Nokia Network Security Solutions Handbook (Google eBook)

Front Cover
Syngress, Dec 3, 2002 - Computers - 560 pages
1 Review
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system.

Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).

The only book dedicated to coverage of the latest Nokia hardware and software offerings, from the SOHO appliances to the enterprise-class IP700 series, with an emphasis on administering and securing these systems.
Long-term market potential. The operating system referenced will be Nokia IPSO 3.4.1, which has an interface that has been specifically tailored to make upgrading to newer versions of IPSO simple and intuitive. In addition, the underlying interface is UNIX based, which has been a constant for over 30 years.
Up-to-the-Minute Web-based Support. Once they have absorbed the content of the book, readers can receive up-to-the minute links, white papers, and analysis for one year at solutions@syngress.com.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Overview of the Nokia Security Platform
2
Overview of the Nokia
21
Initial Configuration
43
Introducing the Voyager Web Interface
62
Configuring the System for Security
84
Understanding Configuration Options
96
Basic System Administration
107
Configuring the Check Point Firewall
151
System Monitoring
199
Advanced System Administration
241
Advanced Routing Configuration
285
High Availability
311
Appendix A UNIX Basics
345
Appendix B Additional Packages
371
Index
391
Copyright

Common terms and phrases

Popular passages

Page iv - Miller, Jane Mackay, and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser, Connie McMenemy, Shannon Russell, and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books in Canada. David Scott...
Page iv - Callisma for their invaluable insight into the challenges of designing, deploying, and supporting world-class enterprise networks. Karen Cross, Lance Tilford, Meaghan Cunningham, Kim Wylie, Harry Kirchner, Kevin Votel, Kent Anderson, and FridaYara of Publishers Group West for sharing their incredible marketing experience and expertise.
Page iv - Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program.
Page xxvi - Architecture 0 Summary 0 Solutions Fast Track 0 Frequently Asked Questions Introduction In...
Page vi - He is a co-author of the highly acclaimed Nokia Network Security Solutions Handbook (Syngress Publishing, ISBN: 1-931836-70-1), and he is also a co-author ofFreesoft.org (www.freesoft.org), a comprehensive source of Internet engineering information. Kyle resides in Palo Alto, CA.
Page ix - Administration and Check Point NG to clients. He is also the Lead Engineer for the Integralis-US S3 team, which provides network security auditing, penetration testing, and computer forensic services. His specialties include UNIX network security and firewall/IDS network integration. Doug holds a bachelor's of Science degree in Computer Science from the University of Massachusetts at Amherst, and is a member of the Association for Computing Machinery (ACM), USENIX, and the System Administrator's...

Bibliographic information