{"id":1076,"date":"2024-08-21T17:20:05","date_gmt":"2024-08-21T15:20:05","guid":{"rendered":"https:\/\/artheodoc.fr\/?page_id=1076"},"modified":"2024-10-11T08:14:57","modified_gmt":"2024-10-11T06:14:57","slug":"le-pare-feu-pfsense","status":"publish","type":"page","link":"https:\/\/artheodoc.fr\/index.php\/le-pare-feu-pfsense\/","title":{"rendered":"Le pare-feu pfSense"},"content":{"rendered":"\n<p><em>Jusqu\u2019\u00e0 pr\u00e9sent, on utilisait le pare-feu IPFire. J\u2019ai d\u00e9cid\u00e9 de tester pfSense.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-large-font-size\">Sources<\/p>\n\n\n\n<p>Pour tester le pare-feu pfSense dans VirtualBox je me suis bas\u00e9 sur ce site&nbsp;:<\/p>\n\n\n\n<p>Comment installer Pfsense dans VirtualBox pour cr\u00e9er un lab virtuel ?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.it-connect.fr\/comment-installer-pfsense-dans-virtualbox-pour-creer-un-lab-virtuel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.it-connect.fr\/comment-installer-pfsense-dans-virtualbox-pour-creer-un-lab-virtuel<\/a><\/p>\n\n\n\n<p class=\"has-pale-ocean-gradient-background has-background\">On peut utiliser une VM cr\u00e9\u00e9e dans \u00ab&nbsp;<a href=\"https:\/\/artheodoc.fr\/index.php\/mes-supports-de-cours\/\" data-type=\"page\" data-id=\"875\" target=\"_blank\" rel=\"noreferrer noopener\">Mes supports de cours<\/a>&nbsp;\u00bb pour la mettre sur le LAN du pare-feu pfSense, il suffit pour cela de configurer sa carte r\u00e9seau dans VirtualBox en \u00ab&nbsp;R\u00e9seau interne&nbsp;\u00bb et de lui donner une IP fixe sur le LAN. Une fois le serveur DHCP configur\u00e9, vous pourrez le tester en installant une nouvelle machine sur le LAN.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><br>Mon installation dans VirtualBox pour des tests<\/h2>\n\n\n\n<div class=\"wp-block-group has-pale-ocean-gradient-background has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"772\" height=\"498\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_VirtualBox_reseau-1.png\" alt=\"\" class=\"wp-image-1122\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_VirtualBox_reseau-1.png 772w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_VirtualBox_reseau-1-300x194.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_VirtualBox_reseau-1-768x495.png 768w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>pfSence<\/strong> &#8211; LAN 192.168.2.253 \/24 (r\u00e9seau interne) &#8211; WAN 192.168.1.253 \/24 (pont sur la carte r\u00e9seau physique active) -passerelle 192.168.1.1 &#8211; DNS 8.8.8.8 &#8211; 8.8.4.4<\/li>\n\n\n\n<li><strong>Client pfSense pour la configuration<\/strong> \u2013 192.168.2.1 \/24 \u2013 Passerelle 192.168.2.253 -DNS 192.168.2.253<\/li>\n\n\n\n<li><strong>Client pfSense DHCP<\/strong> \u2013 DHCP sur le LAN<\/li>\n\n\n\n<li><strong>Serveur WEB<\/strong> \u2013 192.168.2.3 \/24- Passerelle 192.168.2.253<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Mes tutoriels au format PDF<\/strong><\/p>\n\n\n\n<p>Dans un premier temps, on configure notre machine virtuelle dans VirtualBox.<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Configuration_d_une_machine_virtuelle_dans_VirtualBox_pour_pfSense.pdf\" data-type=\"link\" data-id=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Configuration_d_une_machine_virtuelle_dans_VirtualBox_pour_pfSense.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Configuration d\u2019une machine virtuelle dans VirtualBox pour pfSense<\/a><\/p>\n\n\n\n<p>On installe pfSense dans notre machine virtuelle.<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Installation_de_pfSense_2_7_2.pdf\" data-type=\"link\" data-id=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Installation_de_pfSense_2_7_2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Installation de pfSense 2.7.2<\/a><\/p>\n\n\n\n<p>\u00c0 l\u2019aide d\u2019une machine sur le LAN, on finalise l\u2019installation de pfSEnse.