244
N450916002 Rev A June 2004 IP40 Security Platform User’s Guide Version 1.1

IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

N450916002 Rev A

June 2004

IP40 Security Platform

User’s Guide

Version 1.1

Page 2: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

COPYRIGHT©2004 Nokia. All rights reserved.Rights reserved under the copyright laws of the United States.

RESTRICTED RIGHTS LEGENDUse, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.

Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.

IMPORTANT NOTE TO USERS This software and hardware is provided by Nokia Inc. as is and any express or implied warranties, including, but not limited to, implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Nokia, or its affiliates, subsidiaries or suppliers be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage.

Nokia reserves the right to make changes without further notice to any products herein.

TRADEMARKS Nokia is a registered trademark of Nokia Corporation. Other products mentioned in this document are trademarks or registered trademarks of their respective holders.

2 Nokia IP40 Security Platform User’s Guide v1.1

Page 3: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia Contact InformationCorporate Headquarters

Regional Contact Information

Nokia Customer Support

Web Site http://www.nokia.com

Telephone 1-888-477-4566 or 1-650-625-2000

Fax 1-650-691-2170

Mail Address

Nokia Inc.313 Fairchild DriveMountain View, California94043-2215 USA

Americas Nokia Inc.313 Fairchild DriveMountain View, CA 94043-2215USA

Tel: 1-877-997-9199Outside USA and Canada: +1 512-437-7089email: [email protected]

Europe, Middle East, and Africa

Nokia House, Summit AvenueSouthwood, FarnboroughHampshire GU14 ONG UK

Tel: UK: +44 161 601 8908Tel: France: +33 170 708 166email: [email protected]

Asia-Pacific 438B Alexandra Road#07-00 Alexandra TechnoparkSingapore 119968

Tel: +65 6588 3364email: [email protected]

Web Site: https://support.nokia.com/

Email: [email protected]

Americas Europe

Voice: 1-888-361-5030 or 1-613-271-6721

Voice: +44 (0) 125-286-8900

Fax: 1-613-271-8782 Fax: +44 (0) 125-286-5666

Asia-Pacific

Voice: +65-67232999

Fax: +65-67232897

040113

Nokia IP40 Security Platform User’s Guide v1.1 3

Page 4: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Nokia IP40 Security Platform User’s Guide v1.1

Page 5: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Contents

In This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Conventions This Guide Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Command-Line Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Menu Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Nokia IP40 Tele 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Nokia IP40 Satellite 16, Satellite 32, Satellite Unlimited . . . . . . . . . . . . . . . . . . . . 20Nokia IP40 Security Platform Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25Security Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Diagnostics and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Nokia IP40 Security Platform Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . 28Network Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Appliance Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29Nokia IP40 Security Platform Rear Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29Nokia IP40 Security Platform Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2 Installing Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Before You Install Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Setting Up Nokia IP40 Security Platform with Microsoft Windows 98 or Millennium Operating Systems . . . . . . . . . . . . . . . . . 33

Setting Up Nokia IP40 Security Platform With Microsoft Windows XP and 2000 Operating Systems . . . . . . . . . . . . . . . . . . . . 37

Setting Up Nokia IP40 Security Platform with an Apple Computer . . . . . . . . . . . . 41Connecting Nokia IP40 Security Platform to the Network . . . . . . . . . . . . . . . . . . . 42Installing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Nokia IP40 Security Platform User’s Guide v1.1 5

Page 6: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43First-Time Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Configuring Nokia IP40 Security Platform for Internet Connection . . . . . . . . . . . . . 44Making Initial Nokia IP40 Security Platform Settings . . . . . . . . . . . . . . . . . . . . . . . 45

Setting Nokia IP40 Security Platform Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Registering with the Nokia Support Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Connecting to a Central Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Logging On to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Accessing Nokia IP40 Securely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Logging Off from Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Understanding the Nokia IP40 Web GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52Using the Nokia IP40 Security Platform Web-based User Interface . . . . . . . . . . 53

Graphical User Interface Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

4 Accessing Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Connection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Connecting Nokia IP40 Security Platform to a Computer by Using the Console Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Using Telnet to Connect to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . 60Enabling and Disabling Telnet Access to Nokia IP40 . . . . . . . . . . . . . . . . . . . . 61

