2018 Getting started with pfsense 2.4 from install to secure! including multiple separate networks

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments

Tom’s videos are awesome, it’s a great resource for home labbers to use to learn about business class hardware.

👍︎︎ 15 👤︎︎ u/c2cahoon 📅︎︎ May 19 2018 🗫︎ replies
Captions
okay so we're to talk about getting started with pfsense and building your own home router and this is really ideally for like a budget build or home build or you just want to get started with pfSense you're not sure you know what to get what to buy now for commercial installs we by the genuine decade Hardware if we need you know service level agreements support and something that is going to be professionally installed we're gonna go high-end for when you want to build and do some testing and learning this is a great way to start or if you're building your home network or something you have direct access to in support so you're not worried about troubleshooting it and nothing's mission-critical use motherboards and use cards definitely work well for that now let's talk about what parts we have here this is an Intel quad core Q tweet 2800 what I highly recommend this not really is what I had laying around the office here so I also get it to prove a point this is a 10 year old motherboard about a 10 year old processor with it I'm not exact release date for this chip been around awhile not high not highly powerful also does not support the AES ni encryption instructions but that's only really going to affect VPN performance if you don't have that until version 2.5 of pfsense which will require that I know that's down the road at some point I just didn't have a little chips laying around here but you can find those even like the AMD FX chip support AES and those have been around for a number of years so you can find other inexpensive ones now part of the point is also I want to show you that with a ten year old motherboard you can still route at gigabit so this will route even though it has two gigs of ram in a 10 year old processor it will do gig of it part of the key to that though having the right network interface card now there's a lot of network interface cards that are compatible with freebsd i really prefer the intel they're kind of a great go to card that you can just trust compatibility with now this is an Intel Pro 1000 et quad port yeah now this was a whole whopping $25 used on ebay this card's about from 2012 so there's a bunch of them in the market you can pick these up like I said for I buy it now was 25 you can probably get lucky and buy them for cheaper or buy a few of them now what's nice is they have four gigabit ports on here and they are fully supported in BSD part of the trick to the way bsd and pfSense and everything worked together and how this entire thing is orchestrated you don't need a lot of processing power for routing because bsd offloads that to the chip that's why these heat sinks are on here these chips get a little warm this discard definitely pulls a little bit of juice but the routing pfsense orchestrates and tells this how to route that's why you'll watch and we'll do this in the demos when we set this up when we're doing speed tests you'll see the full gigabit speed going across here and you'll watch the processor move very little that's because the chips here are doing that part of it now what do you need a fast processor for well if you want to do advanced intrusion detection and things that require the processor to look at the pen traffic that's passing and do some analysis on it for example running on top so you can watch all the traffic riding or running sericata that's where you may want a little faster processor but I will show with this you can run those tools here without the processor getting way overburdened and it'll still route reasonably fast that's going to vary a lot for prostitute a processor but I'm just gonna give you the idea that yes you can't but for routing QoS and your basics of creating all the firewall rules to keep your network safe and to separate traffic this works great now a couple things we're gonna get in this video is first how to install pfsense pretty straightforward but I'll still walk you through the process for the first timers here then we'll talk about creating LAN LAN and a second land for maybe all your other things that you want to put on there and how to create those rules on how to create it so you have a secondary LAN that is a separate network so you may be those things you don't trust like you're plugging your Wi-Fi toaster in and things like that to that second LAN in this demonstration today we're not going to use any smarts which is I'm assuming that you're maybe a home user or first-time you don't have access to a lot of hardware which is why we chose some old hardware to build this with and a standard inexpensive Netgear eight port gigabit switch as well it's really nice and I'm going to do some other videos and I have done some videos on how to use VLANs everything else and those are a lot of fun and you can buy some expensive hardware for that but we're going to start with this right here and then maybe later on I'll do some other videos but and this is the goal is to download PSN switch I'll leave a link where to get that download it use whatever tool you want to image it to a thumb drive and we're going to load it on this computer I'll walk you through the steps I just happen to have old hard drive laying around yes this is in case anyone's earning one of those old WD Velociraptor drives are kind of cool they're fast now a lot of people ask do I need an SSD for pfsense as well not really I mean there's someone expensive you may as well buy one if you're building one but do you need a big one well how much do you plan on saving on here for logging information and things like that if you look at the genuine Decade hardware you'll see they frequently don't ship with large hard drives and the reason why is unless you plan to dump all kinds of logging data to the drive itself you don't really need a big hard drive the other thing is if you're setting up something in a more professional environment it's you may have the logging turned on but you often dump everything to an external