Nokia IP40 - Satellite Unlimited - Security... User manual

N450916004 Rev A
May 2005
IP40 Security Platform
User’s Guide
Version 2.0

2 Nokia IP40 Security Platform User’s Guide v2.0
COPYRIGHT
©2005 Nokia. All rights reserved.
Rights reserved under the copyright laws of the United States.
RESTRICTED RIGHTS LEGEND
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software,
the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the
Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
IMPORTANT NOTE TO USERS
This software and hardware is provided by Nokia Inc. as is and any express or implied warranties, including, but not
limited to, implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall
Nokia, or its affiliates, subsidiaries or suppliers be liable for any direct, indirect, incidental, special, exemplary, or
consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or
profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort
(including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of
such damage.
Nokia reserves the right to make changes without further notice to any products herein.
TRADEMARKS
Nokia is a registered trademark of Nokia Corporation. Other products mentioned in this document are trademarks or
registered trademarks of their respective holders.
050110
www.anatel.gov.br

Nokia IP40 Security Platform User’s Guide v2.0 3
Nokia Contact Information
Corporate Headquarters
Regional Contact Information
Nokia Customer Support
Web Site http://www.nokia.com
Telephone 1-888-477-4566 or
1-650-625-2000
Fax 1-650-691-2170
Mail
Address
Nokia Inc.
313 Fairchild Drive
Mountain View, California
94043-2215 USA
Americas Nokia Inc.
313 Fairchild Drive
Mountain View, CA 94043-2215
USA
Tel: 1-877-997-9199
Outside USA and Canada: +1 512-437-7089
email: ipsecurity[email protected]
Europe,
Middle East,
and Africa
Nokia House, Summit Avenue
Southwood, Farnborough
Hampshire GU14 ONG UK
Tel: UK: +44 161 601 8908
Tel: France: +33 170 708 166
email: ipsecurity[email protected]
Asia-Pacific 438B Alexandra Road
#07-00 Alexandra Technopark
Singapore 119968
Tel: +65 6588 3364
email: ipsecurity[email protected]
Web Site: https://support.nokia.com/
Email: [email protected]
Americas Europe
Voice: 1-888-361-5030 or
1-613-271-6721
Voice: +44 (0) 125-286-8900
Fax: 1-613-271-8782 Fax: +44 (0) 125-286-5666
Asia-Pacific
Voice: +65-67232999
Fax: +65-67232897
050113

4 Nokia IP40 Security Platform User’s Guide v2.0

Nokia IP40 Security Platform User’s Guide v2.0 5
Contents
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
In This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Conventions This Guide Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Command-Line Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Menu Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
About Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Nokia IP40 Tele 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Nokia IP40 Satellite 16, Satellite 32, Satellite Unlimited . . . . . . . . . . . . . . . . . . . . 22
Nokia IP40 Security Platform Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Security Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Diagnostics and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Nokia IP40 Security Platform Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . 31
Network Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Nokia IP40 Security Platform Rear Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Nokia IP40 Security Platform Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2 Installing Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Before You Install Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Setting Up Nokia IP40 Security Platform with
Microsoft Windows 98 or Millennium Operating Systems . . . . . . . . . . . . . . . . . 37
Setting Up Nokia IP40 Security Platform With
Microsoft Windows XP and 2000 Operating Systems . . . . . . . . . . . . . . . . . . . . 42
Setting Up Nokia IP40 Security Platform with an Apple Computer . . . . . . . . . . . . 46
Connecting Nokia IP40 Security Platform to the Network . . . . . . . . . . . . . . . . . . . 46
Installing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