Using Secure Shell to Connect to Nokia IP40 Security Platform . . . . . . . . . . . . . 62Accessing Nokia IP40 with HTTP and HTTPS. . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Managing Large Scale Deployments of Nokia IP40 . . . . . . . . . . . . . . . . . . . . . . . . 62Deploying Nokia IP40 Security Platform with Nokia Horizon Manager . . . . . . . . 62Deploying Nokia IP40 Security Platform with

Check Point SmartCenter Large Scale Manager . . . . . . . . . . . . . . . . . . . . . . . 63Deploying Nokia IP40 with Sofaware Management Portal. . . . . . . . . . . . . . . . . . 63

5 Connecting to the Internet with Nokia IP40 Security Platform . . . . . . . . . . . . . 65Configuring Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Using the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Cable Modem Connection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

MAC Cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Cloning a MAC Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69DSL Connection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Manually Configuring the Internet Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Direct Dial-Up PPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Configuring Dial-Up with the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78Configuring Dial-Up with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

CLI Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

6 Nokia IP40 Security Platform User’s Guide v1.1

Page 7: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Multiple Dial-up Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Enabling or Disabling the Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Using Quick Internet Connect or Disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Configuring a Backup Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81Viewing Internet Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

6 Managing Your Local Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Configuring Network Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Enabling and Disabling the DHCP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Changing IP Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Enabling or Disabling Hide NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85Configuring a DMZ Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Using Static NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Adding and Editing Static NAT Mappings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Viewing and Deleting Static NAT Mappings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Using Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

7 Setting Up the Nokia IP40 Security Platform Security Policy . . . . . . . . . . . . . . 95Setting the Firewall Security Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95Configuring Virtual Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96Customizing Nokia IP40 Security PlatformSecurity Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Creating Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Allow and Block Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Deleting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Defining an Exposed Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

8 Configuring Network Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Changing Your Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Adding Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107Viewing and Editing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108Deleting Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Setting Up Remote VPN Access for Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Using RADIUS Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Telnet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112Secure Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Configuring SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112Enabling or Disabling SSH Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113SSH Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Using SSH Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Configuring Advanced Secure Shell Server Options. . . . . . . . . . . . . . . . . . . . . . 114Configuring Server Authentication of Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Nokia IP40 Security Platform User’s Guide v1.1 7

Page 8: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring and Managing SSH Key Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Managing Authorized Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

Secure Socket Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Enabling HTTPS Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Generating a Self-Signed Certificate and Private Key . . . . . . . . . . . . . . . . . . . . 117Installing a Certificate and Private Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

9 Configuring and Monitoring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119SNMP Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

SNMP Configuration from Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . 119Setting Up SNMP Access to Nokia IP40 Security Platform . . . . . . . . . . . . . . . . 119Configuring the SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Configuring SNMP Parameters from the Command-Line Interface . . . . . . . . . . 121

Setting SNMP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Viewing SNMP Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

10 High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Virtual Router Redundancy Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Configuring VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Configuring VRRP with CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Dual Homing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Configuring Nokia IP40 Security Platform for Dual Homing

ISP Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126Configuring ISP Dial-Up Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Route Based VPN and BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127Border Gateway Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

Enabling BGP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Configuring the Local AS and Router-ID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Configuring Nokia IP40 Security Platform for BGP Route Advertisement. . . . 129Monitoring BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Viewing Debugging Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Adding a BGP Peer to Nokia IP40n Security Platform . . . . . . . . . . . . . . . . . . 130Clearing BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Creating Prefix Lists on Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . 130Creating Access- Lists on Nokia IP40 Security Platform. . . . . . . . . . . . . . . . . 131Creating Route Maps on Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . 131Configuring Routing Policies on Nokia IP40 Security Platform . . . . . . . . . . . . 131Configuring a Remote BGP Peer with MD5 Authentication . . . . . . . . . . . . . . 132Configuring a Local Loopback Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Configuring High-Availability Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Configuring Criteria for Path Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

High- Availability Solution with a Single Nokia IP40 Security Platform . . . . . . . . . 135High Availability Solution with Dual Nokia IP40 . . . . . . . . . . . . . . . . . . . . . . . . . . 136