logging server once again means you don't need a big hard drive or a lot of right but if you want to do a bunch of packet capture and I did a video on troubleshooting with PF sense and how you in your packet capture with this that does need a place to store all those packets so then you would want a bigger hard drive so those are just some of the considerations on there but for the most part if you're not doing any packet capture you go you know I don't really care about all that logging I want to keep a couple days with the logs which don't take a whole lot I just wanted to do routing and security no problem so it'll handle that part in a packet filtering and QoS those things do not take up a lot of hard drive space so small hard drives definitely will work alright let's get started with actually loading this now so I'm gonna plug all this in and I'm so budget here we didn't bother getting a case and I just don't feel like mounting any of this in a case so plug in this here oh this is my stand which is a hard drive box got a thermal take flour supplies sitting here so first thing you do is get into the bios of what our machine and make sure you choose the USB drive as the boot drive so we're gonna go ahead and select that and this is going to vary so I'm not going to cover this much with every motherboard you have but the goal is to get it to boot from the USB that we have on here you can see our USB blinking away right here if you have a faster motherboard this goes a whole lot faster first thing we're presented with is this we have to accept the license now you can install if you're recovering this actually does have a recovery and the other option to is recover config dot XML if you ever have a PF sense crash that you forgot to backup which I highly recommend backing up your configuration it does have the option to try and find the reek of recovery file which is config dot XML that is where your configuration is stored and that's all you need that's like the one file you need to get pfSense set backup the way it was so do back that up install default key map unless you have something called custom now Auto ufs manual shell Auto ZFS ZFS is the newer option he added in the later versions and definitely go with ZFS this actually has the option to if you wanted to set up our mirror or raid array within PSN so you wanted to run redundantly on a system you can do that it does have that option we only have one drive so we're just going to go ahead and use the defaults it also has an option in here if you want to setup encryption that means you'd have the type of password each time it boots but if you're ever worried about someone physically taking a machine in exfiltrating the contents of your pfsense config you know things like your special VPN rules or anything like that you can encrypt it and the only downside is every time you reboot you physically have to go to the machine to type in the password choose the disk we would be able to select each disk in air this is the USB that we're booting off of I'm only going to select this one here but if you had more drives you would just press the spacebar and select each Drive that you wanted to make part of the array if that's what you wanted to do last chance we're gonna destroy the date on this Drive fee yep and now it loads installation is not finished if you want there's an option of course if you know some more custom things you want to do to it you can do that here burrows can say no is we're done installing and we're gonna reboot and we'll pop out the thumb drive now this is the first part where sometimes things can get confusing now I've actually disabled so you may notice that there's an onboard network card I went in a BIOS and this I'm Ward one here is disabled then we have these ones here now it's going to vary from card to card but as you can see on the screen it says IG be zero in IG b1 the assignments on the Intel network cards are either top to bottom or bottom to top depends on the card depends on the configuration depends on if it means on its side then it's gonna be left and right if it's on its back like this it's gonna be up and down this sometimes is just a guessing game but good news is they help you out with this little bit so let's set up the interfaces and figure out which one of these is our LAN interface so it's the LAN interface is either gonna be because it's the land is assigned a GB one so it's either gonna be this one or this one it's because it's not the one of these is zero whether it's a top and a bottom well it's a guess but I'm gonna plug this into my laptop and we'll start doing the guessing and figuring out which one it is well that got me a link light but no IP address and plugging this one both got me a link light and an IP address on my system now a couple things you can do here if you wanted to assign the interfaces differently than they are I'm gonna show you how to do this real quick you go here to one for a sign interface and you notice how it says veil it interfaces and which ones up and down this is a handy way to do this because if you plug it in this will let you know what the interface assignments are and the agency I only have one of these plugged in and you can see that's up so you can build it out that way you can also start building your VLANs this way in case your internet is provided off of a VLAN ID so you can set the tags on there but we're not gonna get into all that but you can do it from this if you're not sure which one you don't want to just plug in and guess which one of these it is you can't actually reassign them to be the ones you want them to be and you can see which ones are plugged in by doing this we're gonna actually just gonna cancel out of this and go back here so once we have that and signed and I figured out which one is a GB one which is my land and my laptop now has an IP address and we're gonna log in here in a second the other thing we have is let's plug in our land so that's this one here so now we have a link light and we'll just show you real quick just to go in and show you that it's up so we have both of those up and after pressing enter refreshing the screen we actually see we have an IP address assignment on the land out of the box pfsense on the land side