pfSense Configuration Guide - Zero to Hero!

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024
  • НаукаНаука

Комментарии • 89

  • @Jims-Garage
    @Jims-Garage  2 месяца назад +3

    OPNSense Playlist, covers all of this: ruclips.net/p/PLXHMZDvOn5sVAhOGZOUVk5Hfk0k1q-It2&si=zM9GAcIwvzkMnH0P

  • @chrisumali9841
    @chrisumali9841 17 дней назад +1

    Thanks for the demo and info. Another great fantastic video Jim. Have a wonderful day

  • @atraxotoxin3840
    @atraxotoxin3840 2 месяца назад +3

    Been working with pfsense for about 4 years now absolutely love it. Just remember to back up your configuration often. Trust me it will save you a lot of headaches. When you break things and you will. It just comes with the territory.

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +1

      Absolutely agree. I also do VM backups and snapshots to limit downtime.

    • @elminster8149
      @elminster8149 2 месяца назад

      You can use Autoconfig Backup under Services. Make sure to keep a copy of your device key in a secure location.

    • @atraxotoxin3840
      @atraxotoxin3840 2 месяца назад

      @@Jims-Garage yeah me to. Unfortunately I had to learn the hard way. A couple of years ago my ssd died and at the time I didn't back anything up. So needless to say I had to start completely over. So now I send backups to another device about every month or two. And take regular snapshots about every 3 to 4 weeks or so. But if I'm working on a project I'll take a snapshot before I make any drastic changes.

  • @derglatzi1725
    @derglatzi1725 2 месяца назад +1

    Thanks for the great video. I really appreciate seeing a for detailled insight in IDS and IPS. Cheers

  • @guillermogalvez1871
    @guillermogalvez1871 Месяц назад +1

    OMG Thank you so much! Your video is the only one so far that made Nord Work for me.

  • @HunterHarris.
    @HunterHarris. Месяц назад +1

    Thank you! I couldnt for the life of me get wireguard working. I have it setup with Cloudflare DNS now thanks to your video!

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      @@HunterHarris. You're welcome

  • @PocketRocket-u2r
    @PocketRocket-u2r Месяц назад +1

    Yes... a video deep dive into Snort IDS/IPS setup would be awesome, especially working towards enabling blocking. Great pfsense series BTW

    • @Jims-Garage
      @Jims-Garage  Месяц назад +2

      @@PocketRocket-u2r thanks! The key problem is that it won't see HTTPS traffic regardless, which is probably 90% of everything... Might be worth putting on a LAN or NAS vLAN.

  • @mistakek
    @mistakek Месяц назад

    And yes to a in depth IDS/IPS pfsense video would get great.

  • @zcavaleiro
    @zcavaleiro 2 месяца назад +2

    Thanks for sharing your work!

  • @rediffusion7996
    @rediffusion7996 Месяц назад +2

    It was superb

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      @@rediffusion7996 thanks 👍

  • @mikescott4008
    @mikescott4008 2 месяца назад +1

    Thank you for the video :)

  • @Sli3py
    @Sli3py 2 месяца назад +2

    Awesome video as usual, very information and easy to follow a long. I have been waiting for this pfSense part 2 for longggg time haha! Thank you so much for upload the vid, can not wait for the next one.

  • @TantissTheEmperor
    @TantissTheEmperor Месяц назад +1

    Very cool vid, and yes I might be interested by a IDS/IPS deep dive video :D

    • @Jims-Garage
      @Jims-Garage  Месяц назад +2

      Noted! Unfortunately both OPNSense and pfSense are quite limited in that respect as they can't do HTTPS traffic.

    • @TantissTheEmperor
      @TantissTheEmperor Месяц назад

      @@Jims-Garage maybe with Netify ? Which is an open source DPI compatible with PFSense.

  • @gp2254
    @gp2254 Месяц назад +1

    Love the content Jim! I would love to see some videos on how to get started with Grafana and Prometheus in terms of monitoring my Dell Poweredge, Unraid servers and lastly my Proxmox host. Look forward to your next video mate! Cheers

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      Thank you! Check out my logging and monitoring series: ruclips.net/p/PLXHMZDvOn5sWn-pvF3KcUfyZKZpD7q8IJ&si=LeLlfiqbVLTucER4

  •  Месяц назад +1

    great video!! now, given your previous experience with OPNsense, and now that you've switched to pfSense, have you formed a preference for either firewall?

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      I'm still running pfSense behind OPNSense for evaluation. I find pfSense to be more intuitive but that's a personal preference. I am going to acquire a licence to Plus and see if that adds anything meaningful for my lab setup. My current thinking is that unless Wireguard performance is important, both are great.