8 Nokia IP40 Security Platform User’s Guide v1.1

Page 9: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

11 Configuring Nokia IP40 Through Out-of-Band Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137Configuring OOB from the Nokia IP40 Security Platform GUI . . . . . . . . . . . . . . . . 138Secure Shell and HTTPS Access Through Out-of-Band Dial-In . . . . . . . . . . . . . . 139Remote Configuration Mode in the Nokia IP40 Security Platform . . . . . . . . . . . . . 139

12 Configuring Device Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Host Name Configuration by Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Date and Time Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141System Logging Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

Setting the Syslog Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Managing Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Exporting the Nokia IP40 Security Platform Configuration . . . . . . . . . . . . . . . . . 144Importing the Nokia IP40 Security Platform Configuration . . . . . . . . . . . . . . . . . 145

Upgrading Firmware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Installing Your Product Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Dynamic DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

Configuring DDNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150Resetting Nokia IP40 Security Platform to Factory Defaults . . . . . . . . . . . . . . . . . 150

Resetting Nokia IP40 Security Platform to Factory Defaults by Using the Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

13 Viewing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153Viewing Reports on Nokia IP40 Security Platform . . . . . . . . . . . . . . . . . . . . . . . . . 153

Viewing the Event Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153Viewing Active Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154Viewing Active Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156Viewing VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Viewing the Diagnostics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

14 Working with VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161About VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161Setting Up Nokia IP40 as a VPN Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Configuring Remote Access VPNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

Configuring Site-to-Site VPN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166Completing Site Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169Deleting a VPN Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169Logging to a VPN Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

Logging on from the Nokia IP40 Security Platform GUI . . . . . . . . . . . . . . . . . . 171Logging On Through my.vpn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Nokia IP40 Security Platform User’s Guide v1.1 9

Page 10: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Logging Off a VPN Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Installing VPN Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

Installing VPN Certificates by Using CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175Installing VPN Certificates from SmartCenter . . . . . . . . . . . . . . . . . . . . . . . . . 175

Uninstalling the Certificate from your Nokia IP40 Security Platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

Downloading the Pre-compiled Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . 176Installing the Security Policy by Using GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

VPN Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178Nokia IP40 as VPN Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

SecuRemote to Nokia IP40 Satellite X (VPN Client to Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Setting Up Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Nokia IP40 as VPN Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180Setting Up the Nokia IP40 Tele 8 as VPN Client . . . . . . . . . . . . . . . . . . . . . . . . 180Adding VPN Sites by Using Nokia IP40 Tele 8 . . . . . . . . . . . . . . . . . . . . . . . . . 180

Nokia IP40 Site-to-Site VPNs support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184Adding VPN Sites by Using Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . 184

Nokia IP40 Tele to IP40 Satellite X(VPN Client to Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

Setting Up Nokia IP40 Tele 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Setting Up Nokia IP40 Satellite X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Nokia IP40 Tele 8 to Check Point FP1,FP2, FP3, NG, or NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Setting Up Nokia IP40 Tele 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Setting Up Check Point Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Nokia IP40 Tele 8 to Check Point NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Setting Up Nokia IP40 Tele 8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Setting Up Check Point NG AI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Nokia Satellite X to Nokia Satellite X

(VPN Gateway to Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187Setting Up Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

Nokia IP40 Satellite X in NAT and No-NAT Modes . . . . . . . . . . . . . . . . . . . . . . 188Unrestricted Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189NAT Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Defining a Backup VPN Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Nokia IP40 Satellite X to VPN-1 (Site-to-Site VPN) . . . . . . . . . . . . . . . . . . . . . . 190Setting Up Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Nokia IP40 Satellite X to Check Point FP3 or DAIP. . . . . . . . . . . . . . . . . . . . . . 191Setting Up Check Point FP3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191Setting Up Nokia IP40 Satellite X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Nokia IP40 Satellite X to Check Point SmartCenter FP3/NG AI . . . . . . . . . . . . 192Setting Up Check Point SmartCenter FP3/NG AI . . . . . . . . . . . . . . . . . . . . . . 192

10 Nokia IP40 Security Platform User’s Guide v1.1

Page 11: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Setting Up the Nokia IP40 Satellite Xfor VPN connection with SmartCenter FP3 . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Setting Up Check Point SmartCenter NG AI by UsingCertificates with Smart LSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Site-to-Site VPN with Windows 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194Site-to-Site VPN with Nokia CryptoCluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195Site-to-Site VPN with Cisco PIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195VPN Routing Between Two Nokia IP40 Security Platforms . . . . . . . . . . . . . . . . 196Mesh VPN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

