Atjaunināt sīkdatņu piekrišanu

E-grāmata: Nokia Firewall, VPN, and IPSO Configuration Guide

(Information Security Consultant, Toronto, Ontario, Canada), (Instructional Designer, primarily for a large, global IT client, and is based in Fredericton, New Brunswick, Canada), (Q1 Labs Inc., USA)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 07-Feb-2009
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780080949161
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 46,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 07-Feb-2009
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780080949161
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements." --Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.

Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.

According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.

The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

Papildus informācija

The only book and companion website covering Nokia's Firewall/VPN appliances, which is the #3 security appliance worldwide.
Foreword xix
Nokia Security Solutions Overview
1(36)
Introduction
2(1)
Introducing Nokia IPSO
3(1)
Introducing Nokia Firewall/VPN and UTM Appliances
4(19)
IP40 and IP45
4(3)
IP60
7(3)
IP130
10(1)
IP260 and IP265
11(2)
IP290
13(1)
The IP290 Security Platform
13(1)
IP290 IPS
14(1)
IP390
14(1)
IP390 Security Platform
14(2)
IP390 IPS
16(1)
IP560
17(1)
IP690
18(1)
The IP690 Security Platform
18(1)
IP690 IPS
19(1)
IP1220 and IP1260
19(1)
IP2255
20(1)
IP2450
21(2)
Introducing Additional Nokia Security Solutions
23(9)
Nokia Integrated Firewall
23(1)
Nokia IP VPN
24(4)
Nokia Intrusion Prevention with Sourcefire
28(1)
Nokia Horizon Manager
29(3)
Summary
32(1)
Solutions Fast Track
32(2)
Frequently Asked Questions
34(3)
Nokia IPSO Overview
37(28)
Introduction
38(1)
Exploring the History of IPSO
39(2)
Understanding Specialized IPSO Releases
40(1)
Introducing Access and Security Features
41(10)
Using Remote Access
43(1)
Understanding the Client/Server Model and Listening Sockets
43(3)
Using Telnet
46(1)
Using File Transfer Protocol (FTP)
46(2)
Using Secure Shell (SSH)
48(1)
Using HTTP/HTTPS
49(1)
Gaining Console Access
49(1)
Using Other Security Features
50(1)
Understanding Users and Groups
51(1)
Learning the Directory Structure
52(5)
Understanding Special Directories and Disk Space
55(1)
Dealing with Floppy and CD-ROM Drives
56(1)
Configuring IPSO
57(2)
Summary
59(1)
Solutions Fast Track
59(2)
Frequently Asked Questions
61(4)
Initial IPSO Configuration
65(28)
Introduction
66(1)
Preparing to Boot for the First Time
66(2)
Workstation Configuration
67(1)
Physical Connections
67(1)
Installing IPSO
68(5)
Booting into the Boot Manager
68(5)
Performing the First-Time Boot Configuration
73(6)
Using DHCP to Configure the System
73(3)
Configuring Manually with a Console Connection
76(3)
Continuing the Configuration
79(3)
Upgrading to IPSO 4.2
82(4)
Summary
86(1)
Solutions Fast Track
87(2)
Frequently Asked Questions
89(4)
Nokia Network Voyager
93(72)
Introduction
94(1)
Introducing Nokia Network Voyager
94(5)
Navigating the Interface
94(1)
Using Configuration Lock
95(1)
Navigating Nokia Network Voyager
96(2)
Understanding the Interface Buttons
98(1)
Understanding the Web Browser Functions
98(1)
Accessing Help Documentation
99(1)
Understanding Hardware and Software Information
99(1)
Configuring Nokia Network Voyager Access
99(10)
Configuring Basic Nokia Network Voyager Options
99(2)
Generating and Installing SSL/TLS Certificates
101(4)
Using Secure Shell (SSH)
105(1)
Configuring Initial SSH
106(3)
Configuring a Basic System
109(8)
Configuring Network Devices
109(1)
Configuring Ethernet Interfaces
110(4)
Configuring IP Addresses
114(3)
