Nokia Network Security Solutions Handbook (Google eBook)

Front Cover
Syngress, Dec 3, 2002 - Computers - 560 pages
1 Review
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system.

Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).

The only book dedicated to coverage of the latest Nokia hardware and software offerings, from the SOHO appliances to the enterprise-class IP700 series, with an emphasis on administering and securing these systems.
Long-term market potential. The operating system referenced will be Nokia IPSO 3.4.1, which has an interface that has been specifically tailored to make upgrading to newer versions of IPSO simple and intuitive. In addition, the underlying interface is UNIX based, which has been a constant for over 30 years.
Up-to-the-Minute Web-based Support. Once they have absorbed the content of the book, readers can receive up-to-the minute links, white papers, and analysis for one year at solutions@syngress.com.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Overview of the Nokia Security Platform
2
Overview of the Nokia
21
Initial Configuration
43
Introducing the Voyager Web Interface
62
Configuring the System for Security
84
Understanding Configuration Options
96
Basic System Administration
107
Configuring the Check Point Firewall
151
System Monitoring
199
Advanced System Administration
241
Advanced Routing Configuration
285
High Availability
311
Appendix A UNIX Basics
345
Appendix B Additional Packages
371
Index
391
Copyright

Common terms and phrases

Bibliographic information