15 Using Managed Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Starting Your Subscription Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Viewing Service Information from the Account Page . . . . . . . . . . . . . . . . . . . . . . . 201

Refreshing Your Service Center Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Configuring Your Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202Disconnecting From Your Service Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

Sofaware Security Management Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203Web Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

Selecting Categories to Block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205Virus Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

Enabling or Disabling Email Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206Selecting Protocols for Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207Temporarily Disabling Email Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

Automatic and Manual Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209Checking for Software Updates when Locally Managed. . . . . . . . . . . . . . . . . . . 209Checking for Software Updates When Remotely Managed . . . . . . . . . . . . . . . . 210

Managing with Nokia Horizon Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211Check Point SmartCenter LSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

16 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

Configuring Debugging Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Viewing Debugging Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214Viewing Firmware Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219Resetting the IP40 Security Platform to Factory Defaults . . . . . . . . . . . . . . . . . . 219

Failsafe Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220Upgrading Firmware in Failsafe Mode by Using Console . . . . . . . . . . . . . . . . . . . 220Upgrading Firmware from Failsafe Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

Running Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

Nokia IP40 Security Platform User’s Guide v1.1 11

Page 12: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

A Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223Technical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223Safety Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

B Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

C End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

D Compliance Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235Compliance Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236FCC Notice (US) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

12 Nokia IP40 Security Platform User’s Guide v1.1

Page 13: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

About This Guide

This guide provides information and procedures for how to install and configure the Nokia IP40 Security Platform. This guide provides information about the new features incorporated into the Nokia IP40. This version of Nokia IP40 uses the SofaWare VPN-1 Embedded NG. For a quick reference on how to configure features in Nokia IP40, see the Nokia IP40 Security Platform Quick Start Guide and Nokia IP40 Security Platform Online Help, part of the graphical user interface (GUI) in the appliance.Installation and maintenance should be performed by experienced technicians or Noki-approved service providers only.

This preface provides the following information:In This GuideConventions This Guide UsesRelated Documentation

In This GuideThis guide is organized into the following chapters and appendixes:

Chapter 1, “Introduction” provides the information you need to know before installing Nokia IP40 Security Platform.Chapter 2, “Installing Nokia IP40 Security Platform” explains how to install the device, lists operating system requirements, protocols and how to establish a network connection.Chapter 3, “Getting Started” explains how to start by using the IP40, and provides information on first-time login and connecting to the Internet.Chapter 4, “Accessing Nokia IP40 Security Platform” explains different methods of connecting to your IP40, and methods of configuring the device.Chapter 5, “Connecting to the Internet with Nokia IP40 Security Platform” explains how to configure your IP40 for connecting to the Internet, and viewing and managing your Internet connection.Chapter 6, “Managing Your Local Area Network,” explains how to configure the Nokia IP40 features.Chapter 7, “Setting Up the Nokia IP40 Security Platform Security Policy” explains methods to define the firewall level, configure virtual servers, and create firewall rules.

Nokia IP40 Security Platform User’s Guide v1.1 13

Page 14: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3

Chapter 8, “Configuring Network Access,” describes the network access procedures and usage of SSH and SSL.Chapter 9, “Configuring and Monitoring SNMP,” explains the procedure to configure Simple Network Management Protocol, set community strings, send and enable SNMP traps.Chapter 10, “High Availability,” explains the Virtual Router Redundancy Protocol and High Availability feature.Chapter 11, “Configuring Nokia IP40 Through Out-of-Band Management,” explains the method to configure the Nokia IP40 through Out of Band Management.Chapter 12, “Configuring Device Functions,” discusses how to configure device functions such as setting date and time, loading factory defaults and performing firmware upgrade.Chapter 13, “Viewing Reports,” explains how to view reports such as Event Log, Active Computers, Active Connections, and VPN Tunnels.Chapter 14, “Working with VPNs,” explains how to configure a VPN by using Nokia IP40.Chapter 15, “Using Managed Services” describes methods for enabling and using subscription services such as Web filtering, email antivirus, automatic and manual updates.Chapter 16, “Troubleshooting,”discusses typical problems users encounter and provides solutions to these problems.Appendix A, “Specifications,” describes the Nokia IP40 specifications.Appendix B, “Warranty,” contains the warranty details for the Nokia IP40 Security PlatformAppendix C, “End User License Agreement,” contains the End User License Agreement for Nokia IP40 Security Platform.Appendix D, “Compliance Information,” contains the compliance information of Nokia IP40.