6 Nokia IP40 Security Platform User’s Guide v2.0
3 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
First-Time Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Configuring Nokia IP40 Security Platform for Internet Connection . . . . . . . . . . . . . 50
Making Initial Nokia IP40 Security Platform Settings . . . . . . . . . . . . . . . . . . . . . . . 51
Setting Nokia IP40 Security Platform Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Registering with the Nokia Support Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Connecting to a Central Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Logging On to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Accessing Nokia IP40 Securely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Logging Off from Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Understanding the Nokia IP40 Web GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Using the Nokia IP40 Security Platform Web-based User Interface . . . . . . . . . . 59
Graphical User Interface Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4 Accessing Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Connection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Connecting Nokia IP40 Security Platform to a Computer
by Using the Console Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Using Telnet to Connect to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . 68
Enabling and Disabling Telnet Access to Nokia IP40 . . . . . . . . . . . . . . . . . . . . 69
Using Secure Shell to Connect to Nokia IP40 Security Platform . . . . . . . . . . . . . 70
Accessing Nokia IP40 with HTTP and HTTPS. . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Managing Large Scale Deployments of Nokia IP40 . . . . . . . . . . . . . . . . . . . . . . . . 70
Deploying Nokia IP40 Security Platform with Nokia Horizon Manager . . . . . . . . 70
Deploying Nokia IP40 Security Platform with
Check Point SmartCenter Large Scale Manager . . . . . . . . . . . . . . . . . . . . . . . 71
Deploying Nokia IP40 with Sofaware Management Portal. . . . . . . . . . . . . . . . . . 71
5 Connecting to the Internet with Nokia IP40 Security Platform . . . . . . . . . . . . . 73
Configuring an Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Using the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Cable Modem Connection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
MAC Cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Cloning a MAC Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
DSL Connection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Manually Configuring the Internet Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Dial-Up PPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Configuring Dial-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Using CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Nokia IP40 Security Platform User’s Guide v2.0 7
Multiple Dial-up Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Enabling or Disabling the Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Using Quick Internet Connect or Disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Configuring a Backup Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Viewing Internet Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
6 Managing Your Local Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Configuring Network Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Enabling and Disabling the DHCP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuring a DMZ Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
VLAN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Tag-Based VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Configuring a VLAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Deleting a VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Configuring DHCP Relay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Changing IP Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Configuring Network Objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Configuring Static NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Editing Static NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Viewing Static NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Deleting Static NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Configuring DHCP Reservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Deleting Network Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Configuring Static Routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Managing Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Viewing Ports Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
7 Quality of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
About QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Using Traffic Shaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Default QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Enabling QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Adding QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Editing and Deleting QoS Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
8 Setting Up the Nokia IP40 Security Platform Security Policy . . . . . . . . . . . . . 125
Setting the Firewall Security Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Configuring Virtual Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Customizing Nokia IP40 Security Platform
Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Creating Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Allow and Block Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

8 Nokia IP40 Security Platform User’s Guide v2.0
Deleting and Editing Firewall Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Viewing the Rules Log for Accepted Connections . . . . . . . . . . . . . . . . . . . . . 136
Editing or Deleting an Exposed Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
9 Configuring Network Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Changing Your Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Viewing and Editing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Deleting Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Setting Up Remote VPN Access for Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Using RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Telnet Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Secure Shell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Configuring SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Enabling or Disabling SSH Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
SSH Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Using SSH Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Configuring Advanced Secure Shell Server Options . . . . . . . . . . . . . . . . . . . . . 148
Configuring Server Authentication of Users . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Configuring and Managing SSH Key Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Managing Authorized Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Secure Socket Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Enabling HTTPS Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Generating a Self-Signed Certificate and Private Key
by Using CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Installing a Certificate and Private Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
10 Configuring and Monitoring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
SNMP Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
SNMP Configuration from Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . 153
Setting Up SNMP Access to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . 153
Configuring the SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Configuring SNMP Parameters from the Command-Line Interface . . . . . . . . . . 156
Setting SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Viewing SNMP Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
11 High-Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Dual Homing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Configuring for Dual Homing ISP Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . 158

