Nokia Firewall, VPN, and IPSO Configuration Guide - 1st Edition - ISBN: 9781597492867, 9780080949161

Nokia Firewall, VPN, and IPSO Configuration Guide

1st Edition

Authors: Andrew Hay Keli Hay Peter Giannoulis
Paperback ISBN: 9781597492867
eBook ISBN: 9780080949161
Imprint: Syngress
Published Date: 14th November 2008
Page Count: 488
Tax/VAT will be calculated at check-out
62.95
38.99
48.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

Foreword Chapter 1: Nokia Security Solutions Overview Chapter 2: Nokia IPSO Overview Chapter 3: Initial IPSO Configuration Chapter 4: Nokia Network Voyager Chapter 5: Security and Access Configuration Chapter 6: Advanced System Administration and Troubleshooting Chapter 7: Advanced Routing Configuration Chapter 8: Configuring the Check Point NGX Firewall Chapter 9: System Monitoring Chapter 10: High Availability Chapter 11: IPSO Command Interface Line Shell (CLISH) Appendix A: UNIX Basics Appendix B: Accessing Lab Videos Index

Key Features

  • Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market
  • Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors
  • Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface

Readership

Network administrators, IT Security professionals, IT Security auditors, IT Security consultants.

Table of Contents

Foreword Chapter 1: Nokia Security Solutions Overview Chapter 2: Nokia IPSO Overview Chapter 3: Initial IPSO Configuration Chapter 4: Nokia Network Voyager Chapter 5: Security and Access Configuration Chapter 6: Advanced System Administration and Troubleshooting Chapter 7: Advanced Routing Configuration Chapter 8: Configuring the Check Point NGX Firewall Chapter 9: System Monitoring Chapter 10: High Availability Chapter 11: IPSO Command Interface Line Shell (CLISH) Appendix A: UNIX Basics Appendix B: Accessing Lab Videos Index

Details

No. of pages:
488
Language:
English
Copyright:
© Syngress 2009
Published:
Imprint:
Syngress
eBook ISBN:
9780080949161
Paperback ISBN:
9781597492867

About the Author

Andrew Hay

Andrew leads a team of software developers at Q1 Labs Inc. integrating 3rd party event and vulnerability data into QRadar, their flagship network security management solution. Prior to joining Q1 Labs, Andrew was CEO and co-founder of Koteas Corporation, a leading provider of end to end security and privacy solutions for government and enterprise. His resume also includes such organizations as Nokia Enterprise Solutions, Nortel Networks, and Magma Communications, a division of Primus. Andrew is a strong advocate of security training, certification programs, and public awareness initiatives. He also holds several industry certifications including the CCNA, CCSA, CCSE, CCSE NGX, CCSE Plus, Security+, GCIA, GCIH, SSP-MPA, SSP-CNSA, NSA, RHCT, and RHCE.

Affiliations and Expertise

Andrew leads a team of software developers at Q1 Labs Inc. integrating 3rd party event and vulnerability data into QRadar, their flagship network security management solution. Prior to joining Q1 Labs, Andrew was CEO and co-founder of Koteas Corporation, a leading provider of end to end security and privacy solutions for government and enterprise. His resume also includes such organizations as Nokia Enterprise Solutions, Nortel Networks, and Magma Communications, a division of Primus. Andrew is a strong advocate of security training, certification programs, and public awareness initiatives. He also holds several industry certifications including the CCNA, CCSA, CCSE, CCSE NGX, CCSE Plus, Security+, GCIA, GCIH, SSP-MPA, SSP-CNSA, NSA, RHCT, and RHCE.

Keli Hay

Keli is a certified professional instructor through Freisen, Kaye and Associates, with over 15 years experience in IT. She also has a diploma in Business Administration with a major in Information Systems. Keli is currently working as an Instructional Designer, primarily for a large, global IT client, and is based in Fredericton, New Brunswick, Canada. In other roles, Keli has provided technical support and training for company specific and third party products, provisioned client services, provided customer service, and audited IT services. Keli's employers include PulseLearning Inc., Computer Sciences Corporation (CSC), Nortel, and Magma Communications, a division of Primus. Keli also acted as a technical editor consultant on OSSEC Host-Based Intrusion Detection Guide (ISBN 978-1-59749-240-9). She enjoys learning and writing about and helping to train people on different products.

Affiliations and Expertise

Keli is a certified professional instructor through Freisen, Kaye and Associates, with over 15 years experience in IT. She also has a diploma in Business Administration with a major in Information Systems. Keli is currently working as an Instructional Designer, primarily for a large, global IT client, and is based in Fredericton, New Brunswick, Canada. In other roles, Keli has provided technical support and training for company specific and third party products, provisioned client services, provided customer service, and audited IT services. Keli's employers include PulseLearning Inc., Computer Sciences Corporation (CSC), Nortel, and Magma Communications, a division of Primus. Keli also acted as a technical editor consultant on OSSEC Host-Based Intrusion Detection Guide (ISBN 978-1-59749-240-9). She enjoys learning and writing about and helping to train people on different products.

Peter Giannoulis

Peter is an information security consultant in Toronto, Ontario. Over the last 10 years Peter has been involved in the design and implementation of client defenses using many different security technologies. He is also skilled in vulnerability and penetration testing having taken part in hundreds of assessments. Peter has been involved with SANS and GIAC for quite some time as an Instructor, Authorized Grader for the GSEC certification, courseware author, exam developer, Advisory Board member, and is currently a Technical Director for the GIAC family of certifications. He currently maintains the first information security streaming video website (www.theacademy.ca), which assists organizations in implementing and troubleshooting some of the most popular security products. Peter's current certifications include: GSEC, GCIH, GCIA, GCFA, GCFW, GREM, GSNA, CISSP, CCSI, INFOSEC, CCSP, & MCSE.

Affiliations and Expertise

Peter is an information security consultant in Toronto, Ontario. Over the last 10 years Peter has been involved in the design and implementation of client defenses using many different security technologies. He is also skilled in vulnerability and penetration testing having taken part in hundreds of assessments. Peter has been involved with SANS and GIAC for quite some time as an Instructor, Authorized Grader for the GSEC certification, courseware author, exam developer, Advisory Board member, and is currently a Technical Director for the GIAC family of certifications. He currently maintains the first information security streaming video website (www.theacademy.ca), which assists organizations in implementing and troubleshooting some of the most popular security products. Peter's current certifications include: GSEC, GCIH, GCIA, GCFA, GCFW, GREM, GSNA, CISSP, CCSI, INFOSEC, CCSP, & MCSE.