is set to DHCP so if you're plugging it into a cable modem or whatever you're plugging it into you're gonna get an IP address provided by whatever device goes on the wind side the land side by default out of the box is 192 168 1 1 / 24 when we walk through the wizard here in a second to let you customize that but this is the out-of-the-box configuration the other out of the box configuration we're covered in a second is its admin and pfsense is going to be the default login now someone's going to comment that one 92168 3.1 1 8 is a IP address that's because this for demonstration purposes is running inside of my network so it was assigned a private IP address you should get a public IP address if you're plugging this into a bridged cable modem device by the way if you want this to work properly whatever device you plug it into if you're running at home you want to make sure that device is in a bridge mode so you get the public IP address if you plug this directly in for example to a Comcast device it's gonna be handed a private IP address unless that devices in bridge mode goes beyond the scope of this talk but that's the term you're looking for it's a lot of people what do I need to search for to get this plugged in and set up bridge mode that's the important part all right so open up Firefox and I already clicked through the security warning of you know this is an insecure connection because it does use a self-signed certificate and SSL right out of the box default passwords admin & pfSense now if you notice it lets you know that I logged in you notice that over here on the PF sense machine itself and now we're just gonna walk through the wizard which is really straightforward next pfSense local domain this is obviously some debate pick whatever DNS server you think is the right one this is where if you want to override the dns that was assigned by the network interface you can customize this later this is just some default options out of the box I'm not gonna debate which one's the best that's very subjective make your choices here choose your timezone we're gonna choose where I'm at which is Detroit configure way an interface like I said as you seem to default interface is decided by DHCP but you can statically assign it at this point if that's what you want we're gonna leave it at DHCP not because you have to but because we are for this demo we are going to turn off this block Private Networks and we're doing that because we don't want anything added to blocks now what this does is blocks like your private IP ranges but because we're using private IP ranges internally for demonstration instead of a public IP range we're trimming it off not something you necessarily need to do this is where you can customize the LAN IP address for purposes of demonstration we're going to leave it 192 168 1 but if you're going to set up VPNs and things like that a side note is you may want to choose a different address and the reason for this is if two networks the one you want to get to and your network happen to have the same range you're gonna have problems because you suddenly have a competition if I have 192 168 1.10 as a device I want to get to over a VPN and my network has something at that same address you then have to play with the routing to make sure which one of those you actually want to get to when you're connected to the VPN so you may want to assign something other than this but that kind of depends don't assign it the same as your corporate network that you want to connect to or whatever network cuz that would then cause a problem so this is just a thoughts on assignment a subnet mask once again depends on many devices if you're not familiar site of notation slash 24 is the same as 255 255 255 dot 0 next admin password set your password up here now good news is by default pfsense does not have external access turned on so if you do set a weak password I recommend a good password it's only accessible inside your network unless you open it up externally but choose a good password then we hit reload and we're in and I you can click here to learn about support you can click here to continue to pfSense web configurator we're going to go ahead and login to the configuration here accept the terms and licenses yes you can get global support and everything else they have community support global support they have all the support options you can buy support contracts and things like that with them so we're going to go ahead and just close that I will pull up here and add service status I just like seeing that here so we can see the things that are running and we can also do traffic wraps if we want so we can see how much traffic is going across here now we only have two interfaces right now there is an update I'll load that later but you just load the updates by clicking here and it confirm so we're not gonna worry about that at the moment let's get this going through here now a lot of people stop here in a this is like how do I secure everything how do I lock it all down good news we're gonna go to firewall rules notice the lack of rules on the win by default pfSense lets data go out it does not have any rules opened up for your devices so kind of out of the box it's secure it is not opening ports it's not letting things in it's not allowing stuff go on there things like you P&P those are turned off as well so you right here is your you P&P and that's all turned off as well and if you aren't familiar with what UPnP is it is a method by which devices can request that they open ports to your network this is obviously a little bit of a security challenge because if that device is on your network and it is asking for ports to be opening your firewall goes hey you're on the landside no problem i'll open it up obviously this has been abused by certain nefarious tools and things like that so this is just something to think about and a PF sense does have it off by default but a question I get a lot is I got all these gaming systems that want to do that how do I turn it on we're gonna cover that we're never going to put that on a separate network so interfaces assignments we have our land and WAM so these are set up and you can see that the same interface names apply here IGP 0 IG p 1i g p 0 is the top