish I had teachers like this when I was in college studying compsci ...
Mason, Thank You!
Thanks for the video. Do you have a video where you shov how to buy / genrate the *.crt file
Hello Klaus, I use Let's Encrypt (letsencrypt.org/) certificates. They are free, but you need a tool to act as the front end for making the certificate requests and you need to have control of the domain name in order to add DNS records to prove domain ownership. As a front end for Lets Encrypt my favorite tool is Acme client for pfSense. For DNS Manual validation these might be helpful: pfSense ACME wildcard SSL cert using DNS Manual validation part-1 ruclips.net/video/Lu717Y-H0zw/видео.html pfSense ACME wildcard SSL cert using DNS Manual validation part-2 ruclips.net/video/K2VEJg1to2U/видео.html Many Cloud hosted DNS providers are compatible with the Acme tool in pfSense. This allows for automatic, rather than manual, certificate generation and renewal. Hope this helps, R. Graves North Idaho College