Conventions This Guide UsesThe following sections describe the conventions this guide uses, including notices, text conventions, and command-line conventions.

Notices

WarningWarnings advise the user that bodily injury might occur because of a physical hazard.

CautionCautions indicate potential equipment damage, equipment malfunction, loss of performance, loss of data, or interruption of service.

14 Nokia IP40 Security Platform User’s Guide v1.1

Page 15: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Conventions This Guide Uses

NoteNotes provide information of special interest or recommendations.

Command-Line ConventionsThis section defines the elements of commands that are available in Nokia products. You might encounter one or more of the following elements on a command-line path.

Table 1 Command-Line Conventions

Convention Description

Command This required element is usually the product name or other short word that invokes the product or calls the compiler or preprocessor script for a compiled Nokia product. It might appear alone or precede one or more options. You must spell a command exactly as shown and use lowercase letters.

Italics Indicates a variable in a command that you must supply. For example:delete interface if_name

Supply an interface name in place of the variable. For example:delete interface nic1

Angle brackets < > Indicates arguments for which you must supply a value:retry-limit <1–100>

Supply a value. For example:retry-limit 60

Square brackets [ ] Indicates optional arguments.delete [slot slot_num]

For example:delete slot 3

Vertical bars, also called a pipe (|)

Separates alternative, mutually exclusive elements. framing <sonet | sdh>

To complete the command, supply the value. For example:framing sonet

orframing sdh

Nokia IP40 Security Platform User’s Guide v1.1 15

Page 16: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3

Text ConventionsTable 2 describes the text conventions this guide uses.

-flag A flag is usually an abbreviation for a function, menu, or option name, or for a compiler or preprocessor argument. You must enter a flag exactly as shown, including the preceding hyphen.

.ext A filename extension, such as .ext, might follow a variable that represents a filename. Type this extension exactly as shown, immediately after the name of the file. The extension might be optional in certain products.

( . , ; + * - / ) Punctuation and mathematical notations are literal symbols that you must enter exactly as shown.

' ' Single quotation marks are literal symbols that you must enter as shown.

Table 1 Command-Line Conventions (continued)

Convention Description

Table 2 Text Conventions

Convention Description

Monospace font Indicates command syntax, or represents computer or window output, for example:Log error 12453

Bold monospace font Indicates text you enter or type, for example:# configure nat

Key names Keys that you press simultaneously are linked by a plus sign (+):Press Ctrl + Alt + Del.

Menu commands Menu commands are separated by a greater than sign (>):Choose File > Open.

The words enter and type Enter indicates you type something and then press the Return or Enter key.Do not press the Return or Enter key when an instruction says type.

Italics • Emphasizes a point or denotes new terms at the place where they are defined in the text.

• Indicates an external book title reference.• Indicates a variable in a command: delete interface if_name

16 Nokia IP40 Security Platform User’s Guide v1.1

Page 17: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Related Documentation

Menu ItemsNokia IP40 menu items in procedures are separated by the greater than sign (>).For example, Start > Programs > Nokia > Security indicates that you first click Start, then choose the Programs menu command, then choose Nokia, and finally choose Security.

Related Documentation In addition to this guide, documentation for this product includes the following:

Nokia IP40 Security Platform Quick Start Guide Version 1.1— provides a description of the system features and an overview of how to get your appliance up and running.Nokia IP40 Security Platform CLI Reference Guide Version 1.1—provides a description of all IP40 commands that are used for managing the appliance.Nokia IP40 Security Platform Release Notes Version 1.1—provides important information you should know before you instal and configure the IP40 Security Platform.