<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Finalisation_de_l_installation_de_pfSense_2_7_2.pdf\" data-type=\"link\" data-id=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/Finalisation_de_l_installation_de_pfSense_2_7_2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Finalisation de l\u2019installation de pfSense 2.7.2<\/a><\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Exemples de configurations de pfSense<\/strong><\/h2>\n\n\n\n<p><em>On se connecte \u00e0 l\u2019interface WEB de pfSense en HTTP depuis le LAN avec l\u2019adresse IP du pare-feu.<\/em><\/p>\n\n\n\n<p><em>On utilise le compte admin avec le mot de passe que l\u2019on a d\u00e9fini.<\/em><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Voir l\u2019article&nbsp;:<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/2024\/08\/20\/mettre-la-langue-de-linterface-web-de-pfsense-en-francais\/\" data-type=\"post\" data-id=\"1072\" target=\"_blank\" rel=\"noreferrer noopener\">Mettre la langue de l\u2019interface WEB de pfSense en fran\u00e7ais<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">La box<\/p>\n\n\n\n<p>Pour que votre pare-feu pfSense soit accessible depuis la WAN, vous devez configurer les r\u00e8gles NAT de votre box.<\/p>\n\n\n\n<p>Vous pouvez consulter le tutoriel suivant concernant la configuration d\u2019une Livebox 5 Orange. On utilise les ports 80 HTTP, 443 HTTPS, 22 le port par d\u00e9faut SSH \u2013 Protocole TCP \u2013 \u00c9quipement votre serveur (il doit \u00eatre actif pour appara\u00eetre).<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/06\/2-Configuration_de_la_livebox_5_Orange_regles_NAT.pdf\" data-type=\"attachment\" data-id=\"858\" target=\"_blank\" rel=\"noreferrer noopener\">Configuration de la Livebox 5 Orange r\u00e8gles NAT<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">NAT<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Pour activer la cr\u00e9ation automatique des r\u00e8gles (par d\u00e9faut)<\/h2>\n\n\n\n<p><strong>Parefeu<\/strong> ==&gt; <strong>NAT<\/strong> \u21d2 <strong>Sortant<\/strong><\/p>\n\n\n\n<p>Cochez \u00ab\u00a0Cr\u00e9artion automatique de r\u00e8gle NAT sortantes. (IPsec passthrough inclus)\u00a0\u00bb<\/p>\n\n\n\n<p>Quand on configure le NAT, la r\u00e8gle correspondante est cr\u00e9\u00e9e automatiquement.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Exemple de configuration NAT de pfSense pour le port 80 HTTP<\/strong><\/h2>\n\n\n\n<p><strong>Configurer le transfert de port&nbsp;:<\/strong><\/p>\n\n\n\n<p>Allez dans <strong>Pare-feu<\/strong> ==&gt; <strong>NAT<\/strong> ==&gt; <strong>Transfert de port<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>A<\/strong><strong>jouter<\/strong> pour cr\u00e9er une nouvelle r\u00e8gle de redirection de port.<\/p>\n\n\n\n<p>Interface&nbsp;: S\u00e9lectionnez <strong>WAN<\/strong>.<\/p>\n\n\n\n<p>Protocole&nbsp;: S\u00e9lectionnez <strong>TCP<\/strong>.<\/p>\n\n\n\n<p>Destination&nbsp;: S\u00e9lectionnez <strong>WAN address<\/strong>.<\/p>\n\n\n\n<p>Plage de port de destination&nbsp;: S\u00e9lectionnez du port <strong>HTTP<\/strong> au port <strong>HTTP<\/strong>.<\/p>\n\n\n\n<p>IP de redirection cible- Type&nbsp;: Address or Alias \u2013 Adresse&nbsp;: <em>Entrez l\u2019adresse IP de votre serveur web sur le LAN<\/em>.<\/p>\n\n\n\n<p>Port de redirection cible&nbsp;: <strong>HTTP<\/strong>.