Summary
In this chapter, you learned how to configure the firewall so that it is able to work with DHCP-enabled ISPs and how to serve IP addresses to clients on local networks or relay DHCP for an internal server. You also learned how to set the firewall as a DNS proxy and ensure internal hosts resolve domain names efficiently and securely. You are now able to set up High Availability clusters in both Active/Passive and Active/Active modes and understand the differences and implications of both modes and know how to manage and maintain certificates. In a multi-tenant or segregated environment, you can leverage virtual systems to create multiple instances on a single hardware.
In the next chapter, we’ll take a closer look at the various methods to identify users and how group mapping can help build policies that enforce Role-Based Access Control (RBAC).
If you’re preparing for the PCNSE, remember how to manage certificates and how and why to create a TLS profile...