Nokia IP40 Security Platform User’s Guide v2.0 9
Configuring ISP Dial-Up Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Generic High-Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Advanced High-Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Route Based VPN and BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Border Gateway Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Configuring the BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
High-Availability Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Configuring High-Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Configuring High-Availability by Using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . 168
Configuring High-Availability by Using the GUI . . . . . . . . . . . . . . . . . . . . . . . . 169
High-Availability Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
High-Availability Solution with Single Nokia IP40 Device . . . . . . . . . . . . . . . . . . 171
High-Availability Solutions with Dual Nokia IP40 Device. . . . . . . . . . . . . . . . . . . 171
Generic HA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
HA Coupled With BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
12 Configuring Nokia IP40 Through
Out-of-Band Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Configuring OOB from the Nokia IP40
Security Platform GUI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Secure Shell and HTTPS Access Through Out-of-Band Dial-In . . . . . . . . . . . . . . 177
Remote Configuration Mode in the Nokia IP40 Security Platform . . . . . . . . . . . . . 177
13 Configuring Device Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Host Name Configuration by Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Date and Time Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
System Logging Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Setting the Syslog Server by Using CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Managing Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Exporting the Nokia IP40 Security Platform Configuration . . . . . . . . . . . . . . . . . 182
Importing the Nokia IP40 Security Platform Configuration . . . . . . . . . . . . . . . . . 184
Upgrading Firmware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Installing Your Product Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Dynamic DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Configuring DDNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Resetting Nokia IP40 Security Platform to Factory Defaults . . . . . . . . . . . . . . . . . 188
Resetting Nokia IP40 Security Platform to Factory Defaults
by Using the Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Restarting Nokia IP40 Security Platform by Using GUI . . . . . . . . . . . . . . . . . . . . . 190

10 Nokia IP40 Security Platform User’s Guide v2.0
14 Viewing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Viewing Reports on Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . 191
Viewing the Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Viewing Active Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Viewing Active Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Viewing the Diagnostics Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
15 Working with VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
About VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Setting Up Nokia IP40 Security Platform as a VPN Server. . . . . . . . . . . . . . . . . . 199
Configuring Remote Access VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Configuring Site-to-Site VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Completing Site Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Deleting a VPN Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Logging On to a VPN Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Logging on from the Nokia IP40 Security Platform GUI . . . . . . . . . . . . . . . . . 209
Logging On Through my.vpn. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Logging Off a VPN Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
VPN Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Installing a Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Generating a Self-Signed Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Importing a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Installing VPN Certificates from SmartCenter . . . . . . . . . . . . . . . . . . . . . . . . . 216
Uninstalling the VPN Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Viewing VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Viewing IKE Traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Downloading the Precompiled Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
VPN Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Nokia IP40 Security Platform as a VPN Server . . . . . . . . . . . . . . . . . . . . . . . . . 220
SecuRemote to Nokia IP40 Satellite X
(VPN Client to Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Setting Up Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Nokia IP40 Security Platform as VPN Client . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Authentication Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Setting Up Nokia IP40 Tele 8 as a VPN Client . . . . . . . . . . . . . . . . . . . . . . . . . 222
Adding VPN Sites by Using Nokia IP40 Tele 8 . . . . . . . . . . . . . . . . . . . . . . . . . 222
Nokia IP40 Site-to-Site VPNs support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Adding VPN Sites by Using Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . 226
Nokia IP40 Tele to IP40 Satellite X
(VPN Client to Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Setting Up Nokia IP40 Tele 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Setting Up Nokia IP40 Satellite X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Nokia IP40 Tele 8 to Check Point

Nokia IP40 Security Platform User’s Guide v2.0 11
FP1, FP2, FP3, NG, or NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Setting Up Nokia IP40 Tele 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Setting Up Check Point Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Nokia IP40 Tele 8 to Check Point NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Setting Up Nokia IP40 Tele 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Setting Up Check Point NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Nokia Satellite X to Nokia Satellite X
(VPN Gateway-to-Gateway). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Setting Up Nokia IP40 Satellite X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Nokia IP40 Satellite X in NAT and Bypass NAT Modes . . . . . . . . . . . . . . . . . . . 230
NAT Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Bypass NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Bypass Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Defining a Backup VPN Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Nokia IP40 Satellite X to VPN-1 (Site-to-Site VPN) . . . . . . . . . . . . . . . . . . . . . . 232
Setting Up Nokia IP40 Satellite X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Nokia IP40 Satellite X to Check Point FP3 or DAIP . . . . . . . . . . . . . . . . . . . . . . 233
Setting Up Check Point FP3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Setting Up Nokia IP40 Satellite X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Nokia IP40 Satellite X to Check Point SmartCenter FP3/NG AI . . . . . . . . . . . . . 234
Setting Up Check Point SmartCenter FP3/NG AI . . . . . . . . . . . . . . . . . . . . . . 235
Setting Up Nokia IP40 Satellite X
for VPN Connection with SmartCenter FP3 . . . . . . . . . . . . . . . . . . . . . . . . . 235
Setting Up Check Point SmartCenter NG AI by Using
Certificates with Smart LSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Site-to-Site VPN with Windows 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Site-to-Site VPN with Nokia CryptoCluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Site-to-Site VPN with Cisco PIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
VPN Routing Between Two Nokia IP40 Security Platforms . . . . . . . . . . . . . . . . 238
IPSec NAT Traversal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Mesh VPN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Enhanced MEP Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
16 Using Managed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Starting Your Subscription Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Viewing Service Information from the Account Page . . . . . . . . . . . . . . . . . . . . . . . 244
Refreshing Your Service Center Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Configuring Your Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Disconnecting From Your Service Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Sofaware Security Management Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Web Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Selecting Categories to Block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

12 Nokia IP40 Security Platform User’s Guide v2.0
Enabling or Disabling Email Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Selecting Protocols for Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Temporarily Disabling Email Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Automatic and Manual Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Checking for Software Updates when Locally Managed . . . . . . . . . . . . . . . . . . 252
Checking for Software Updates When Remotely Managed. . . . . . . . . . . . . . . . 253
Managing with Nokia Horizon Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Check Point SmartCenter LSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
17 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Debugging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Configuring Debugging Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Viewing Debugging Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Viewing Firmware Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Resetting the IP40 Security Platform to Factory Defaults . . . . . . . . . . . . . . . . . 264
Failsafe Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Upgrading Firmware in Failsafe Mode by Using Console . . . . . . . . . . . . . . . . . . . 265
Upgrading Firmware from Failsafe Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Running Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
A Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Technical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Safety Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
B Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
C End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
D Compliance Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Declaration of Conformity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Compliance Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
FCC Notice (US) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

Nokia IP40 Security Platform User’s Guide v2.0 15
About This Guide
This guide provides information and procedures about how to install and configure the Nokia
IP40 Security Platform. This guide provides information about the new features incorporated in
the Nokia IP40. This version of Nokia IP40 uses the SofaWare VPN-1 Embedded NG. For a
quick reference on how to configure features in Nokia IP40, see the Nokia IP40 Security
Platform Quick Start Guide and Nokia IP40 Security Platform Online Help, part of the graphical
user interface (GUI) in the device.
Installation and maintenance should be performed by experienced technicians or Nokia-
approved service providers only.
This preface provides the following information:
In This Guide
Conventions This Guide Uses
Related Documentation
In This Guide
This guide is organized into the following chapters and appendixes:
Chapter 1, “Introduction” provides the information you need to know before installing
Nokia IP40 Security Platform.
Chapter 2, “Installing Nokia IP40 Security Platform” explains how to install the device, lists
operating system requirements, protocols and how to establish a network connection.
Chapter 3, “Getting Started” explains how to start by using the IP40, and provides
information on first-time login and connecting to the Internet.
Chapter 4, “Accessing Nokia IP40 Security Platform” explains different methods of
connecting to your IP40, and methods of configuring the device.
Chapter 5, “Connecting to the Internet with Nokia IP40 Security Platform” explains how to
configure your IP40 for connecting to the Internet, and viewing and managing your Internet
connection.
Chapter 6, “Managing Your Local Area Network,” explains how to configure the Nokia
IP40 features.
Chapter 7, “Quality of Service” provides information about Quality of Service (QoS) and
how to configure the QoS classes.