interface and IG p 1 is the second one down as we seen when we plug in our net records that makes AGP 2 and IG b 3 the next two interfaces down for setting things up okay we have PF sense and it's set up and up and running here it's on the one 92168 3.1 one eight network and if you follow along for their videos you'll realize that my computer is at 192 168 3.9 so we're going to connect to my computer with iperf and iperf is my handy-dandy go-to tool for testing network speed now there's lies damn lies and then benchmarks I've heard this said many times this is just a general raw connection to the system so this is not a in depth full network speed test where someone will say you've got this much - this much buffer blow this is just a raw speed test to show you that this is capable of running at gigabit speeds so we're gonna run iperf client 1 92683 9 like I said this is the same network there so there's nothing there's no routing in between these devices that are connected via switch so go ahead and here and we see that we're running at a full essentially the full bandwidth capable of a gigabit connection now something else to note here so this is running perfectly fine we got the full transfer rate within reason there's obviously there's actually three switches in between so maybe I lost this just about 2 or 3 percent over if I would have plugged in directly but it's still gigabit connection and one of the things I want to show is you notice the CPU says you're still sitting here like at nothing so here's our big spike of data that we pulled across but we didn't really do much in CPU usage and this is why I wanted to talk about with having the network interfaces they just don't pull a lot of CPU horsepower to do your routing now one of the things you may notice here is the state table sizes the state table sizes not many states here because my computer is not doing much over the Internet now this is a limitation on an older system is number of state tables that you can have in the amount of memory it tells and the state table is basically the state of a connection between any computer on the land side through land through the network onto the land side but that being said this supports enough that even this board here I could trust putting you know a few dozen computers on without a problem so for your home network once again you're not likely to increase this over what this build is you see we're not using much memory and we're going to do a couple tests here to try to increase the number of states that we have for example I'm gonna open up Facebook and a couple of other things in the background here now just by opening a couple things you see immediately we've jumped up from 30 to 430 state tables so it does require as you open up a lot of things law state tables but we have this maximum of a hundred and twenty thousand available so that being said like I said we're not likely to overrun this router with that but you do see obviously that went up a little bit just so you know and then of course here's the data spikes that come with running all those things in the background but that's still not a problem for this to handle and we'll run the test one more time here and make sure even with those extra state tables you can see we're still getting the full there now our CPU usage goes up just that little bit that's pulling full gigabit where with all the state tables we managed to peak it out what here twelve percent now we'll run one more test to show you how the routing works and we'll get into the actual networking site so here's iperf running through that same address P 100 means parallel 100 so we want to create a hundred simultaneous connections and a t20 is for 20 seconds just so I don't have to sit here as long and keep pressing it so this is running away we're still getting that full speed you can watch it here and the CPU now because of running parallel we're up to 20 percent but once again we're still pulling full gigabit from that network so this 10 year old CPU is able to route gigabit and pull much data now we see what happens if we assign something oh by the way is you notice we're running that in the background here and while that's running in the background pfSense is so completely usable somebody run it again we'll just want to continue see for 200 seconds and we'll go ahead and install something here so we're gonna go here to the package manager available packages and for those of you wondering whoops yes it's still running in the background I'm gonna close I don't need this open so we're still pulling fold a tree to here and we're gonna go ahead and load sericata and this is still running and this has no problem down here so it really doesn't tax the system and make it even while it's doing all this high-end routing so now we're see the CPU usage going up and I shouldn't have switched away from the screen that the package manager was installing but they've finished anyways that's not recommended there we go alright sericata is successfully installed services sericata and we'll just turn it sound really basic real quick now I did just a basic sericata setup and have it enabled here I have an entire video that goes a lot more in depth of sericata if you want to know how to configure it and how to get it all set up but I just want to show you that it is running on the system and one thing we're gonna common here is watch the CPU usage now that we're running Sura kata because he ricotta is inspecting that traffic this went up from like 20 percent to 46 percent so it is still able to run this it is still able to run sericata we have not completely maxed out this system but I will you know this is where you're gonna see a little bit of a taxing on the processor but you can't run it so once again for a home lab this setup works really well and the same thing if we want to enable that and top this would text a little bit more on the CPU but once again you can do that so even with sericata running like that we're not completely maxed out this system alright let's go on to actually getting some other things set up and I mentioned setting up a lot of people go ok I want to separate my computer versus the rest of the insecure devices and things that get plugged in and we're not doing