  • @asis-vo1rx
    @asis-vo1rx 2 месяца назад +1

    Good video! Have you looked into Suricata instead of Snort for IDS/IPS? Curious what your opinion is on it.

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +1

      Thanks! I haven't, both are pretty useless for WAN traffic regardless due to HTTPS. You're better off with an EDR solution or proper web proxy if you're concerned about web traffic. For hosted services, Crowdsec is the way to go IMO.

  • @BenReese
    @BenReese Месяц назад +1

    Fantastic video! I've been using pfSense for a couple years and learned some good stuff here. My biggest struggle right now is port forwarding across a site-to-site VPN. Just can't seem to wrap my head around the firewall rules to allow that to work. My goal is to host game servers at home, but have those more or less "proxied" through a Google Cloud hosted pfSense machine. I'll keep working on it and maybe apply some of the learnings from this video. Open to suggestions though!!

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      Thanks 👍 I assume you're following the official docs? I might cover this in a future video

    • @BenReese
      @BenReese Месяц назад +1

      @@Jims-Garage Oh, are there "official docs" on port forwarding across a VPN? I'll have to check. No, I haven't found much detail on it, but also haven't tried in a few months. I'll have to pick that project back up soon.

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      @@BenReese if you follow the docs for site to site it should work

  • @zyntax81
    @zyntax81 2 месяца назад +1

    Could you cover traefik and PfSense with the port 443/444 for internal external access? Hairpin/NAT Reflection is a pain to get working in PfSense. Split DNS is recommended instead, but that doesn't support port changing if i understand correctly.

  • @JavierPerez-fq2fi
    @JavierPerez-fq2fi 2 месяца назад +1

    Outstanding job Jim! Never watched a video about pfsense (I have fork version opnsense) but was easy to follow although networking, vlans and so on are tough topics...
    Thanks for putting so much effort to share all your wisdom to the world :)

    • @Jims-Garage
      @Jims-Garage  2 месяца назад

      Glad you enjoyed it! Thanks for leaving a comment.

  • @project_mini_hero
    @project_mini_hero Месяц назад +1

    Chet Jim, great content as usual. You are one of the Goats!! Did not know you were Could you do a review of Wazuh next?

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      @@project_mini_hero thank you! It's on the to-do list

    • @project_mini_hero
      @project_mini_hero Месяц назад +1

      @@Jims-Garage Thanks for replying, I also have another idea here. I do not recall if you use Grafana in your stack for logging but if you do, could you do a video on collecting logs using Grafana Alloy seeing promtail will be deprecated ?

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      @@project_mini_hero I've covered logging extensively in a 2 part video but I haven't done alloy. Will look into it

  • @DigiDoc101
    @DigiDoc101 2 месяца назад +1

    Thank you for this. Great work! This is first to see Nordvpn setup. You have setup accross all LANs. I wonder if there is a way to specifiy as a gateway. Also, there is no mention of kill switch mechanism. May be through packet tagging, not sure.

    • @Jims-Garage
      @Jims-Garage  2 месяца назад

      I specficy it as a gateway for Wireguard (check the video). That should function as a killswitch - if gateway isn't available the traffic goes nowhere.

  • @mikescott4008
    @mikescott4008 Месяц назад +2

    So which do you prefer pfsense or opnsense or Sophos? Each have their pros and cons.

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      @@mikescott4008 I find Sophos xg the easiest to use but the lack of WireGuard isn't great. pfSense has better WireGuard performance than OPNSense and I prefer its UI, but I'm still on OPNSense for the time. I will likely move to pfSense when I can be bothered.

    • @mikescott4008
      @mikescott4008 Месяц назад

      @@Jims-Garage interesting and semi where I'm at too. I find pfsense easier than XG at the moment, but I've been out of the XG echosystem for circa 12-14 months having moved to pfsense. Opnsense I've never gotten on with and find the pfsense+ instance I have quicker. I have OpenVPN, WG and IPSEC VPNs configured. I have been tempted to setup a WG concentrator on a seperate VM and run XG again. XG Home doesn't leverage the crypto either sadly. The XG135 R3 unit I have can do QAT, which I've using on pfsense+ along with DCO. Due to the size of my little network it prob makes little difference. I'm waiting for Toob to come into my area to then jump on their 900/900 offereing rather than Virgin atm.
      I like exploring these options out of learning as job wise I'm more on the normal infra stack. vMware, Microsoft, AD, MECM etc.
      I'm just considering opnsense on the XG230 unit at the moment, but it's got V21 XG on it atm.
      The Let's encrypt on Sophos XG will meet my needs anyway as I've spun up a CA at home for all the internal stuff, also gets away from the 90 day re-loading certs..

