16
Nokia IP45 Security Platform User’s Guide v4.0
±
Chapter 8, “Setting Up the Nokia IP45 Security Platform Security Policy”
describes methods
to define the firewall level, configure virtual servers, and create firewall rules.
±
Chapter 9, “Configuring Network Access,”
describes the network access procedures and
usage of SSH and SSL.
±
Chapter 10, “Configuring and Monitoring SNMP,”
describes the procedure to configure
Simple Network Management Protocol, set community strings, send and enable SNMP
traps.
±
Chapter 11, “High-Availability,”
describes about the High Availability feature.
±
Chapter 12, “Configuring Nokia IP45 Through Out-of-Band Management,”
describes the
method to configure the Nokia IP45 through Out of Band Management.
±
Chapter 13, “Configuring Device Functions,”
discusses how to configure device functions
such as setting date and time, loading factory defaults and performing firmware upgrade.
±
Chapter 14, “Viewing Reports,”
describes how to view reports such as Event Log, Active
Computers, Active Connections, and VPN Tunnels.
±
Chapter 15, “Working with VPNs,”
describes how to configure a VPN by using the Nokia
IP45.
±
Chapter 16, “Using Managed Services”
describes methods for enabling and using
subscription services such as Web filtering, email antivirus, automatic and manual updates.
±
Chapter 17, “Troubleshooting,”
discusses typical problems users encounter and provides
solutions to these problems.
±
Appendix A, “Specifications,”
describes the Nokia IP45 specifications.
±
Appendix B, “Compliance Information,”
contains the compliance information of the Nokia
IP45 security platform.
Conventions this Guide uses
The following sections describe the conventions this guide uses, including notices, text
conventions, and command-line conventions.
Notices
Warning
Warnings advise the user that either bodily injury might occur because of a physical hazard,
or that damage to a structure, such as a room or equipment closet, might occur because of
equipment damage.
Caution
Cautions indicate potential equipment damage, equipment malfunction, loss of
performance, loss of data, or interruption of service.