• Home
  • Nokia Firewall VPN and IPSO Configuration Guide

Nokia Firewall VPN and IPSO Configuration Guide

Nokia Firewall  VPN  and IPSO Configuration Guide
  • Author : Andrew Hay
  • Publsiher : Syngress
  • Release : 07 February 2009
  • ISBN : 9780080949161
  • Pages : 488 pages
  • Rating : 4/5 from 21 ratings
GET THIS BOOKNokia Firewall VPN and IPSO Configuration Guide

Summary:
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements." --Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC. Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter. According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line. The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors. * Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market * Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors * Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface


Nokia Firewall, VPN, and IPSO Configuration Guide

Nokia Firewall, VPN, and IPSO Configuration Guide
  • Author : Andrew Hay,Keli Hay,Peter Giannoulis
  • Publisher : Syngress
  • Release : 07 February 2009
GET THIS BOOKNokia Firewall, VPN, and IPSO Configuration Guide

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements." --Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC. Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales




Building DMZs For Enterprise Networks

Building DMZs For Enterprise Networks
  • Author : Syngress
  • Publisher : Elsevier
  • Release : 04 August 2003
GET THIS BOOKBuilding DMZs For Enterprise Networks

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario


The Best Damn Firewall Book Period

The Best Damn Firewall Book Period
  • Author : Thomas W Shinder
  • Publisher : Elsevier
  • Release : 18 April 2011
GET THIS BOOKThe Best Damn Firewall Book Period

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise,


Firewall Policies and VPN Configurations

Firewall Policies and VPN Configurations
  • Author : Syngress,Dale Liu,Stephanie Miller,Mark Lucas,Abhishek Singh,Jennifer Davis
  • Publisher : Elsevier
  • Release : 28 September 2006
GET THIS BOOKFirewall Policies and VPN Configurations

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy,



Network Security Assessment

Network Security Assessment
  • Author : Chris McNab
  • Publisher : "O'Reilly Media, Inc."
  • Release : 19 March 2004
GET THIS BOOKNetwork Security Assessment

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the


Internet of Things From Hype to Reality

Internet of Things From Hype to Reality
  • Author : Ammar Rayes,Samer Salam
  • Publisher : Springer
  • Release : 22 October 2016
GET THIS BOOKInternet of Things From Hype to Reality

This book comprehensively describes an end-to-end Internet of Things (IoT) architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. It is organized into five main parts, comprising of a total of 11 chapters. Part I presents a generic IoT reference model to establish a common vocabulary for IoT solutions. This includes a detailed description of the Internet protocol layers and the Things (sensors and actuators) as well as the key business drivers to


Nokia Network Security Solutions Handbook

Nokia Network Security Solutions Handbook
  • Author : Syngress
  • Publisher : Elsevier
  • Release : 03 December 2002
GET THIS BOOKNokia Network Security Solutions Handbook

The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as


Managing Cisco Network Security

Managing Cisco Network Security
  • Author : Syngress
  • Publisher : Elsevier
  • Release : 29 May 2002
GET THIS BOOKManaging Cisco Network Security

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy



The Best Damn Firewall Book Period

The Best Damn Firewall Book Period
  • Author : Syngress
  • Publisher : Elsevier
  • Release : 16 October 2003
GET THIS BOOKThe Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth. The book answers questions about firewalls, from How do I make Web/HTTP work through


How to Cheat at Managing Information Security

How to Cheat at Managing Information Security
  • Author : Mark Osborne
  • Publisher : Elsevier
  • Release : 22 August 2006
GET THIS BOOKHow to Cheat at Managing Information Security

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of


Checkpoint Next Generation Security Administration

Checkpoint Next Generation Security Administration
  • Author : Syngress
  • Publisher : Elsevier
  • Release : 11 April 2002
GET THIS BOOKCheckpoint Next Generation Security Administration

Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations. CheckPoint Next Generation