Nokia IP40 Security Platform User’s Guide v1.1 17

Page 18: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3

18 Nokia IP40 Security Platform User’s Guide v1.1

Page 19: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

This chapter introduces the Nokia IP40 Security Platform. It includes the following topics:Nokia IP40 Security PlatformNokia IP40 Security Platform FeaturesNetwork RequirementsNokia IP40 Security Platform Front PanelNokia IP40 Security Platform Rear Panel

Nokia IP40 Security PlatformThe Nokia IP40 Security Platform provides dependable Internet access for the remote and branch offices of a distributed enterprise. Nokia IP40 supports features like dial-up connection, redundant WAN connection to headquarters, and dual homing with BGP to route return traffic securely, over VPN.The Nokia IP40 Security Platform can be integrated with an overall enterprise security policy for maximum security. The IP40 facilitates centralized management and automatic deployment with the security management architecture of Check Point, and Nokia Horizon Manager. The Nokia IP40 Security Platform is available with the following licenses:

Nokia IP40 Tele 8 Nokia IP40 Satellite 16Nokia IP40 Satellite 32 Nokia IP40 Satellite U (Unlimited)

All these versions of Nokia IP40 provide a Web-based interface that enables you to configure and manage the Nokia IP40.The Nokia IP40 Security Platform comes pre-installed with the license of your choice. You can upgrade the IP40 security platform to a more advanced configuration without replacing the hardware. For details about license upgrade, contact your local reseller.

Nokia IP40 Security Platform User’s Guide v1.1 19

Page 20: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

Nokia IP40 Tele 8Nokia IP40 Tele 8 is for home telecommuters and work extenders who also need VPN client access. The IP40 Tele 8 supports both firewall and VPN client capabilities over an eight-node network. The appliance supports VPN client capabilities for users to connect to the central office from their home with firewall protection, extending the enterprise network to the employees’ home offices.IP40 Tele 8 can act as a VPN server, which allows a single user to securely access resources protected by the appliance from home or while travelling.

NoteComputers that actually pass through the firewall are counted. Devices such as network printers connected in LAN that do not normally get connected to the Internet are not counted.

Nokia IP40 Satellite 16, Satellite 32, Satellite UnlimitedNokia IP40 Satellite 16, IP40 Satellite 32, and IP40 Satellite Unlimited provide full firewall, and VPN connectivity for remote and branch offices or independent, small, and medium enterprises with sixteen, thirty-two, and unlimited node networks, respectively. Using these solutions, remote and branch offices can securely exchange information between them with distributed enterprises and small and medium enterprises at a low price with excellent performance.

Nokia IP40 Security Platform Features The following section contains a summary of Nokia IP40 Security Platform features.

ConnectivityTable 3 Nokia IP40 Security Platform Connectivity give details about IP40 v1.1 connectivity.Table 3 Nokia IP40 Security Platform Connectivity

Feature Nokia IP40 Tele 8Nokia IP40 Satellite 16/32/Unlimited

LAN, WAN, DMZ, and control ports

(No DMZ support)

Unnumbered PPP

20 Nokia IP40 Security Platform User’s Guide v1.1

Page 21: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Security Platform

Users (nodes) 8 16, 32, unlimited

PPPoE client

PPTP client

DHCP client

DHCP server

Static IP

MAC cloning

Backup Internet connection, static NAT, static routes

Dial-up Internet connection

Routing support by using BGP

High availability for LAN

High availability for WAN

Table 3 Nokia IP40 Security Platform Connectivity

Feature Nokia IP40 Tele 8Nokia IP40 Satellite 16/32/Unlimited

Nokia IP40 Security Platform User’s Guide v1.1 21

Page 22: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

FirewallTable 4 Firewall Connectivity provides details about the IP40 Security Platform v1.1 firewall connectivity.Table 4 Firewall Connectivity

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Firewall Type Check Point Firewall-1 Embedded NG

Check Point Firewall-1 Embedded NG

Network Address Translation (NAT)

INSPECT policy rules

User defined rules

Three levels of Preset security policies

DoS protection

Anti-spoofing

Attack logging

Voice over IP (H.323) support

22 Nokia IP40 Security Platform User’s Guide v1.1

Page 23: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Security Platform

VPN ConnectivityTable 5 VPN Connectivity provides details about IP40 Security Platform v1.1 VPN connectivity.