<\/p>\n\n\n\n<p>Cliquez sur <strong>[Enregister]<\/strong> et <strong>[Appliquez les modifications]<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Exemple de configuration NAT de pfSense pour le port 443 HTTPS<\/strong><\/h2>\n\n\n\n<p><strong>Configurer le transfert de port&nbsp;:<\/strong><\/p>\n\n\n\n<p>Allez dans <strong>Pare-feu<\/strong> ==&gt; <strong>NAT<\/strong> ==&gt; <strong>Transfert de port<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>A<\/strong><strong>jouter<\/strong> pour cr\u00e9er une nouvelle r\u00e8gle de redirection de port.<\/p>\n\n\n\n<p>Interface&nbsp;: S\u00e9lectionnez <strong>WAN<\/strong>.<\/p>\n\n\n\n<p>Protocole&nbsp;: S\u00e9lectionnez <strong>TCP<\/strong>.<\/p>\n\n\n\n<p>Destination&nbsp;: S\u00e9lectionnez <strong>WAN address<\/strong>.<\/p>\n\n\n\n<p>Plage de port de destination&nbsp;: S\u00e9lectionnez <strong>HTTPS (443)<\/strong>.<\/p>\n\n\n\n<p>IP de redirection cible- Type&nbsp;: Address or Alias \u2013 Adresse&nbsp;: <em>Entrez l\u2019adresse IP de votre serveur web sur le LAN<\/em>.<\/p>\n\n\n\n<p>Port de redirection cible&nbsp;: <strong>HTTPS (<\/strong><strong>443<\/strong><strong>)<\/strong>.<\/p>\n\n\n\n<p>Cliquez sur <strong>[Enregister]<\/strong> et <strong>[A<\/strong><strong>ppliquez les <\/strong><strong>modifications]<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Exemple de configuration <\/strong><strong>NAT <\/strong><strong>de pfSense <\/strong><strong>pour le port <\/strong><strong>22 <\/strong><strong>SSH<\/strong><\/h2>\n\n\n\n<p><strong>Configurer le transfert de port&nbsp;:<\/strong><\/p>\n\n\n\n<p>Allez dans <strong>Pare-feu<\/strong> ==&gt; <strong>NAT<\/strong> ==&gt; <strong>Transfert de port<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>A<\/strong><strong>jouter<\/strong> pour cr\u00e9er une nouvelle r\u00e8gle de redirection de port.<\/p>\n\n\n\n<p>Interface&nbsp;: S\u00e9lectionnez <strong>WAN<\/strong>.<\/p>\n\n\n\n<p>Protocole&nbsp;: S\u00e9lectionnez <strong>TCP<\/strong>.<\/p>\n\n\n\n<p>Destination&nbsp;: S\u00e9lectionnez <strong>WAN address<\/strong>.<\/p>\n\n\n\n<p>Plage de port de destination&nbsp;: S\u00e9lectionnez <strong>SSH<\/strong><strong> (<\/strong><strong>22<\/strong><strong>)<\/strong>.<\/p>\n\n\n\n<p>IP de redirection cible- Type&nbsp;: Address or Alias \u2013 Adresse&nbsp;: <em>Entrez l\u2019adresse IP de votre serveur web sur le LAN<\/em>.<\/p>\n\n\n\n<p>Port de redirection cible&nbsp;: <strong>SSH<\/strong><strong> (<\/strong><strong>22<\/strong><strong>)<\/strong>.<\/p>\n\n\n\n<p>Cliquez sur <strong>[Enregister]<\/strong> et <strong>[Appliquez les modifications].<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-large-font-size\">R\u00e8gles<\/p>\n\n\n\n<p><em>Pour le ping on utilse le protocole ICMP.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Exemple de configuration du ping du pare-feu pfSense depuis le WAN<\/strong><\/h2>\n\n\n\n<p>Allez dans <strong>Pare-feu<\/strong> ==&gt; <strong>R\u00e8gles<\/strong> ==&gt; <strong>WAN<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>A<\/strong><strong>jouter<\/strong> pour cr\u00e9er une nouvelle r\u00e8gle.<\/p>\n\n\n\n<p>Action&nbsp;: <strong>Autoriser<\/strong><\/p>\n\n\n\n<p>Interface&nbsp;: S\u00e9lectionnez <strong>WAN<\/strong>.<\/p>\n\n\n\n<p>Protocole&nbsp;: S\u00e9lectionnez <strong>ICMP<\/strong>.<\/p>\n\n\n\n<p>Sous-types ICMP&nbsp;: <strong>Echo request<\/strong><\/p>\n\n\n\n<p>Source&nbsp;: <strong>Tous<\/strong><\/p>\n\n\n\n<p>Destination&nbsp;: <strong>Tous<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>[Enregister]<\/strong> et <strong>[Appliquez les modifications].<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Exemple de configuration du ping du pare-feu pfSense depuis le LAN<\/strong><\/h2>\n\n\n\n<p>Allez dans <strong>Pare-feu<\/strong> ==&gt; <strong>R\u00e8gles<\/strong> ==&gt; <strong>LAN<\/strong><\/p>\n\n\n\n<p>Cliquez sur <strong>A<\/strong><strong>jouter<\/strong> pour cr\u00e9er une nouvelle r\u00e8gle.