Nokia Network Security
Solutions Handbook
Daniel Kligerman, Kyle X. Hourian, Tony Bautts, Robert J. Shimonski, Kevin Greene
Résumé
The Complete Guide to Nokia Firewalls and VPNs
Complete Coverage of Each Nokia Enterprise Security
Platform Member: IP120, IP330, IP400 Series, IP530, IP650,
and IP700
Hundreds of Configuring & Implementing, Designing
& Planning Sidebars, Tips, and Nokia FAQs Step-by-Step
Instructions to Configure and Administer Your Nokia
Appliance
As the number two leader in the firewall/VPN appliances
market, Nokia has received numerous accolades for the
reliability and security of its systems. There are over
50,000 Nokia systems currently installed and, until now, no
book for Nokia administrators existed. The Nokia Network
Security Solutions Handbook will show network professionals
how to configure and administer Nokia's newest, most
popular security hardware and software products.
1. Review the Six Enterprise Models
Understand the advantages and disadvantages of IP120,
IP330, IP400 Series, IP530, IP650, and the IP700 to
determine which one is right for your network
architecture.
2. Configure Your DHCP Server
Learn the steps involved in configuring an Ethernet
interface using lynx.
3. Configure Your System for Security
See how you can configure Secure Shell (SSH) and disable
Telnet, as well as change from clear-text HTTP to
SSL-encrypted Voyager access.
4. Manage Nokia Packages
Learn how to install, enable, disable, and remove Nokia
packages without losing any configuration data.
5. Upgrade the Check Point Firewall
Review the steps to upgrade from 4.1 SP6 to NG FP2 and
from NG FP2 to NG FP3. 6. Use the Iclid Tool
Use Iclid to provide a convenient and fast interface for
retrieving routing information for each specific
protocol.
7. Understand the Boot Manager Functions
Learn how to perform a factory default installation, and
learn to boot from an alternate kernel and/or an alternate
device.
8. Master the Functions of VLAN
See how VLANs can span multiple network devices, add
redundancy to your network, and conserve physical
interfaces on network devices.
9. Configure VRRP Monitored Circuit
Install and use VRRP Monitored Circuit to protect from
firewall and interface failure.
10. Register for Your 1 Year Upgrade
The Solutions upgrade plan protects you from content
obsolescence and provides monthly mailings, whitepapers,
and more
- Chapter 1 Overview of the Nokia Security Platform
- Chapter 2 Overview of the Nokia
- Chapter 3 Initial Configuration
- Chapter 4 Introducing the Voyager Web Interface
- Chapter 5 Basic System Administration
- Chapter 6 Configuring the Check Point Firewall
- Chapter 7 System Monitoring
- Chapter 8 Advanced System Administration
- Chapter 9 Advanced Routing Configuration
- Chapter 10 High Availability
- Appendix A UNIX Basics
- Appendix B Additional Packages
L'auteur - Tony Bautts
Tony Bautts est plus particulièrement spécialisé dans le sans fil et la définition de stratégies de sécurité.
L'auteur - Robert J. Shimonski
Robert J. Shimonski holds several industry certifications, including MCSE, CCNP, CCDP, Novell Master CNE, Nortel NNCSS, Network + , and others. He is a Lead Network and Security Engineer, a specialist in network infrastructure design, and the author of several computer books.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Daniel Kligerman, Kyle X. Hourian, Tony Bautts, Robert J. Shimonski, Kevin Greene |
Parution | 12/03/2003 |
Nb. de pages | 430 |
Format | 19 x 23,5 |
Couverture | Broché |
Poids | 750g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836708 |
ISBN13 | 978-1-931836-70-8 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet