Chapter 11. IPSO Command Interface Line Shell (CLISH)

Solutions in this chapter:

  • Configuring Interfaces
  • Applying Security Tuning
  • Configuring System Options
  • Configuring Network Security and Access
  • Configuring Routing
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

Marty walked over with a huge printout of a network diagram that detailed the current site architecture and the remote site locations.

“One problem we'll have,” explained Marty, “is that we'll need to deploy some of these Nokia firewalls at our remote sites. Our current information security policy doesn't allow us to connect over the public Internet using standard Web protocols for administration of border devices.”

Mark rolled his eyes and Marty caught it out ...

Get Nokia Firewall, VPN, and IPSO Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.