Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software,
the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the
Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
IMPORTANT NOTE T O USERS
This software and hardware is provided by Nokia Inc. as is and any express or implied warranties, including, but not
limited to, implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall
Nokia, or its affiliates, subsidiaries or suppliers be liable for any direct, indirect, incidental, special, exemplary, or
consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or
profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort
(including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of
such damage.
Nokia reserves the right to make changes without further notice to any products herein.
TRADEMARKS
Nokia is a registered trademark of Nokia Corporation. Other products mentioned in this document are trademarks or
registered trademarks of their respective holders.
080101
Nokia IP60 Security Appliance User Guide3
Nokia Contact Information
Corporate Headquarters
Regional Contact Information
Nokia Customer Support
Web Sitehttp://www.nokia.com
Telephone1-888-477-4566 or
1-650-625-2000
Fax1-650-691-2170
Mail
Address
Nokia Inc.
313 Fairchild Drive
Mountain View, California
94043-2215 USA
AmericasNokia Inc.
313 Fairchild Drive
Mountain View, CA 94043-2215
USA
Tel: 1-877-997-9199
Outside USA and Canada: +1 512-437-7089
email: info.ipnetworking_americas@nokia.com
Europe,
Middle East,
and Africa
Nokia House, Summit Avenue
Southwood, Farnborough
Hampshire GU14 ONG UK
Introduction to Information Security ................................................................................................. 29
The Nokia IP60 Firewall ................................................................................................................... 32
Installing and Setting Up the Nokia IP60 Appliance ....................................................................... 39
Before You Install the Nokia IP60 Appliance ................................................................................... 39
Nokia IP60 and Nokia IP60 Wireless Installation ............................................................................. 50
Cascading Your Appliance ............................................................................................................... 54
Connecting the Appliance to Network Printers ................................................................................. 55
Setting Up the IP60 Appliance .......................................................................................................... 55
Getting Started .................................................................................................................................... 59
Initial Login to the Nokia IP60 Portal ............................................................................................... 59
Logging on to the Nokia IP60 Portal ................................................................................................ 60
Accessing the Nokia IP60 Portal Remotely Using HTTPS ............................................................... 61
Using the Nokia IP60 Portal.............................................................................................................. 63
Logging off ....................................................................................................................................... 65
Configuring the Internet Connection ................................................................................................ 67
Using Bridges ..................................................................................................................................... 157
CE Declaration of Conformity ........................................................................................................ 479
Federal Communications Commission Radio Frequency Interference Statement .......................... 481
Glossary of Terms ............................................................................................................................. 483
Index ................................................................................................................................................... 487
Contents 9
About Your Nokia IP60 Appliance
Note: Notes are denoted by indented text and preceded by the Note icon.
Warning: Warnings are denoted by indented text and preceded by the Warning icon.
If this icon appears...
You can perform the task using these products...
Nokia IP60
Nokia IP60 Wireless
All products with USB ports, specifically, Nokia IP60 Wireless
Only products without ADSL. Note: Nokia IP60 appliances do not
provide ADSL.
About This Guide
To make finding information in this manual easier, some types of information are marked with special
symbols or formatting.
Boldface type is used for command and button names.
Each task is marked with an icon indicating the Nokia IP60 product required to perform the task, as
follows:
Chapter 1: About This Guide 11
About Your Nokia IP60 Appliance
This chapter includes the following topics:
About Your Check Point Nokia IP60 Nokia IP60 Appliance ..................... 13
The Nokia IP60 Series and Nokia IP60 Wireless Series ............................ 13
Contacting Technical Support .................................................................... 28
Feature
Nokia IP60
Concurrent Users
8 / 16 / 32 / Unrestricted
Introduction
Chapter 1
This chapter introduces the Nokia IP60 appliance and this guide.
About Your Nokia IP60 Appliance
The Nokia IP60 appliance is a Unified Threat Management (UTM) appliance that delivers proven, tightly
integrated security features to provide the perfect blend of simplicity and security. Based on the same
Check Point technologies that secure the Fortune 100, IP60 appliances deliver uncompromising security,
while streamlining deployment and administration.
IP60 appliances integrate a complete set of security features into a single, easy-to-install unit, including
firewall, VPN, intrusion prevention, antivirus, antispam, Web filtering, reporting & monitoring, and
Network Access Control (NAC). In addition, IP60 appliances offer powerful networking capabilities,
including advanced routing, traffic shaping, high availability, redundant Internet connections, and extensive
VLAN support.
All IP60 appliances can be integrated into an overall enterprise security policy for maximum security.
Check Point's Security Management Architecture (SMART) delivers a single enterprise-wide security
policy that you can centrally manage and automatically deploy to an unlimited number of Nokia IP60
gateways.
Nokia IP60 Products
The Nokia IP60 appliance incorporates the following product families.
Nokia IP60 Internet Security Appliance, which corresponds with the Nokia IP60. Nokia IP60 Wireless Security Appliance, which corresponds with the Nokia IP60 Wireless.
The following subscription security services are available to IP60 owners by connecting to a Service
Center:
Firewall Security and Software Updates Web Filtering Email Antivirus and Antispam Protection VStream Embedded Antivirus Updates Dynamic DNS Service VPN Management Security Reporting Vulnerability Scanning Service
These services require an additional purchase of subscription. For more information, contact your Check
Point reseller.
Software Requirements
One of the following browsers:
Microsoft Internet Explorer 6.0 or higher Netscape Navigator 6.0 and higher Mozilla Firefox
Chapter 1: Introduction 21
Nokia IP60 Products
Note: For proper operation of the IP60 Portal, disable any pop-up blockers for
http://my.firewall.
Getting to Know Your Nokia IP60 Appliance
Package Contents
The Nokia IP60 package includes the following:
Nokia IP60 Internet Security Appliance Power supply CAT5 Straight-through Ethernet cable Getting Started Guide Documentation CDROM Wall mounting kit RS232 serial adaptor (RJ45 to DB9); model SBX-166LHGE-5 only
22 Nokia IP60 Security Appliance User Guide
Nokia IP60 Products
Label
Description
PWR
A power jack used for supplying power to the unit. Connect the supplied power
supply to this jack.
RESET
A button used for rebooting the IP60 appliance or resetting the IP60 appliance to
its factory defaults. You need to use a pointed object to press this button.
Short press. Reboots the IP60 appliance
Long press (7 seconds). Resets the IP60 appliance to its factory defaults,
and resets your firmware to the version that shipped with the IP60
appliance. This results in the loss of all security services and
passwords and reverting to the factory default firmware. You will have
to re-configure your IP60 appliance.
Do not reset the unit without consulting your system administrator.
Serial
A serial (RS-232) port used for connecting computers in order to access the
Nokia IP60 CLI (Command Line Interface), or for connecting an external dialup
modem.
Depending on the appliance model, this port may have either a DB9 RS232
connector, or an RJ-45 connector. In models with an RJ-45 connector, an RJ-45
to DB9 converter is supplied for your convenience.
Warning: Do not connect an Ethernet cable to the RJ-45 serial port.
Figure 1: Nokia IP60 Appliance Rear Panel
Network Requirements
10BaseT or 100BaseT Network Interface Card installed on each computer CAT 5 STP (Category 5 Shielded Twisted Pair) Straight Through Ethernet cable for each
attached device
A broadband Internet connection via cable or DSL modem with Ethernet interface (RJ-45)
Rear Panel
All physical connections (network and power) are made via the rear panel of your IP60 appliance.
The following table lists the Nokia IP60 appliance's rear panel elements.
Table 3: Nokia IP60 Appliance Rear Panel Elements
Chapter 1: Introduction 23
Nokia IP60 Products
Label
Description
WAN
Wide Area Network: An Ethernet port (RJ-45) used for connecting your
broadband modem, a wide area network router, or a network leading to the
Internet
DMZ/
WAN2
A dedicated Ethernet port (RJ-45) used to connect a DMZ (Demilitarized Zone)
computer or network. Alternatively, can serve as a secondary WAN port or as a
VLAN trunk.
LAN 1-4
Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting
computers or other network devices
LED
State
Explanation
PWR/SEC
Off
Power off
Flashing quickly (Green)
System boot-up
Flashing slowly (Green)
Establishing Internet connection
Flashing (Red)
Hacker attack blocked
On (Green)
Normal operation
On (Red)
Error
LAN 14/WAN/
DMZ/WAN2
LINK/ACT Off, 100 Off
Link is down
Figure 2: Nokia IP60 Appliance Front Panel
Front Panel
The Nokia IP60 appliance includes several status LEDs that enable you to monitor the appliance’s
operation.
For an explanation of the Nokia IP60 appliance’s status LEDs, see the table below.
Table 4: Nokia IP60 Appliance Status LEDs
24 Nokia IP60 Security Appliance User Guide
Nokia IP60 Products
LED
State
Explanation
LINK/ACT On, 100 Off
10 Mbps link established for the
corresponding port
LINK/ACT On, 100 On
100 Mbps link established for the
corresponding port
LNK/ACT Flashing
Data is being transmitted/received
VPN
Off
No VPN activity
Flashing (Green)
VPN activity
On (Green)
VPN tunnels established, no activity
Serial
Off
No Serial port activity
Flashing (Green)
Serial port activity
Getting to Know Your Nokia IP60 Wireless Appliance
Package Contents
The Nokia IP60 Wireless package includes the following:
Nokia IP60 Wireless Internet Security Appliance Power supply CAT5 Straight-through Ethernet cable Getting Started Guide Documentation CDROM Wall mounting kit RS232 serial adaptor (RJ45 to DB9) Two antennas USB extension cable
Chapter 1: Introduction 25
Nokia IP60 Products
Label
Description
PWR
A power jack used for supplying power to the unit. Connect the supplied power
supply to this jack.
RESET
A button used for rebooting the IP60 appliance or resetting the IP60 appliance to
its factory defaults. You need to use a pointed object to press this button.
Short press. Reboots the IP60 appliance
Long press (7 seconds). Resets the IP60 appliance to its factory defaults,
and resets your firmware to the version that shipped with the IP60
appliance. This results in the loss of all security services and
passwords and reverting to the factory default firmware. You will have
to re-configure your IP60 appliance.
Do not reset the unit without consulting your system administrator.
USB
Two USB 2.0 ports used for connecting USB-based printers or modems
Figure 3: Nokia IP60 Wireless Appliance Rear Panel
Figure 4: Nokia IP60 Wireless Appliance Rear Panel
Network Requirements
10BaseT or 100BaseT Network Interface Card installed on each computer CAT 5 STP (Category 5 Shielded Twisted Pair) Straight Through Ethernet cable for each
attached device
An 802.11b, 802.11g or 802.11 Super G wireless card installed on each wireless station A broadband Internet connection via cable or DSL modem with Ethernet interface (RJ-45)
Rear Panel
All physical connections (network and power) are made via the rear panel of your IP60 appliance.
The following table lists the Nokia IP60 Wireless appliance's rear panel elements.
Table 5: Nokia IP60 Wireless Appliance Rear Panel Elements
26 Nokia IP60 Security Appliance User Guide
Nokia IP60 Products
Label
Description
Serial
A serial (RS-232) port used for connecting computers in order to access the
Nokia IP60 CLI (Command Line Interface), or for connecting an external dialup
modem.
Depending on the appliance model, this port may have either a DB9 RS232
connector, or an RJ-45 connector. In models with an RJ-45 connector, an RJ-45
to DB9 converter is supplied for your convenience.
Warning: Do not connect an Ethernet cable to the RJ-45 serial port.
WAN
Wide Area Network: An Ethernet port (RJ-45) used for connecting your
broadband modem, a wide area network router, or a network leading to the
Internet.
DMZ/
WAN2
A dedicated Ethernet port (RJ-45) used to connect a DMZ (Demilitarized Zone)
computer or network. Alternatively, can serve as a secondary WAN port or as a
VLAN trunk.
LAN 1-4
Local Area Network switch: Four Ethernet ports (RJ-45) used for connecting
computers or other network devices.
ANT 1/
ANT 2
Antenna connectors, used to connect the supplied wireless antennas .
LED
State
Explanation
PWR/SEC
Off
Power off
Flashing quickly (Green)
System boot-up
Figure 5: Nokia IP60 Wireless Appliance Front Panel
Front Panel
The Nokia IP60 Wireless appliance includes several status LEDs that enable you to monitor the appliance’s
operation.
For an explanation of the Nokia IP60 Wireless appliance’s status LEDs, see the table below.
