Congratulations. The hardest physical part of your journey is complete. You have successfully navigated hardware selection and software installation, transforming a standard PC into a dormant digital guardian. Right now, your pfSense machine is sitting there, humming quietly, displaying a text-based console on its screen. It has a powerful brain, but it has no instructions, no connection to the world, and no sense of purpose.
This is the post where we give it that purpose. We are about to take the first, critical steps in software configuration. This is arguably the most important configuration you will do in this entire series. The architectural decisions we make here—how we structure our IP addressing, how we name our devices, how we set up our core services—will ripple through every single project that follows. A logical, well-planned foundation will make deploying future services a breeze. A hasty, poorly-considered setup will lead to a cascade of confusing problems down the line.
We will proceed with methodical precision. First, we will work within the text-based console to tell pfSense which physical network port is for the outside world (WAN) and which is for our trusted internal network (LAN). Then, we will access the powerful web-based Graphical User Interface (GUI) for the first time, the command center from which we will manage our entire network. We will walk through the initial setup wizard and, finally, we will configure the two most important internal services for a manageable sovereign cloud: DHCP and DNS.
Take a deep breath. By the end of this guide, your new router will be online, securely passing traffic, and intelligently managing your network. Your digital fortress will be operational.

The First Boot – Console Configuration
After you rebooted from the successful installation, your pfSense machine booted into its operating system for the first time. The text menu you see on the screen is your first point of interaction. Our primary goal here is simple but absolutely critical: we need to assign the correct physical network ports on your computer to the logical roles of WAN and LAN.
- WAN (Wide Area Network): This is the interface that will connect to your modem and face the public internet.
- LAN (Local Area Network): This is the interface that will connect to your switch and face your internal, trusted network.

Step 1: Identifying Your Network Interfaces
Before you can assign them, you need to know what your interfaces are called. On the console screen, you will see a list of available network ports, identified by names like em0, em1, igb0, etc. These names correspond to the physical Ethernet ports on your machine (both on the motherboard and on the Intel NIC you installed).
The Challenge: How do you know which name (em0 or em1) corresponds to which physical port?
The Unplug/Plug Trick (The Easiest Way):
- Look at the main console menu. You will see the current interface status, and both will likely show a “link down” status because nothing is plugged in.
- Take a standard Ethernet cable and plug one end into your network switch.
- Plug the other end into one of the ports on your pfSense machine.
- Watch the console screen. After a few seconds, you will see a message indicating that one of the interfaces now has “link up.” The name of that interface is the physical port you just plugged the cable into.
- Make a physical note of this. A small piece of masking tape on the port labeled “em0” or “LAN” can save you a world of confusion later. Unplug the cable.
- Repeat the process for the other port to confirm its identity (e.g.,
em1).
Step 2: Assigning WAN and LAN Interfaces
Now that you know which port is which, let’s assign them.
- On the console menu, type
1and press Enter to select the “Assign Interfaces” option. - VLANs: The first question will be about VLANs. We are not using them right now. Type
nand press Enter. - Enter the WAN interface name: The script will now ask you to identify your WAN port. This is the port that will connect to your modem. Type the name of the interface you identified for this role (e.g.,
em1) and press Enter. - Enter the LAN interface name: Next, it will ask for your LAN port. Type the name of the interface you identified for your internal network (e.g.,
em0) and press Enter. - Optional Interfaces: It will ask if you want to configure any optional interfaces. We don’t have any others, so just press Enter to continue.
- Confirmation: The script will show you a summary of your assignments (e.g., WAN -> em1, LAN -> em0). If it is correct, type
yand press Enter.

pfSense will now reconfigure its networking based on your instructions. After a moment, the main console menu will reappear, but this time it will show your WAN and LAN interfaces correctly assigned, and it will list the default IP address for your LAN interface.

Step 3: A Critical Architectural Decision – The LAN IP Address
By default, pfSense assigns the IP address 192.168.1.1 to its LAN interface. For 90% of users, this is fine. However, there is one very important reason why you might need to change this right now, from the console, before we go any further.
- The Problem of Double NAT: Your new pfSense box will be getting its internet connection from your existing ISP modem/router. Most ISP routers also use the
192.168.1.xnetwork range for their own LAN. If both your ISP router’s LAN and your pfSense router’s LAN are using the same IP range, it creates an IP address conflict and routing confusion known as Double NAT. This can cause bizarre connectivity problems. - The Solution: We need to ensure your new pfSense LAN is on a different subnet from your ISP router’s LAN. The easiest way to do this is to change the pfSense LAN IP.
How to Change the LAN IP from the Console:
- On the console menu, type
2and press Enter to “Set interface(s) IP address.” - It will ask which interface you want to configure. Type
2for LAN. - Enter the new LAN IPv4 address: Choose a different private IP range. A good, memorable choice is
10.0.0.1. Type this in and press Enter. - Enter the new LAN IPv4 subnet bit count: This determines the size of your network. For most home networks,
24(which gives you 254 usable IPs) is the correct choice. Type24and press Enter. - Upstream gateway: It will ask for an upstream gateway. Since this is our LAN, there is none. Just press Enter.
- IPv6: It will ask about IPv6. We are not configuring that now. Press Enter.
- DHCP Server: It will ask if you want to enable the DHCP server on LAN. Type
yand press Enter. - Start of DHCP Range: Enter the starting IP address for devices on your network. A good choice is
10.0.0.100. - End of DHCP Range: Enter the ending IP address. A good choice is
10.0.0.200. This gives you 101 available addresses for dynamic clients, leaving plenty of room for static assignments. - Revert to HTTP: It will ask if you want to revert the web GUI protocol to HTTP. Type
y. This can make the first connection easier.
After you confirm, pfSense will reconfigure the LAN interface. The console will now show that your LAN IP address is 10.0.0.x. You are now ready to move to the web interface.

The Command Center – First-Time Web GUI Access
The console is for fundamental setup, but the web-based GUI is where the real power of pfSense is unleashed.
Step 1: Physical Connections
- WAN Port: Connect an Ethernet cable from a LAN port on your ISP’s modem/router to the WAN port on your pfSense machine.
- LAN Port: Connect an Ethernet cable from the LAN port on your pfSense machine to your network switch.
- Your Computer: Connect your desktop or laptop computer to the same network switch.
Step 2: Accessing the GUI
- Open a web browser on your computer.
- In the address bar, type the LAN IP address of your pfSense router. If you didn’t change it, this is
http://192.168.1.1. If you changed it as recommended, this ishttp://10.0.0.x. - You may see a browser warning about the site’s security certificate. This is normal. Click “Advanced” and “Proceed” or “Accept the Risk and Continue.”
- You will be greeted by the pfSense login screen.
- Enter the default credentials:
- Username:
admin - Password:
pfsense
- Username:
- Click Login.

You are now inside the pfSense web GUI for the first time. The first thing you will see is the initial setup wizard.
Step 3: The Setup Wizard
This wizard will walk you through the essential settings needed to get your router online and secure.
- Screen 1: Welcome: Click Next.
- Screen 2: Support: This is information about Netgate’s commercial support. Click Next.
- Screen 3: General Information (Crucial!)
- Hostname: Give your router a name.
pfsenseis fine. - Domain: This is a very important setting for a manageable network. Use a domain that is not used on the public internet to avoid conflicts. The
.internalor.landomains are common, but the officially recommended best practice is to use.arpa. A great choice ishome.arpa. We will use this throughout the series. - Primary/Secondary DNS Servers: These are the DNS servers your router itself will use to look up domains on the internet. You can leave the ISP’s DNS for now, or you can enter privacy-respecting public DNS servers like Quad9 (
9.9.9.9) and Cloudflare (1.1.1.1). - Click Next.
- Hostname: Give your router a name.
- Screen 4: Time Server Configuration
- The default settings are usually fine. Ensure your Timezone is set correctly. Click Next.
- Screen 5: Configure WAN Interface
- Selected Type: For most cable or fiber connections, the default DHCP is correct. This tells pfSense to ask your ISP’s modem for its public IP address. (If you have a DSL connection that requires a username/password, you would select PPPoE here).
- Scroll to the bottom. There are two checkboxes you should uncheck:
Block RFC1918 Private Networks: Uncheck this. Leaving it checked can cause problems in our specific setup where the WAN is connected to another private router.Block bogon networks: Uncheck this for now as well.
- Click Next.
- Screen 6: Configure LAN Interface
- This screen will reflect the LAN IP and subnet mask you already configured. Double-check that it is correct (e.g.,
10.0.0.1/24). Do not change anything here. Click Next.
- This screen will reflect the LAN IP and subnet mask you already configured. Double-check that it is correct (e.g.,
- Screen 7: Set Admin Web GUI Password
- This is a critical security step. Enter a new, strong, unique password for the
adminuser. Confirm it. Click Next.
- This is a critical security step. Enter a new, strong, unique password for the
- Screen 8: Reload Configuration
- Click Reload. pfSense will apply all of your settings. This will take about 30-60 seconds.
- Screen 9: Wizard Complete!
- Congratulations! Click Finish. You will be taken to the main pfSense dashboard.

