You are previewing Nokia Firewall, VPN, and IPSO Configuration Guide.
O'Reilly logo
Nokia Firewall, VPN, and IPSO Configuration Guide

Book Description

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."
--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.

Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.

According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.

The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.


* Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market
* Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors
* Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface

Table of Contents

  1. Brief Table of Contents
  2. Table of Contents
  3. Copyright
  4. Authors
  5. Technical Editor
  6. Foreword Contributor
  7. Foreword
  8. Chapter 1. Nokia Security Solutions OverviewSolutions in this chapter:
    1. Introduction
    2. Introducing Nokia IPSO
    3. Introducing Nokia Firewall/VPN and UTM Appliances
    4. Introducing Additional Nokia Security Solutions
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  9. Chapter 2. Nokia IPSO Overview
    1. Introduction
    2. Exploring the History of IPSO
    3. Introducing Access and Security Features
    4. Understanding Users and Groups
    5. Learning the Directory Structure
    6. Configuring IPSO
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  10. Chapter 3. Initial IPSO Configuration
    1. Introduction
    2. Preparing to Boot for the First Time
    3. Installing IPSO
    4. Performing the First-Time Boot Configuration
    5. Continuing the Configuration
    6. Upgrading to IPSO 4.2
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  11. Chapter 4. Nokia Network VoyagerSolutions in this chapter:
    1. Introduction
    2. Introducing Nokia Network Voyager
    3. Configuring Nokia Network Voyager Access
    4. Configuring a Basic System
    5. Applying Security Tuning
    6. Configuring System Options
    7. Managing Packages
    8. Configuring Static Routes
    9. Configuring System Backup and Restore
    10. Configuring System Logging
    11. Scheduling cron Jobs
    12. Summary
    13. Solutions Fast Track
    14. Frequently Asked Questions
  12. Chapter 5. Security and Access Configuration
    1. Introduction
    2. Managing Accounts and Passwords
    3. Managing Groups and Access
    4. Configuring Authentication, Authorization, and Accounting (AAA)
    5. Configuring IPSO VPN
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  13. Chapter 6. Advanced System Administration and Troubleshooting
    1. Introduction
    2. Understanding the Boot Manager
    3. Introducing CLISH
    4. Troubleshooting
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  14. Chapter 7. Advanced Routing Configuration
    1. Introduction
    2. Introducing Dynamic Routing
    3. Configuring RIP
    4. Configuring OSPF
    5. Configuring BGP
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  15. Chapter 8. Configuring the Check Point NGX Firewall
    1. Introduction
    2. Preparing for the Firewall Implementation
    3. Configuring the Check Point NGX Firewall
    4. Testing the Firewall Configuration
    5. Upgrading the Firewall
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  16. Chapter 9. System Monitoring
    1. Introduction
    2. Monitoring System Utilization
    3. Monitoring Protocols
    4. Monitoring System Health
    5. Using the iclid Tool
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  17. Chapter 10. High Availability
    1. Introduction
    2. Understanding Check Point High Availability
    3. Configuring the Nokia VRRP Implementation
    4. Configuring the Nokia VRRP Monitored Circuit
    5. Configuring Check Point Gateway Clusters to Use the Nokia VRRP
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  18. Chapter 11. IPSO Command Interface Line Shell (CLISH)
    1. Introduction
    2. Configuring Interfaces
    3. Applying Security Tuning
    4. Configuring System Options
    5. Configuring Network Security and Access
    6. Configuring Routing
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  19. Appendix A. UNIX Basics
    1. Introduction
    2. Understanding Files and Directories
    3. Understanding Users and Groups
    4. Using the Shell and Basic Shell Utilities
    5. Using vi
  20. Appendix B. Accessing Lab Videos
    1. Introduction and System Requirements
    2. Video Lab Instruction
  21. Index
    1. SYMBOL
    2. A
    3. B
    4. C
    5. D
    6. E
    7. F
    8. G
    9. H
    10. I
    11. J
    12. K
    13. L
    14. M
    15. N
    16. O
    17. P
    18. R
    19. S
    20. T
    21. U
    22. V
    23. W