Exposed host

DMZ network

Table 5 VPN Connectivity

Feature Nokia IP40 Tele8Nokia IP40 Satellite 16/32/Unlimited

IPSEC VPN remote access server

IPSEC VPN site-to-site gateway

IPSEC VPN remote access client

VPN pass through

Encryption AES/3DES/DES AES/3DES/DES

Authentication SHA1/MD5 SHA1/MD5

X.509 certificates

Table 4 Firewall Connectivity

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Nokia IP40 Security Platform User’s Guide v1.1 23

Page 24: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

SecuRemote server

RADIUS Client

DAIP with VPN certificates

Back up VPN gateways

SmartCenter Connector (SSC) NG AI support

Bypass NAT

Route all traffic

Route Based VPN and failover

Multiple PPP connections

Active tunnels

Table 5 VPN Connectivity

Feature Nokia IP40 Tele8Nokia IP40 Satellite 16/32/Unlimited

24 Nokia IP40 Security Platform User’s Guide v1.1

Page 25: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Security Platform

ManagementTable 6 Management provides details about the IP40 Security Platform v1.1 management:Table 6 Management

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Web-based management

Access to IP40 through OOB, SSH and SNMP

Telnet access

HTTPS access(local and remote)

Remote firmware upgrades

Nokia Horizon Manager support from v1.3.1 onwards

Multiple administrators

Nokia CLI shell

Nokia IP40 Security Platform User’s Guide v1.1 25

Page 26: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

Security ServicesTable 7 Security Services provides details about IP40 Security Platform v1.1 security services:

Management systems (Nokia Horizon Manager, Sofaware SMP, Check Point SmartCenter,Check Point Smart Update)

Check Point Smart LSMCheck Point Provider-1

Table 7 Security Services

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Firewall security updates

Software updates

Web filtering

Email antivirus protection

Dynamic DNS service (When managed by Sofaware Management Portal (SMP) and Nokia Horizon Manager (NHM).

Table 6 Management

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

26 Nokia IP40 Security Platform User’s Guide v1.1

Page 27: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Security Platform

Diagnostics and MaintenanceTable 8 Diagnostics and Maintenance provides details about IP40 v1.1 diagnostics and maintenance:

VPN management

Centralized logging

Customized security policy

Protocol support for TCP/IP, ICMP, GRE, ESP and UDP

Table 8 Diagnostics and Maintenance

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Configuration Import or Export

Firmware upgrade

Preset configuration

Known good configuration

Table 7 Security Services

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

Nokia IP40 Security Platform User’s Guide v1.1 27

Page 28: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

Nokia IP40 Security Platform Package ContentsThe Nokia IP40 Security Platform shipping box includes the following items:

Nokia IP40 Security PlatformA universal power supplyA country-specific power cord for universal power supplyAn Ethernet-crossover cable, labeled CrossoverAn RS-232 console (null modem) cableThe IP40 CD. The IP40 CD includes the following documents needed to set up and use the device:

Nokia IP40 Security Platform Quick Start Guide Nokia IP40 Security Platform User’s Guide Version 1.1 (this document)Nokia IP40 Security Platform Release Notes Version 1.1 (if needed)Translated Manuals (Spanish, Japanese, Chinese)Nokia IP40 Security Platform CLI Reference Guide Version 1.1A TFTP ServerReset tool (to reset the IP40 security platform to factory defaults)Adobe Acrobat Reader

Nokia IP40 Security Platform Quick Start Guide Version 1.1, printedNokia IP40 License Document, printed

You can run the CD on a Windows computer with a CD drive.

Network RequirementsTo set up the Nokia IP40 Security Platform to connect to the Internet, you need the following:

OOB management

Diagnostic tools (netstat, traceroute, arp, ping, WHOIS, nslookup, tcpdump)

Table 8 Diagnostics and Maintenance

Feature Nokia IP40 Tele 8Nokia IP40 Satellite (16/32/Unlimited)

28 Nokia IP40 Security Platform User’s Guide v1.1

Page 29: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Appliance Overview

A broadband Internet connection by cable or DSL modem with Ethernet interface (RJ-45) or a dial-up connection with a serial modem (V90 or ISDN T/A)10BaseT or 100BaseT Ethernet switch or hub (optional)10BaseT or 100BaseT network interface card installed on each computerTCP/IP network protocol installed on each computerCAT5 network cable with RJ-45 connectors for each computerInternet Explorer 5.0 or later, or Netscape Navigator 4.5 and later

NoteNokia recommends that you use either Microsoft Internet Explorer 5.5 or later, or Netscape Navigator 6.2 or later.