Applying Security Tuning
117(3)
Tuning the TCP/IP Stack
117(1)
Controlling SecureXL
118(1)
Enabling Sequence Validation
119(1)
Setting Delayed Notification and Auto-Expiry
119(1)
Using the Router Alert IP Option
119(1)
Using Optimize for Two-Port IP1260
120(1)
Configuring System Options
120(12)
Configuring Banner and Login Messages
120(1)
Configuring Dynamic Host Configuration Protocol (DHCP)
121(6)
Configuring DNS
127(1)
Configuring Disk Mirroring
127(2)
Configuring System Time
129(1)
Setting System Time
129(1)
Configuring Daylight Savings Time
130(1)
Configuring Host Addresses
130(2)
Changing the Host Name
132(1)
Managing Packages
132(2)
Installing and Enabling Packages
133(1)
Deleting a Package
134(1)
Configuring Static Routes
134(7)
Creating Backup Static Routes
137(1)
Creating Aggregate Routes
137(2)
Defining Route Rank
139(1)
Assigning Ranks
139(2)
Configuring System Backup and Restore
141(12)
Creating Backup Files
141(2)
Transferring Backup Files
143(1)
Restoring Files from Locally Stored Backup Files
144(2)
Configuring System Logging
146(1)
Configuring Logging on Disk-Based Systems
147(1)
Logging to a Remote System
147(1)
Accepting Log Messages
148(1)
Configuring Logging on Flash-Based Systems
149(1)
Configuring Logging to Remote Log Servers
149(1)
Configuring Logging to an Optional Disk
150(1)
Configuring Audit Logs
151(2)
Scheduling cron Jobs
153(2)
Summary
155(2)
Solutions Fast Track
157(3)
Frequently Asked Questions
160(5)
Security and Access Configuration
165(62)
Introduction
166(1)
Managing Accounts and Passwords
166(15)
Password and Account Management
166(1)
Configuring Password Strength
167(2)
Configuring Password History Check
169(1)
Configuring Mandatory Password Change
170(5)
Denying Access to Unused Accounts
175(1)
Changing Passwords
175(1)
Managing User Accounts
176(2)
Adding and Deleting Users
178(1)
Managing S/Key
179(1)
Using S/Key
180(1)
Managing Groups and Access
181(6)
Managing Roles
182(3)
Assigning Roles and Access Mechanisms to Users
185(1)
Creating Cluster Administrator Users
186(1)
Configuring Authentication, Authorization, and Accounting (AAA)
187(13)
Configuring AAA Service Modules
187(6)
Configuring RADIUS
193(2)
Configuring Non-Local RADIUS Users
195(1)
Configuring TACACS+
196(2)
Configuring Non-Local TACACS+ Users
198(2)
Logging in as a Superuser
200(1)
Configuring IPSO VPN
200(21)
Understanding Transport and Tunnel Modes
201(3)
Understanding Protocol Negotiation and Key Management
204(1)
Using PKI
205(1)
Using IPSec
206(1)
Defining Tunnel Requirements
207(2)
Creating an IPSec Policy
209(10)
Using Miscellaneous Security Settings
219(2)
Summary
221(2)
Solutions Fast Track
223(1)
Frequently Asked Questions
224(3)
Advanced System Administration and Troubleshooting
227(22)
Introduction
228(1)
Understanding the Boot Manager
228(6)
Understanding Boot Manager Variables
228(1)
Understanding Boot Manager Commands
229(2)
Performing a Factory-Default Installation
231(1)
Using Single-User Mode
232(1)
Resetting the Admin Password
233(1)
Introducing CLISH
234(2)
Understanding CLISH Basics
234(1)
Using show Command Completions in CLISH
235(1)
Troubleshooting
236(8)
Managing Logs
236(1)
Searching and Displaying Log Files
236(1)
Using tcpdump
237(2)
Troubleshooting Flows
239(2)
Using the Configuration Summary Tool (CST)
241(1)
Understanding Memory and Processes
241(3)
Summary
244(1)
Solutions Fast Track
244(2)
Frequently Asked Questions
246(3)
Advanced Routing Configuration
249(32)
Introduction
250(1)
Introducing Dynamic Routing
250(6)
Understanding RIP
250(1)
Understanding OSPF
251(2)
Understanding BGP
253(1)
Understanding Other Supported Protocols
254(1)
IGRP
254(1)
IGMP
254(1)
PIM
255(1)
DVMRP
255(1)
Understanding Routing Options