3
16 Nokia IP40 Security Platform User’s Guide v2.0
Chapter 8, “Setting Up the Nokia IP40 Security Platform Security Policy” explains methods
to define the firewall level, configure virtual servers, and create firewall rules.
Chapter 9, “Configuring Network Access,” describes the network access procedures and
usage of SSH and SSL.
Chapter 10, “Configuring and Monitoring SNMP,” explains the procedure to configure
Simple Network Management Protocol, set community strings, send and enable SNMP
traps.
Chapter 11, “High-Availability,” explains about the High Availability feature.
Chapter 12, “Configuring Nokia IP40 Through Out-of-Band Management,” explains the
method to configure the Nokia IP40 through Out of Band Management.
Chapter 13, “Configuring Device Functions,” discusses how to configure device functions
such as setting date and time, loading factory defaults and performing firmware upgrade.
Chapter 14, “Viewing Reports,” explains how to view reports such as Event Log, Active
Computers, Active Connections, and VPN Tunnels.
Chapter 15, “Working with VPNs,” explains how to configure a VPN by using Nokia IP40.
Chapter 16, “Using Managed Services” describes methods for enabling and using
subscription services such as Web filtering, email antivirus, automatic and manual updates.
Chapter 17, “Troubleshooting,”discusses typical problems users encounter and provides
solutions to these problems.
Appendix A, “Specifications,” describes the Nokia IP40 specifications.
Appendix B, “Warranty,” contains the warranty details for the Nokia IP40 Security Platform
Appendix C, “End User License Agreement,” contains the End User License Agreement for
Nokia IP40 Security Platform.
Appendix D, “Compliance Information,” contains the compliance information of Nokia
IP40 Security Platform.
Conventions This Guide Uses
The following sections describe the conventions this guide uses, including notices, text
conventions, and command-line conventions.
Notices
Warning
Warnings advise the user that either bodily injury might occur because of a physical hazard,
or that damage to a structure, such as a room or equipment closet, might occur because of
equipment damage.

Conventions This Guide Uses
Nokia IP40 Security Platform User’s Guide v2.0 17
Caution
Cautions indicate potential equipment damage, equipment malfunction, loss of
performance, loss of data, or interruption of service.
Note
Notes provide information of special interest or recommendations.
Command-Line Conventions
This section defines the elements of commands that are available in Nokia products. You might
encounter one or more of the following elements on a command-line path.
Table 1 Command-Line Conventions
Convention Description
Command This required element is usually the product name or other short
word that invokes the product or calls the compiler or preprocessor
script for a compiled Nokia product. It might appear alone or
precede one or more options. You must spell a command exactly
as shown and use lowercase letters.
Italics Indicates a variable in a command that you must supply. For
example:
delete interface if_name
Supply an interface name in place of the variable. For example:
delete interface nic1
Angle brackets < > Indicates arguments for which you must supply a value:
retry-limit <1–100>
Supply a value. For example:
retry-limit 60
Square brackets [ ] Indicates optional arguments.
delete [slot slot_num]
For example:
delete slot 3

3
18 Nokia IP40 Security Platform User’s Guide v2.0
Text Conventions
Table 2 describes the text conventions this guide uses.
Vertical bars, also called a
pipe (|)
Separates alternative, mutually exclusive elements.
framing <sonet | sdh>
To complete the command, supply the value. For example:
framing sonet
or
framing sdh
-flag A flag is usually an abbreviation for a function, menu, or option
name, or for a compiler or preprocessor argument. You must enter
a flag exactly as shown, including the preceding hyphen.
.ext A filename extension, such as .ext, might follow a variable that
represents a filename. Type this extension exactly as shown,
immediately after the name of the file. The extension might be
optional in certain products.
( . , ; + * - / ) Punctuation and mathematical notations are literal symbols that
you must enter exactly as shown.
' ' Single quotation marks are literal symbols that you must enter as
shown.
Table 1 Command-Line Conventions (continued)
Convention Description
Table 2 Text Conventions
Convention Description
Monospace font
Indicates command syntax, or represents computer or window
output, for example:
Log error 12453
Bold monospace font Indicates text you enter or type, for example:
# configure nat
Key names Keys that you press simultaneously are linked by a plus sign (+):
Press Ctrl + Alt + Del.
Menu commands Menu commands are separated by a greater than sign (>):
Choose File > Open.

Related Documentation
Nokia IP40 Security Platform User’s Guide v2.0 19
Menu Items
Nokia IP40 menu items in procedures are separated by the greater than sign (>).
For example, Start > Programs > Nokia > Security indicates that you first click Start, then
choose the Programs menu command, then choose Nokia, and finally choose Security.
Related Documentation
In addition to this guide, documentation for this product includes the following:
Nokia IP40 Security Platform Quick Start Guide Version 2.0—provides a description of the
system features and an overview of how to get your device up and running.
Nokia IP40 Security Platform CLI Reference Guide Version 2.0—provides a description of
all IP40 commands that are used for managing the device.
Nokia IP40 Security Platform Release Notes Version 2.0—provides important information
you should know before you install and configure the IP40 Security Platform.
The words enter and type Enter indicates you type something and then press the Return or
Enter key.
Do not press the Return or Enter key when an instruction says
type.
Italics •Emphasizes a point or denotes new terms at the place where
they are defined in the text.
•Indicates an external book title reference.
•Indicates a variable in a command:
delete interface
if_name
Table 2 Text Conventions (continued)
Convention Description