this movie lands values that for this demonstration we're gonna set off another network port and we're gonna expect that you have a different switch that that plugs into then the one that your lands plugged into so this is a to switch setup so we're gonna go over here I go here to interfaces assignments and we're gonna pick just the next one down I G be to click Add and it called it opt 1 I'm gonna hit save here we're gonna click on opt 1 enable crap network so here's our crap network this is where all the junk goes all the insecure devices go the IOT s and all that fun stuff configuration type static now this is where some people might make a mistake don't put in the same as you had for your land so if you did this this 1.1 you would end up with a problem of you wouldn't be able to route between them so you want to assign it separately we're gonna go 30.1 I'm gonna make this a slash 24 and we're gonna click Save we're gonna cut apply okay for the rest of this video I now got this set up with a crap network and I'm recording it from my office externally from the outside IP address now what I did to enable that just because I don't want to skip anything this is 192 168 3.1 1/8 which is the external interface of our PF sense right here and we go to firewall rules ran and also I'm doing is opening up port 443 so I can access it from the LAN side we have our network built we have our interface or crap network we have a statically assigned now there's a couple more steps we need to do first step is services DHCP server for every extra interface you add whether it's a physical interface or a VLAN interface you get another tab here the DHCP server so we're gonna go over here to crap Network go ahead and enable DCP interface on crap network and you can choose the ranges looks like you can with any of the other DHCP or create a series of ranges pools as they're called if you need to do that we're just gonna do the basic and just enable DHCP save alright so now we have that next step is going over here rules crap network now there's no rules which means by default this network does no routing so anything you plug into it it will get an IP address but it can't go anywhere until there's a rule like I said before pfsense airs on the side of caution when you're loading it it's gonna create rules for land but none for land and it's gonna create for each subsequent Network you create whether it's a physical network or a VLAN interface and you get another tab here and the firewall rules there are no rules created by default for them which is good because that means by default they won't start routing traffic or network until you create the rules to do so so first thing we're going to do is just create kind of a wide-open rule and we'll call this one wide open and what we're doing is we're allowing action pass interface to trap network address family and protocol any by default it does TCP and some people will sometimes get stuck on this because they'll let it at the default TCP well that means all these other things don't work so make sure you change it to protocol any or you'll only be able to run TCP protocols through this network now here we go this network is ready to go with wide open it can go anywhere it wants apply changes and I have a computer on the crap Network so this is our studio computer it's on that network and here it has the Gateway as 192 168 at one and it's 30 dot 100 I got the first IP we're in that range I have my laptop still turn on and I can ping it so this can get to the laptop and let's go over here ping google.com and I can get out to the internet and ping Google but this isn't exactly what we want obviously we want the crap network to not mess with our regular land so let's go ahead and move this all the way and like I said this is a wide-open rule so we're gonna go ahead and edit this rule now this is a really simple way to match this we're gonna say land that invert match so what we're doing here by adding this piece here any where but land so the traffic comes in it saw the pass comes in on a crap network it's allowed to go out which actually we should filter this for coming from the crap network so coming out of the crap net cannot go here it's an inverted match so that means I can go out to the Internet but if a destination is a land net then it won't work now if you have a series of networks on area you want one network that you want to be only the internet but not any local networks you can create an alias so you don't have to create too many rules for grouping all those networks together I'd watch my alias video if you know how to do but in short for your home network maybe you want one thing you stick all the crap on and the other ones your land so now we're gonna do invert match and we're gonna hit save here and you see how it does here in the rules so we have the port exclamation port land which means do not go to land and now we're gonna do the same thing and bring it over here in ping I kept in Google but I can't ping doubt 100 anymore so it no longer can get to things on the land network it's that simple to put the block in so there's only one rule and that rule allows us to get out to the internet but doesn't like only notice now you can get more advanced and move things around and play with this this is the one that gets you started to create a network that is limited in the fact that they can't get to your other things on your land your important things on there and things on the crap network are separate next thing I mentioned was the UPnP so we're gonna go over here to services you P&P choose crap network choose allow these things or whichever ones you need soar enable enable UPnP port packing net PMP return all these we're only going to Nabal it for this interface and we're gonna hit save now what this does is allow those devices on that network so all your Wi-Fi toasters and frigerators and random things you want to plug in to that network are now attached to the crap network and they are allowed to use you P&P on that network without risking opening ports up on your land side so it's still gonna open up by default the external interfaces win so a syllabus with the firewall and lands on devices in there but now you have narrowed them down and this is also