pfsense on 1 network/ethernet port PC using VLANS

pfsense on 1 network/ethernet port PC using VLANS

Published on Dec 9, 2017

Complete setup of pfsense 2.4.2 on single port nic PC, VLAN configuration on pfsense and Cisco SG-200 8 port gigabit switch. All info is provided. Using Dell Optiplex 3050 as an example but you can now use any single port PC as your router! Subscribe and Nick will answer your questions! NOTE: BIOS Changes required to install pfsense from default Dell shipped configuration.
=================CREDITS====================
Tech Live Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License

Netgate pfsense Firewall SG 1100 Review & Speed Tests, pfsense 2.4 from install to secure

Netgate pfsense SG 1100 Review & Speed Tests

How to configure integrated Netgate Switches

https://www.netgate.com/resources/videos/configuring-netgate-appliance-integrated-switches-on-pfsense-244.html

 

Firewall

 

Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4

Building A PFSense Firewall

After a long battle editing this video with Kdenlive I finally got this video done. I got around to building a firewall for my Linux Server Rack project. I started off with a 1U rack mount server chassis, a Intel D2500CCE Atom Dual LAN Mini-ITX Motherboard, 2 sticks of Samsung 2GB PC-8500 DDR3 1066MHz memory, & a ADATA 32 GB SSD. I tossed it all up in the air and it came back down as a firewall. The first power supply I got was junk, it burned out after about a week of use, and I had to replace it. I been Using it now for the past month, I really enjoy using PFSense, and will never be going back to stock routers ever again.

How to Setup An Alias In pfsense To Simplify Firewall Rules

 

iptables: The Default Linux Firewall

The term ‘firewall’ generally refers to a barrier that is used to limit the spread of fire. In the computing world, it refers to a software or hardware based network security system, which can be used to control incoming and outgoing network traffic based on a set of rules.
A firewall basically establishes a barrier between the internal network (a group of systems or a single one), which is assumed to be secure and trusted, and the external network (usually the Internet), which is considered neither secure nor trusted. Various operating systems include software based firewalls to protect against the threats from the Internet. A router also consists of firewalls, and a firewall can also perform routing functions.
Figure 2 shows the generation of a firewall, while Figure 3 lists the types of firewalls.

 

iptables
iptables is a built-in firewall in Linux. It is a user based application for configuring the tables provided by the Linux kernel firewall. iptables is the default firewall installed with Red Hat, CentOS, Fedora Linux, etc. Different modules and programs are used for different protocols such as iptables for IPv4, ip6tables for IPv6 and so on. It uses the concept of IP addresses, protocols (tcp, udp, icmp, etc) and ports.
iptables is a command line firewall that uses the concept of chains to handle the network traffic. It places the rules into chains, i.e., INPUT, OUTPUT and FORWARD, which are checked against the network traffic. Decisions are made as to what to do with the packets based on these rules, i.e., whether the packet should be accepted or dropped. These actions are referred to as targets. DROP and ACCEPT are commonly used predefined targets used for dropping and accepting the packets, respectively.
The three predefined chains in the filter table to which rules are added for processing IP packets are:
INPUT: These are packets destined for the host computer.
OUTPUT: These are packets originating from the
host computer.
FORWARD: These packets are neither destined for nor originate from the host computer, but pass through (routed by) the host computer. This chain is used if you are using your computer as a router.
iptable architecture comprises groups of network packets, processing rules into tables and chains for processing the rules. Rules consist of matches to determine which packet the rule will apply to and the targets. They operate at the OSI layer, i.e., the network layer.
For more details, you can visit https://www.youtube.com/watch?v=fQF2vEvqHgU

 

for more details articles source: https://opensourceforu.com/2015/04/iptables-the-default-linux-firewall/

Getting started with pfsense 2.4 from install to secure! including multiple separate networks

 

pfsense Firewall Setup and Features in Depth Version 2.4

 

iTunes library migration from old computer to new computer

Transferring an iTunes library to a new computer

On your old computer

Step 1: Open a new Finder window and go to the Music folder, which should be under yourusername > Music.

Step 2: You should see a folder named iTunes. Make a right click on this folder and copy it.

iTunes Library Music folder

Step 3: In a new Finder window, open your external hard drive or USB stick.

Step 4: Paste the iTunes folder in the external drive or USB stick. Depending on the amount of music you have in your library it could take a while.

Migrating iTunes Library

On your new computer

We’re just going to do the exact opposite of what we just did.

Step 1: Plug your external hard drive or USB stick in the new computer.

Step 2: Double click it to open and see what is inside. If the steps above were completed correctly, you should obviously see your iTunes folder.

Step 3: Launch a new Finder window and find the Music folder of your new computer.

Move from old to new iTunes library

Step 4: From the external drive or USB dongle, drag and drop the iTunes folder inside the Music folder of the new computer. Items will be copying over, which again could take a while depending on the size of your library.

Done! You can now launch iTunes and all your music, including all songs, albums, album arts, as well as playlists should be in there.

Note that if you migrated songs that were purchased via iTunes, you will have to authorize the new computer to play these songs. To do so, go to Store > Authorize This Computer in iTunes and enter your iTunes username and password.

 

For more details, please visit original post :https://www.idownloadblog.com/2015/05/07/how-to-transfer-your-itunes-library-to-a-new-computer/

HP 15 Keyboard Replacement and Full Disassembly Guide , HP PK131EM3A00 HPM14P13US698 PK131EM2A00 SG-81300-XUA SN7145 US keyboard replacement

HP 15 Keyboard Replacement and Full Disassembly Guide

HP PK131EM3A00 HPM14P13US698 PK131EM2A00 SG-81300-XUA SN7145 US keyboard replacement.

 

HP Pavilion 15 Keyboard Replacement

Hello, Tubers – In this video, I disassemble the back cover, take out the inside KEYBOARD and show you how to do it. 🙂 Here you can buy some of the products I use in this video Good Luck