3
20 Nokia IP40 Security Platform User’s Guide v2.0

Nokia IP40 Security Platform User’s Guide v2.0 21
1Introduction
This chapter introduces the Nokia IP40 Security Platform. It includes the following topics:
About Nokia IP40 Security Platform
Nokia IP40 Security Platform Features
Network Requirements
Nokia IP40 Security Platform Front Panel
Nokia IP40 Security Platform Rear Panel
About Nokia IP40 Security Platform
The Nokia IP40 Security Platform provides dependable Internet access for the remote and
branch offices of a distributed enterprise. Nokia IP40 supports features like dial-up connection,
redundant WAN connection to headquarters, and dual homing with BGP to route return traffic
securely, over VPN.
The Nokia IP40 Security Platform can be integrated with an overall enterprise security policy for
maximum security. The IP40 facilitates centralized management and automatic deployment with
the security management architecture of Check Point, and Nokia Horizon Manager.
The Nokia IP40 Security Platform is available with the following licenses:
Nokia IP40 Tele 8
Nokia IP40 Satellite 16
Nokia IP40 Satellite 32
Nokia IP40 Satellite U (Unlimited)
All these versions of Nokia IP40 provide a Web-based interface that enables you to configure
and manage the Nokia IP40.
The Nokia IP40 Security Platform comes pre-installed with the license of your choice. You can
upgrade the IP40 security platform to a more advanced configuration without replacing the
hardware. For details about license upgrade, contact your local reseller.

1Introduction
22 Nokia IP40 Security Platform User’s Guide v2.0
Nokia IP40 Tele 8
Nokia IP40 Tele 8 is for home telecommuters and work extenders who also need VPN client
access. The IP40 Tele 8 supports both firewall and VPN client capabilities over an eight-node
network. The device supports VPN client capabilities for users to connect to the central office
from their home with firewall protection, extending the enterprise network to the employees’
home offices.
IP40 Tele 8 can act as a VPN server, which allows a single user to securely access resources
protected by the device from home or while travelling.
Note
Computers that actually pass through the firewall are counted. Devices such as network
printers connected in LAN that do not normally get connected to the Internet are not
counted.
Nokia IP40 Satellite 16, Satellite 32, Satellite Unlimited
Nokia IP40 Satellite 16, IP40 Satellite 32, and IP40 Satellite Unlimited provide full firewall, and
VPN connectivity for remote and branch offices or independent, small, and medium enterprises
with sixteen, thirty-two, and unlimited node networks, respectively. Using these solutions,
remote and branch offices can securely exchange information between them with distributed
enterprises and small and medium enterprises at a low price with excellent performance.
Nokia IP40 Security Platform Features
The following section contains a summary of Nokia IP40 Security Platform features.
Connectivity
Table 3 “Nokia IP40 Security Platform Connectivity” give details about IP40 v2.0 connectivity.
Table 3 Nokia IP40 Security Platform Connectivity
Feature Nokia IP40 Tele 8
Nokia IP40 Satellite
16/32/Unlimited
LAN, WAN, and console
ports
DMZ Support
Unnumbered PPP
Other manuals for IP40 - Satellite Unlimited - Security...
4
Table of contents
Other Nokia Security System manuals

Nokia
Nokia 6 User manual

Nokia
Nokia IP1200 Series User manual

Nokia
Nokia IP300 Series User manual

Nokia
Nokia IP150 User manual

Nokia
Nokia IP1220 - Security Appliance User manual

Nokia
Nokia IP200 Series User manual

Nokia
Nokia IPSO IP350 User manual

Nokia
Nokia IP560 - Hard Disk Drive Based User manual

Nokia
Nokia IP60 - Security Appliance User manual

Nokia
Nokia EM5400 User manual