  • @quocthaitran5400
    @quocthaitran5400 Месяц назад

    Thanks for the great video. Could you do another video to cover QinQ (IEEE 802.1ad) Vlan on Pfsense ?

  • @tfontmusic
    @tfontmusic 3 дня назад +1

    Any chance we can get a video using PFSense and a reverse proxy (preferably HAProxy since it’s baked into PFSense) for your home services? Bonus points if you setup Let’s Encrypt as well!

    • @Jims-Garage
      @Jims-Garage  3 дня назад +1

      Thanks for the suggestion, I might do. I currently do everything through Traefik in Kubernetes and Docker

    • @tfontmusic
      @tfontmusic 3 дня назад

      Whichever reverse proxy you use I think could make a great learning video! I said HAProxy since it’s available in PFSense but either is fine!

  • @cyrilpinto418
    @cyrilpinto418 Месяц назад +1

    Hi Jim; Great video as always. What I couldn’t get is if Vlan20 and 40 are just virtual systems (not physical devices like IOT, Cameras, Office Laptops etc), why do they need to be configured on the Switch itself. Does that mean, one has to have an individual / physical port for each virtual VLAN (ie no underlying physical device) created in Proxmox / PfSense ?

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      No, it's just whichever port is used (you can have multiple VM on a single port) has to understand the vLANs (tagged).

    • @cyrilpinto418
      @cyrilpinto418 Месяц назад

      @@Jims-Garage thanks for the reply; atm I have a physical Nic (and created a Proxmox VMBR without it being VLAN aware), connected to a Mikrotik Hex (with VLANs). This is being used as parent interface to segregate physical IOT, office, cameras etc.
      I have also created another VLAN aware VMBR in Proxmox, albeit without it being connected to a physical NIC port. Have created 3 VLANs on Pfsense, and CTs/VMs on Proxmox with respective VLAN tags.
      Not sure if this is the right way. Or should I make the physic Nic / bridge VLAN aware then have all 7 VLANs trunked to the Hex.

  • @mikescott4008
    @mikescott4008 2 месяца назад

    RE the NAT piece re WireGuard, I assume you're only doing that due to running full tunnel setup? I'm still on pfsense, I started looking at v21 Early Access Sophos XG, but back here.. SDN is of interest on Sophos XG, but I am using multiple WAN. Virgin and 4G failover, I don't like the monitor IP option on pfsense as it essentially creates a static route underneath. Next thing I'll be doing re "homelab" is spinning up an internal CA and lets encrypt only for the pfsense box. WG for my IOS devices, OpenVPN for laptop and IPSec for s2s to other family firewalls.

  • @miguelfonseca9923
    @miguelfonseca9923 2 месяца назад +1

    Great video! Is there already a way of using MFA in VPN (either from pfsens or OPNSense) without entering the OTP+password / password+OTP when authenticating? Should be a 2nd phase separately as it is in any other solution. Thanks

    • @Jims-Garage
      @Jims-Garage  2 месяца назад

      @@miguelfonseca9923 checkout my netbird video. You can integrate that with an identity provider and have MFA

  • @FilipeNeto616
    @FilipeNeto616 15 дней назад +1

    So you drop sophos for pfsense or opensense, right? If so, any particular reason why you drop sophos?

    • @Jims-Garage
      @Jims-Garage  15 дней назад +1

      @@FilipeNeto616 initially because I couldn't get the Sophos xg to recognise my MS-01 NIC (you need to use the iso not KVM image). But I also gained the benefit of WireGuard on the firewall. Sophos still uses an ancient kernel

  • @PCMagikHomeLab
    @PCMagikHomeLab 2 месяца назад +2

    great vid! Maybe site-to-site on wg next time?

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +1

      Sure, sounds like a good idea.

  • @DrAlien23
    @DrAlien23 Месяц назад +1

    Hi, great video
    I have a UCG Ultra right now connected to my modem and i tried switching it like this ISP-pfsense-ucg-accesspoints
    But in this scenario my pfsense only sees ucg ip in logs and not individual hosts connected to AP. I want to monitor network connections in a SIEM. Can you suggest how can i overcome this?
    Thanks

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      Why do you want 2 firewalls?

    • @DrAlien23
      @DrAlien23 Месяц назад

      @@Jims-Garage because i have netgate 1100 which can not afford ids/ips, i tried multiple time but it doesn’t work due to less memory so i want to use ucg ultra for that and I invested in these 2 hardwares now so thought of finding some way but am not super with networking stuff.