255(1)
Configuring RIP
256(3)
Stepping through the Initial RIP Configuration
256(2)
Configuring RIP Timers
258(1)
Configuring Auto-Summarization
259(1)
Configuring OSPF
259(12)
Stepping through the Initial OSPF Configuration
259(3)
Configuring Virtual Links
262(2)
Configuring OSPF Interfaces
264(4)
Configuring Global Settings
268(3)
Configuring BGP
271(7)
Summary
278(1)
Solutions Fast Track
278(2)
Frequently Asked Questions
280(1)
Configuring the Check Point NGX Firewall
281(38)
Introduction
282(1)
Preparing for the Firewall Implementation
282(3)
Obtaining Licenses
284(1)
Configuring Your Hostname
285(1)
Configuring the Check Point NGX Firewall
285(17)
Installing the Package
285(1)
Enabling the Package
286(1)
Understanding Environment and Path
287(1)
Understanding VPN-1 Pro/Express NGX Directory Structure
287(1)
Understanding IP Forwarding as It Pertains to Firewall Policies
288(2)
Running cpconfig
290(2)
Understanding Licenses
292(3)
Management Clients
295(2)
Understanding Certificate Authority Initialization
297(3)
Completing an Installation
300(1)
Getting Back to Configuration
300(2)
Testing the Firewall Configuration
302(10)
Testing SmartDashboard access
302(5)
Pushing and Fetching Policy
307(5)
Upgrading the Firewall
312(3)
Upgrading from NG AI R55 to NGX R62
313(1)
Upgrading from NGX R62 to NGX R65
314(1)
Summary
315(1)
Solutions Fast Track
315(2)
Frequently Asked Questions
317(2)
System Monitoring
319(38)
Introduction
320(1)
Monitoring System Utilization
320(13)
Viewing System Utilization Statistics
320(4)
Understanding IPSO Process Management
324(2)
Generating Monitor Reports
326(3)
Monitoring System Logs
329(2)
Preventing Full Log Buffers and Related Console Messages
331(2)
Monitoring Protocols
333(5)
Viewing Cluster Status and Members
333(2)
Viewing Routing Protocol Information
335(3)
Monitoring System Health
338(6)
Monitoring Hardware
340(4)
Using the iclid Tool
344(8)
Summary
352(1)
Solutions Fast Track
353(1)
Frequently Asked Questions
354(3)
High Availability
357(28)
Introduction
358(1)
Understanding Check Point High Availability
358(4)
Configuring the Nokia VRRP Implementation
362(6)
Understanding the VRRP Configuration
362(1)
Understanding the VRRP Protocol
363(1)
Implementing VRRP for XYZ Inc
364(1)
Understanding VRRP Monitored Circuits
365(2)
Comparing VRRP v2 to Monitored Circuits
367(1)
Configuring the Nokia VRRP Monitored Circuit
368(6)
Configuring All Interfaces
368(1)
Synchronizing the Time
369(1)
Configuring the Host Table
369(1)
Configuring VRRP Settings Using Voyager
369(5)
Configuring Check Point Gateway Clusters to Use the Nokia VRRP
374(6)
Configuring a Gateway Cluster
375(5)
Summary
380(1)
Solutions Fast Track
380(2)
Frequently Asked Questions
382(3)
IPSO Command Interface Line Shell (CLISH)
385(46)
Introduction
386(1)
Configuring Interfaces
386(8)
Configuring Ethernet Interfaces
387(1)
Configuring the Physical Interface
387(2)
Configuring the Logical Interface
389(2)
Showing Interface Configurations
391(2)
Deleting a Logical Interface
393(1)
Applying Security Tuning
394(1)
Controlling Sequence Validation
394(1)
Tuning the TCP/IP Stack
394(1)
Using the Router Alert IP Option
394(1)
Optimizing IP1260 Ports
395(1)
Configuring System Options
395(13)
Configuring the DHCP Server
396(3)
Configuring DNS
399(1)
Configuring Date and Time
400(2)
Backing Up and Restoring Files
402(1)
Manually Backing Up
403(1)
Scheduling Backups
404(2)
Restoring Files from Locally Stored Backup Files
406(1)
Restoring Files from Backup Files Stored on Remote Server
407(1)
Configuring Network Security and Access
408(8)
Configuring Network Access and Services
408(3)
Managing Passwords and Account Management
411(3)
Managing Users
414(2)