You now have a fully functional, secure router passing traffic from the internet to your local network.
Architecting for the Future – DHCP and DNS
Your router is working, but our work is not done. We now need to configure the internal DHCP and DNS services. Getting this right is the secret to a scalable, user-friendly, and manageable sovereign cloud.
The Goal: Memorable Names, Not Numbers
Right now, to access your pfSense router, you have to type 10.0.0.1. When we build our server, it might get the IP 10.0.0.50. When we set up our smart home controller, it might be 10.0.0.51. Remembering these numbers is a pain.
Our goal is to be able to access our services by memorable names, just like on the real internet. We want to type pfsense.home.arpa to get to our router, server.home.arpa to get to our server, and so on. To do this, we need to make our DHCP Server and our DNS Server work together seamlessly.
Step 1: Static DHCP Mappings
A static DHCP mapping, or DHCP reservation, tells your router: “Whenever this specific device connects, always give it this exact same IP address.” This is essential for servers and network infrastructure.
- Navigate to Services > DHCP Server.
- Make sure you are on the LAN tab.
- Scroll down to the DHCP Static Mappings for this Interface section.
- Click the Add button.
- You will need to know the MAC Address of the device you want to map. The MAC address is a unique hardware identifier for a network card. You can usually find it on a sticker on the device or in its network settings.
- Let’s create a mapping for the server we will build later.
- MAC Address: Enter the MAC address of your future server’s network card.
- IP Address: Assign it a static IP address that is outside the dynamic range we set earlier. A good, clean choice would be
10.0.0.50. - Hostname: This is the key! Enter the name you want to use for this device:
server. - Description: Add a note, e.g., “Main Ubuntu Server.”
- Click Save. Then click Apply Changes.

Now, whenever that server connects to the network, it will always be given the IP address 10.0.0.50.
Step 2: Configuring the DNS Resolver
The DNS Resolver is the service that translates domain names into IP addresses for your local network. We need to tell it to pay attention to the hostnames we are setting in our DHCP server.
- Navigate to Services > DNS Resolver.
- Under General Settings, scroll down to the bottom and find the DHCP Registration section.
- Check the box for
Register DHCP static mappings in the DNS Resolver. - (Optional but recommended) Check the box for
Register DHCP leases in the DNS Resolver. This will also register temporary devices. - Click Save. Then click Apply Changes.

Step 3: Switching to the ISC DHCP Server (Expert Tip)
This final step is a pro-tip based on the FUTO guide’s recommendation. While the default Kea DHCP server in modern pfSense works, the older ISC DHCP server has historically offered more robust and reliable integration with the DNS Resolver. For maximum stability, making this change is a worthwhile investment.
- Navigate to Services > DHCP Server.
- In the upper right corner of the page, you will see a dropdown menu for DHCP Server. It will be set to
Kea DHCP. - Change this to
ISC DHCP. - A warning will appear. Click OK.
- The page will reload. All your settings (range, static mappings) should still be there.
- Click Save at the bottom of the page.

You have now created a powerful, symbiotic relationship between your DHCP and DNS services. When you create a static mapping with a hostname, the DNS resolver automatically learns about it. Now, any device on your network can find server.home.arpa, and the DNS resolver will correctly tell them it’s at 10.0.0.50. This is the foundation of a professional, easily manageable network.
What’s Next?
Your digital fortress is fully operational. You have a powerful, secure gatekeeper that is intelligently managing your network traffic and providing a scalable foundation for all our future services. You have taken a massive leap forward in your journey to a self-managed life.
In our next post, “Accessing Your Kingdom from Anywhere: A Complete OpenVPN Guide,” we will tackle one of the most exciting and empowering steps yet. We will configure a secure, encrypted tunnel into our home network, allowing us to safely access all of our self-hosted services from anywhere in the world, as if we were sitting right at home.