  • @georgecaballero3405
    @georgecaballero3405 Месяц назад

    Can you check how to configure the python pfblocker

  • @IwanDavies
    @IwanDavies 2 месяца назад +1

    What's the additional hardware requirement from running Wireguard, OpenVPN and snort? I'm in a virtualised environment on Proxmox and looking to keep resource allocations as meagre as possible. Currently running pfSense with just 1 core and 512MB of memory (I know the reqts are higher), so wondering what I will need to tweak if I add snort and Wireguard?

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +1

      @@IwanDavies snort you likely need about 6GB and 4 cores, WireGuard shouldn't need much. I'm very surprised that you can run pfSense long term and reliably with 512MB, the minimum requirement on their site is 1 GB.

    • @IwanDavies
      @IwanDavies 2 месяца назад +1

      @@Jims-Garage pfSense VM uptime currently clocking in at 193 days! (I've jinxed it now haven't I!) There's only two of us in the house but we both work from home, so there's a work vlan, home vlan and IOT vlan, plus all the usual streaming, etc. so a chunk of traffic running through it. The limiting factor is my Proxmox server which is an ageing Fujitsu entry-level tower server with a 4-core Xeon that only supports 32GB of RAM. I managed to get your K3s & longhorn tutorial running on it though! Just about got an nginx container running on that but it was struggling. Thx for the vid(s) & your reply!

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +1

      @@IwanDavies that's amazing considering the hardware constraints, nice one!

  • @CrazyDriverSwed
    @CrazyDriverSwed Месяц назад +1

    If I choose to run pfsense in proxmox how should I keep proxmoxs secure? I want proxmox it self be protected by pfsense and be able to download updates.

    • @Jims-Garage
      @Jims-Garage  Месяц назад

      @@CrazyDriverSwed Proxmox connects to the virtual pfSense

  • @anand-nb4bb
    @anand-nb4bb Месяц назад

    Hi Bro can you please make a step by step video on configuring Pfsense Openvpn with split tunnelling & configure Ubuntu as a VPN client. Please its a request. kindly reply

  • @elminster8149
    @elminster8149 2 месяца назад +2

    Last I heard KEA DHCP was not feature complete, be cautious!

    • @Jims-Garage
      @Jims-Garage  2 месяца назад

      Thanks, wasn't aware of that. I'll read into it.

    • @emanuelpersson3168
      @emanuelpersson3168 2 месяца назад

      KEA is lacking a lot of stuff.

    • @emanuelpersson3168
      @emanuelpersson3168 2 месяца назад

      @@Jims-Garage Basic functionality is present in version 23.09, but the Kea implementation lacks the following DHCP server features:
      Local DNS Resolver/Forwarder Registration for static and dynamic DHCP clients
      Remote DNS server registration
      DHCPv6 Prefix Delegation
      High Availability Failover
      Lease statistics/graphs
      Custom DHCP options

    • @unmesh59
      @unmesh59 2 месяца назад

      @@emanuelpersson3168
      I've had problems with KEA as the DHCP back end and had to revert back. Basically, I've had statically mapped clients sometimes get IP addresses from the DHCP server pool instead of the mapped ones.

  • @BartTech
    @BartTech 2 месяца назад +3

    Opnsense please! 😀

    • @Jims-Garage
      @Jims-Garage  2 месяца назад +2

      I have a complete playlist already on OPNSense covering all of this and more.

  • @sonny8085
    @sonny8085 2 месяца назад +2

    First 🙌

  • @infyrno
    @infyrno Месяц назад +1

    Do you prefer Pfsense over Opnsense (newest version)

    • @Jims-Garage
      @Jims-Garage  Месяц назад +1

      Both pretty much the same. I prefer the layout of pfSense and its WireGuard implementation is faster but there are no absolute deal breakers.

  • @docmalitt
    @docmalitt 2 месяца назад +2

    Now kind Sir, you're talking my language. Unfortunately we all aren't in position to "hijack" the entire network for ourselves or our homelab and just tell the rest of the family to use neighbor's wi-fi (regardless if you're a "dad-in-charge".. when ever wife is kind enough to let you believe in such.. hmm, nonsense... or a "regular" part of a family) so thank you for this distinction. Let's rock'n'roll - for younger viewers then is the ONLY real genre of music and you poor young souls have no idea what you're missing. (The opinions are my own and not of my employer - pls don't send h8 and spread only love via these internet comments)

    • @Jims-Garage
      @Jims-Garage  2 месяца назад

      Haha, thanks Doc, rock on!