Table 6: Nokia IP60 Wireless Appliance Status LEDs
Chapter 1: Introduction 27
Nokia IP60 Products
LED
State
Explanation
Flashing slowly (Green)
Establishing Internet connection
Flashing (Red)
Hacker attack blocked
On (Green)
Normal operation
On (Red)
Error
Flashing (Orange)
Software update in progress
LAN 1-4/
WAN/
DMZ/WAN2
LINK/ACT Off, 100 Off
Link is down
LINK/ACT On, 100 Off
10 Mbps link established for the
corresponding port
LINK/ACT On, 100 On
100 Mbps link established for the
corresponding port
LNK/ACT Flashing
Data is being transmitted/received
VPN
Off
No VPN activity
Flashing (Green)
VPN activity
On (Green)
VPN tunnels established, no activity
Serial
Off
No Serial port activity
Flashing (Green)
Serial port activity
USB
Off
No USB port activity
Flashing (Green)
USB port activity
WLAN
Off
No WLAN activity
Flashing (Green)
WLAN activity
Contacting Technical Support
If there is a problem with your IP60 appliance, see http://support.nokia.com.
You can also download the latest version of this guide from the Nokia Support site.
28 Nokia IP60 Security Appliance User Guide
Introduction to Information Security
This chapter includes the following topics:
Introduction to Information Security .......................................................... 29
The Nokia IP60 Firewall ............................................................................ 32
Security
Chapter 2
This chapter explains the basic security concepts.
Introduction to Information Security
Network security is but a small part of information security, which in turn is only a fraction of general
security. In order to understand why the IP60 appliance is the best product for securing the business
network, we must first examine information security requirements in general.
Information is Valuable!
The most valuable asset an organization has is its information. The type of information maintained by an
organization depends on the organization's type and purpose. For example:
Almost every organization stores information about its operations, such as employees' names and
other personal details, salaries, and so on.
Depending on the role of different governmental offices, they may store personal information
about citizens, residential addresses, car licenses registration, and so on.
The army stores information about its soldiers, weapons inventory, and intelligence information
about other armies. Much of this information is confidential.
A bank stores information about its customers' accounts, their money transactions, ATM machine
access codes, and so on. Much of this information is confidential.
Commercial companies store information about their revenues, business and marketing plans,
current and future product lines, information about competitors, and so on.
Just as the type of information may differ from organization to organization, the form in which it is stored
may vary. For example, some forms of information are:
Information recorded in written media, such as paper documents, books, and files Knowledge that is stored in a person's mind and can be exchanged verbally Information stored on electronic media, such as computers' hard drives, CDs, and tapes
The form in which an organization stores its information may make the information more or less accessible
to people outside the organization.
Why Protect Business Information?
There are various reasons why it is necessary to protect business information:
Chapter 2: Security 29
Introduction to Information Security
To prevent the theft, abuse, misuse, or any form of damage to crucial information
For example, no business wants to find its customer list or future secret product line plans in the hands
of the competition.
To comply with local laws
Local laws may enforce the protection, integrity, and availability of specific information, such as an
individual's personal details, in order to respect the individual's right to privacy. Local laws may also
enforce the security requirements made in the Health Insurance Portability and Accountability Act of
1996 (HIPAA).
To comply with another organization's security requirements
Some organizations require their business partners to comply with international standards of security.
Information Security Challenges
The challenges of information security can be divided into the following areas:
Confidentiality and Privacy - Ensuring that only the intended recipients can read certain
information
Authentication - Ensuring that information is actually sent by the stated sender Integrity - Ensuring that the original information was not altered and that no one tampered with it Availability - Ensuring that important information can be accessed at all times and places
The Security Policy
In order to meet these challenges, an organization must create and enforce a security policy. A security
policy is a set of rules that defines how and by whom sensitive information should be accessed, handled,
and distributed, both within and outside of the organization. For example, a security policy may include the
following rules regarding visitors who arrive at an enterprise building's lobby:
Visitors must sign in at the entrance desk. Visitors must wear a visitor badge and be escorted while in the building. Visitors cannot use their badge to open electronic doors.
Other types of security policy rules and measures might be:
Only the executive manager has access to financial reports. Visitors must open their bags for a security check. Surveillance cameras should be positioned in the area of the building. Passwords must be changed on a daily basis. Confidential papers must be shredded after use.
An organization's security policy is usually designed by a person who is in charge of handling all security
matters for the organization. This person is called a security manager.
30 Nokia IP60 Security Appliance User Guide
Loading...
+ 464 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.