Nokia Firewall, VPN, and IPSO Configuration Guide Nokia Firewall, VPN, and IPSO Configuration Guide

Nokia Firewall, VPN, and IPSO Configuration Guide

Andrew Hay and Others
    • £40.99
    • £40.99

Publisher Description

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

- Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market



- Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors



- Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface

GENRE
Computing & Internet
RELEASED
2009
7 February
LANGUAGE
EN
English
LENGTH
488
Pages
PUBLISHER
Syngress
SIZE
6.6
MB
Nokia Network Security Solutions Handbook (Enhanced Edition) Nokia Network Security Solutions Handbook (Enhanced Edition)
2002
Check Point™ Next Generation With Application Intelligence Security Administration Check Point™ Next Generation With Application Intelligence Security Administration
2004
Configuring NetScreen Firewalls Configuring NetScreen Firewalls
2004
Implementation of IBM j-type Ethernet Appliances Implementation of IBM j-type Ethernet Appliances
2011
Designing and Building Enterprise DMZs (Enhanced Edition) Designing and Building Enterprise DMZs (Enhanced Edition)
2006
Hack Proofing Linux Hack Proofing Linux
2001
Murder In The Library Murder In The Library
2025
The Flavour Thieves The Flavour Thieves
2025
Murder On The Beach Murder On The Beach
2025
The Cellar Below The Cellar Below
2025
Murder At The Castle Murder At The Castle
2025
Any Port In A Storm Any Port In A Storm
2025