Configuring Routing
416(10)
Configuring Static Routes
416(2)
Configuring OSPF
418(1)
Defining OSPF Areas
418(2)
Configuring OSPF Interfaces
420(2)
Changing Global OSPF Settings
422(2)
Using Route Summary Commands
424(2)
Summary
426(1)
Solutions Fast Track
427(2)
Frequently Asked Questions
429(2)
Appendix A UNIX Basics
431(18)
Introduction
432(1)
Understanding Files and Directories
432(8)
The UNIX Directory Hierarchy
432(4)
Basic Directory Commands
436(1)
Command: cd
437(1)
Command: pwd
437(1)
Command: Is
438(1)
UNIX File Basics
439(1)
Symbolic and Hard Links
439(1)
Hard Links
440(1)
Symbolic Links
440(1)
Understanding Users and Groups
440(5)
Users and Groups
440(1)
User Types
441(1)
UIDs and GIDs
442(1)
Wheel Group
443(1)
File Access Permissions
444(1)
setuid and setgid Binaries
445(1)
Using the Shell and Basic Shell Utilities
445(2)
C-Shell
445(1)
Command: mv
446(1)
Command: cp
446(1)
Command: cat
446(1)
Command: grep
446(1)
Command: more
446(1)
Command: tail
447(1)
Command: head
447(1)
Command: tar
447(1)
Using vi
447(2)
Appendix B Accessing Lab Videos
449(4)
Introduction and System Requirements
450(1)
Video Lab Instruction
450(3)
Index 453
Andrew leads a team of software developers at Q1 Labs Inc. integrating 3rd party event and vulnerability data into QRadar, their flagship network security management solution. Prior to joining Q1 Labs, Andrew was CEO and co-founder of Koteas Corporation, a leading provider of end to end security and privacy solutions for government and enterprise. His resume also includes such organizations as Nokia Enterprise Solutions, Nortel Networks, and Magma Communications, a division of Primus. Andrew is a strong advocate of security training, certification programs, and public awareness initiatives. He also holds several industry certifications including the CCNA, CCSA, CCSE, CCSE NGX, CCSE Plus, Security+, GCIA, GCIH, SSP-MPA, SSP-CNSA, NSA, RHCT, and RHCE. Keli is a certified professional instructor through Freisen, Kaye and Associates, with over 15 years experience in IT. She also has a diploma in Business Administration with a major in Information Systems. Keli is currently working as an Instructional Designer, primarily for a large, global IT client, and is based in Fredericton, New Brunswick, Canada. In other roles, Keli has provided technical support and training for company specific and third party products, provisioned client services, provided customer service, and audited IT services. Keli's employers include PulseLearning Inc., Computer Sciences Corporation (CSC), Nortel, and Magma Communications, a division of Primus. Keli also acted as a technical editor consultant on OSSEC Host-Based Intrusion Detection Guide (ISBN 978-1-59749-240-9). She enjoys learning and writing about and helping to train people on different products. Peter is an information security consultant in Toronto, Ontario. Over the last 10 years Peter has been involved in the design and implementation of client defenses using many different security technologies. He is also skilled in vulnerability and penetration testing having taken part in hundreds of assessments. Peter has been involved with SANS and GIAC for quite some time as an Instructor, Authorized Grader for the GSEC certification, courseware author, exam developer, Advisory Board member, and is currently a Technical Director for the GIAC family of certifications. He currently maintains the first information security streaming video website (www.theacademy.ca), which assists organizations in implementing and troubleshooting some of the most popular security products. Peter's current certifications include: GSEC, GCIH, GCIA, GCFA, GCFW, GREM, GSNA, CISSP, CCSI, INFOSEC, CCSP, & MCSE.