<\/p>\n\n\n\n<p>Action&nbsp;: <strong>Autoriser<\/strong><\/p>\n\n\n\n<p>Interface&nbsp;: S\u00e9lectionnez <strong>L<\/strong><strong>AN<\/strong>.<\/p>\n\n\n\n<p>Protocole&nbsp;: S\u00e9lectionnez <strong>ICMP<\/strong>.<\/p>\n\n\n\n<p>Sous-types ICMP&nbsp;: <strong>Echo request<\/strong><\/p>\n\n\n\n<p>Source&nbsp;: <strong>LAN subnet<\/strong><\/p>\n\n\n\n<p>Destination&nbsp;: <strong>LAN address<\/strong><\/p>\n\n\n\n<p>Cliquez sur [<strong>Enregister]<\/strong> et <strong>[Appliquez les modifications].<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><br><strong>Configuration par d\u00e9faut de pfSense<\/strong><\/h2>\n\n\n\n<p><br>Pare-feu ==&gt; NAT ==&gt; Sortant<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"123\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Automatic_Rules_initiales-1024x123.png\" alt=\"\" class=\"wp-image-1082\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Automatic_Rules_initiales-1024x123.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Automatic_Rules_initiales-300x36.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Automatic_Rules_initiales-768x92.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Automatic_Rules_initiales.png 1146w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><br>Cliquez sur l&rsquo;onglet \u00ab\u00a0<strong>Sortant<\/strong>\u00a0\u00bb pour visualiser l&rsquo;\u00e9tat du NAT sur les flux sortants. Ici, on voit que le mode actif est \u00ab\u00a0<strong>Cr\u00e9artion automatique de r\u00e8gle NAT sortantes. (IPsec passthrough inclus)<\/strong>\u00a0\u00bb donc il y a une r\u00e8gle de NAT cr\u00e9\u00e9e automatiquement et qui permet d&rsquo;acc\u00e9der \u00e0 Internet. Au sein de cette r\u00e8gle, nous pouvons voir que<strong>le r\u00e9seau \u00ab\u00a0192.168.2.0\/24\u00a0\u00bb (Mon LAN) est bien d\u00e9clar\u00e9<\/strong>. <em>Afin de r\u00e9cup\u00e9rer la main sur la gestion du NAT et des r\u00e8gles, il fautdrait passer en mode \u00ab\u00a0<\/em><strong><em>Cr\u00e9ation manuelle de r\u00e8gles NAT sortantes.(NSA &#8211; NAT sortant avanc\u00e9e)<\/em><\/strong><em>\u00ab\u00a0<\/em><em>.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"227\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Regles_initiales-1024x227.png\" alt=\"\" class=\"wp-image-1081\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Regles_initiales-1024x227.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Regles_initiales-300x67.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Regles_initiales-768x170.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Regles_initiales.png 1145w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>La premi\u00e8re r\u00e8gle nomm\u00e9e \u00ab\u00a0R\u00e8gle antiblocage\u00a0\u00bb sert \u00e0 autoriser explicitement l&rsquo;acc\u00e8s \u00e0 l&rsquo;interface de gestion du Pfsense, afin d&rsquo;\u00e9viter de perdre la main si une r\u00e8gle trop restrictive est cr\u00e9\u00e9e.<\/li>\n\n\n\n<li>La deuxi\u00e8me r\u00e8gle sert \u00e0 autoriser tous les flux du LAN vers le WAN, en IPv4<\/li>\n\n\n\n<li>La troisi\u00e8me r\u00e8gle sert \u00e0 autoriser tous les flux du LAN vers le WAN, en IPv6<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><br><strong>Configuration du serveur DHCP dans pfSense<\/strong><\/h2>\n\n\n\n<p><br><strong>Services<\/strong> ==&gt; <strong>Serveur DHCP<\/strong><\/p>\n\n\n\n<p>Cochez \u00ab\u00a0<strong>Activer le serveur DHCP sur l&rsquo;interface LAN<\/strong>\u00ab\u00a0.<\/p>\n\n\n\n<p>Mon r\u00e9seau LAN est le 192.168.2.0\/24<\/p>\n\n\n\n<p>Ma plage DHCP <strong>192.168.2.10<\/strong>&#8211;<strong>192.168.2.30<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"644\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS1-1024x644.png\" alt=\"\" class=\"wp-image-1085\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS1-1024x644.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS1-300x189.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS1-768x483.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS1.png 1147w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"295\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS2-1024x295.png\" alt=\"\" class=\"wp-image-1086\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS2-1024x295.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS2-300x87.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS2-768x222.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS2.png 1144w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Mes serveurs DNS : <strong>8.8.8.8<\/strong> et <strong>8.8.4.4<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS3-1024x358.png\" alt=\"\" class=\"wp-image-1087\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS3-1024x358.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS3-300x105.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS3-768x268.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_DNS3.png 1145w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>La passerelle, l&rsquo;interface r\u00e9seau du pare-feu sur le LAN, dans mon cas 192.168.2.253.<\/p>\n\n\n\n<p>Le nom de domaine que j&rsquo;avais configur\u00e9 home.artheodoc.<\/p>\n\n\n\n<p>Cliquez sur le bouton ensuite sur <strong>[<\/strong><strong>Enregistrer<\/strong><strong>]<\/strong> pour d\u00e9marrer le service DHCP.<\/p>\n\n\n\n<p>Puis <strong>[Appliquez les modifications]<\/strong>.<\/p>\n\n\n\n<p>Pour v\u00e9rifier l\u2019\u00e9tat du service&nbsp;: <strong>\u00c9tat <\/strong>==&gt; <strong>Services<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"216\" src=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Etat_Service-1024x216.png\" alt=\"\" class=\"wp-image-1089\" srcset=\"https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Etat_Service-1024x216.png 1024w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Etat_Service-300x63.png 300w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Etat_Service-768x162.png 768w, https:\/\/artheodoc.fr\/wp-content\/uploads\/2024\/08\/pfSense_Etat_Service.png 1144w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Voir les articles :<\/p>\n\n\n\n<p><br>Configurer l\u2019acc\u00e8s depuis le WAN \u00e0 l\u2019interface WEB de pfSense et changer le port.<\/p>\n\n\n\n<p><a href=\"https:\/\/artheodoc.fr\/index.php\/2024\/08\/25\/configurer-lacces-depuis-le-wan-a-linterface-web-de-pfsense\/\" data-type=\"post\" data-id=\"1135\" target=\"_blank\" rel=\"noreferrer noopener\">Configurer l\u2019acc\u00e8s depuis le WAN \u00e0 l\u2019interface WEB de pfSense<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jusqu\u2019\u00e0 pr\u00e9sent, on utilisait le pare-feu IPFire. J\u2019ai d\u00e9cid\u00e9 de tester pfSense. Sources Pour tester le pare-feu pfSense dans VirtualBox je me suis bas\u00e9 sur ce site&nbsp;: Comment installer Pfsense dans VirtualBox pour cr\u00e9er un lab virtuel ? https:\/\/www.it-connect.fr\/comment-installer-pfsense-dans-virtualbox-pour-creer-un-lab-virtuel On peut utiliser une VM cr\u00e9\u00e9e dans \u00ab&nbsp;Mes supports de cours&nbsp;\u00bb pour la mettre sur le [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1076","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/comments?post=1076"}],"version-history":[{"count":27,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1076\/revisions"}],"predecessor-version":[{"id":1306,"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/pages\/1076\/revisions\/1306"}],"wp:attachment":[{"href":"https:\/\/artheodoc.fr\/index.php\/wp-json\/wp\/v2\/media?parent=1076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}