There are no additional technical requirements for this chapter beyond what was required for previous chapters. To implement the examples contained in this chapter, you will need a working pfSense firewall in either a real or virtual environment.





















































There are no additional technical requirements for this chapter beyond what was required for previous chapters. To implement the examples contained in this chapter, you will need a working pfSense firewall in either a real or virtual environment.