handy for things like when you want to do any traffic filtering or figure out what devices are doing you can go look at that network separately and have all your other things not interfering with them on there because it's one network so this would get you started on how to start building out your network and getting things set up so they're separated so you have network where you put everything else that isn't important to you on your land is this like it says a common use for PF sense and like I said the kind of the point of this video is to show you that it does not take a lot of hardware to make this happen so we're able to route at those gigabit speeds we're able to do things really fast and we're able to you know separate the network so we have two of them and all you need now is a switch plugged into LAN and this is where you're protected land devices are and a switch plugged in the crap network and that's where you plug in all the other devices ok one thing to show you here on the last note will be that it can route a give it speed this is on the craft Network it's that same machine running iperf just like we did before just like we did in my laptop earlier so yes it has full gigabit access is plugged into the switch but maybe that's something you really want to limit is how much bandwidth the crap network gets so we're gonna go ahead and see that this ran at 948 here and move this out of the way go to firewall traffic shaper now you can run the wizard which is great it's you can build all kinds of queues and you can just has a lot of fine-tuning things in there but or doesn't cover something really simple really quick so we're gonna create a couple limiters just to limit the speed of it so we need a limit in and we're gonna set the bandwidth at 5 megabits and hit save now you can tweak it and play with all these other things and create nested limiters we're not going to really cover all of that so here's our limit in and then we can call it whatever you want to call this one limit n and we're making another one limit out you'll see why we need two of them just a second here and this one same thing we're gonna say 5 megabit now it also has a scheduling option there's a schedule built in pfsense so you can say limit like after a certain time we're not going to get into all those little details so we'll save now we've created a limit in limit out and they're both set to 5 if we're going to apply the changes and we're gonna firewall rules go to our crap Network rule go here and I want to show something real quick you notice how it just says ipv4 crap network as long as it doesn't go to land net it's allowed to do anywhere about LAN so there's our network we're going edit this scroll down display advanced the end the out so here's our pipe limits so this is down towards the bottom when you hit display advanced there's obviously a lot of more stuff you can do here tagging and and sorting it's an amazing the amount of details you can get into here but the short is the in and out as the limiters we're gonna hit save we're gonna hit apply now this little gear got added and if I no time mouse over any gear it pops up and tells me so what that's doing is advanced settings limiter in loader out tells me a limiter has been applied so any of the advanced settings add this little gear so you know that there's more settings to this network than just the rules that are being displayed here it has a more advanced setup now let's go ahead and do our test again so here's the test it was 948 let's see what should be now and we're limited so now this network doesn't get gigabit can only have a maximum bandwidth of that so that's an easy way to do that just to say Det network only gets this much bandwidth because how much bandwidth does a toaster on the network really need probably not a lot so this is a way to like filter that down and say these things only get that much or maybe you want to set it on a schedule and the traffic goes down over time it is whatever time you predefined so that's it for getting started with pfSense hopefully it was helpful to get you playing with this firewall it's amazing I mean this is an enterprise level tool that you can just download and using your home network it's a great way to learn networking and advanced networking and firewalling and all the other fun stuff and this like I said I've got a lot of other videos if you want to go more in depth or you want to look at any particular things like you know how sericata works or some of the other services we talked about thanks for watching if you like this video go ahead and click the thumbs up leave us some feedback below to let us know any details what you liked and didn't like as well because we love hearing the feedback or if you just want to say thanks leave a comment if you wanted to be notified of new videos as they come out go ahead and to subscribe and the Bell icon that lets YouTube know that you're interested in notifications hopefully they send them as we've learned with YouTube anyways if you want to contract us for consulting services you go ahead and hit orange systems comm and you can reach out to us for all the projects that we can do and help you we work with a lot of small businesses IT companies even some large companies and you can farm different work out to us or just hire us as a consultant to help design your network also if you want to help the channel in other ways we have a patreon we have affiliate links you'll find them in the description you'll also find recommendations to other affiliate links and things you can sign up for on Lauren systems comm once again thanks for watching and I'll see you in the next video
Info
Channel: Lawrence Systems
Views: 530,173
Rating: undefined out of 5
Keywords: pfsense, pfsense install, pfsense installation, pfsense setup, install pfsense, pfsense hardware, pfsense download, pfsense 2.3, pfsense router, pfsense firewall, 2018 Getting started with pfsense, Getting started with pfsense, NTEL PRO/1000 ET Quad Port, tutorial, firewall, pfsense tutorial, pfsense (software), guide, how to install pfsense, router
Id: 9kSZ1oM-4ZM
Channel Id: undefined
Length: 38min 45sec (2325 seconds)
Published: Wed May 16 2018
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.