Appliance OverviewThe following sections provide an overview of Nokia IP40 Security Platform rear and front panels.

Nokia IP40 Security Platform Rear Panel All physical connections (network and power) to the IP40 are made through the rear panel.

Nokia IP40 Security Platform User’s Guide v1.1 29

Page 30: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

Figure 1 Rear panel of Nokia IP40

Table 9 explains the items on the rear panel of the Nokia IP40.

Table 9 Rear Panel of IP40

Label Description

Power A power jack used to supply power to the device.Connect the power adapter to this jack. The device connects to the power source.

AUX The auxiliary port or dial-in port is a 9-pin male connector. This port is used to dial in to IP40 through a modem when the IP40 is unreachable through other ports.

LAN Local area network. Ethernet port (RJ-45) used to connect computers or other network devices.

DMZ Demilitarized zone: Ethernet port (RJ-45) used to connect computers or other network devices. Similar to LAN port in operation.

WAN Wide area network:. An Ethernet port (RJ-45) used to connect your cable or xDSL modem.

30 Nokia IP40 Security Platform User’s Guide v1.1

Page 31: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Appliance Overview

NoteDo not use a sharp pin or thin piece of metal to press the Reset button.

Console The console port is a 9-pin male connector that can be connected to the serial (COM) port of your computer. You can then use the command-line interface (CLI) of the IP40 through a serial program such as HyperTerminal to communicate with the device.

Reset Used to reboot or reset the IP40 to its factory defaults. Use a large flat-tipped object, such as a thick paper clip, to press the reset button.Short press (one second): reboots the Nokia IP40 Security Platform.Long press (seven seconds): resets the IP40 to its factory defaults. This results in loss of all security services and passwords.Short press during boot up: boots the IP40 in special deployment mode. See “Resetting Nokia IP40 Security Platform to Factory Defaults by Using the Reset Button” on page 151.

Table 9 explains the items on the rear panel of the Nokia IP40.

Table 9 Rear Panel of IP40

Label Description

Nokia IP40 Security Platform User’s Guide v1.1 31

Page 32: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

1 Introduction

Nokia IP40 Security Platform Front PanelYou can monitor the IP40 operations by viewing the LEDs on the front panel.

Figure 2 Front Panel of Nokia IP40 Security platform.

The items on the front panel of the Nokia IP40 Security Platform are explained in Table 10 on page 32.

Table 10 Front Panel Nokia IP40

PWR Off: appliance not powered onGreen Solid: device is on

STAT Off: appliance offGreen solid: appliance passed hardware test and finished booting.Red solid: hardware errorAmber solid: bootingGreen blinking: appliance passed hardware and is fully booted.appliance is at its default state. First-time password is not set.Red blinking: software errorAmber blinking: appliance is performing a function such as setting factory defaults, loading firmware or loading an exported configuration.

LAN

DMZ

WAN

Off: no connectionGreen solid: interface connected and auto-negotiated at 10 MbpsAmber solid: interface connected and auto-negotiated at 100 MbpsAmber/Green blinking: traffic passing through the interface

32 Nokia IP40 Security Platform User’s Guide v1.1

Page 33: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

2 Installing Nokia IP40 Security Platform

This chapter describes how to set up and install the Nokia IP40 Security Platform in a networking environment. The chapter covers the following topics:

Before You Install Nokia IP40 Security PlatformSetting Up Nokia IP40 Security Platform with Microsoft Windows 98 or Millennium Operating SystemsSetting Up Nokia IP40 Security Platform With Microsoft Windows XP and 2000 Operating SystemsSetting Up Nokia IP40 Security Platform with an Apple ComputerConnecting Nokia IP40 Security Platform to the NetworkInstalling Your Network

Before You Install Nokia IP40 Security PlatformBefore you connect and set up the Nokia IP40 Security Platform, you must check the following:

Whether TCP/IP is installed on your computer.The TCP/IP settings of your computer, to ensure that it obtains its IP address automatically.

The following sections guide you through the TCP/IP setup and installation process.

Setting Up Nokia IP40 Security Platform with Microsoft Windows 98 or Millennium Operating Systems

If you are using Windows 98 or Windows Me, configure TCP/IP as follows.

To check for TCP/IP Installation1. Choose Start > Settings > Control Panel.

The Control Panel window appears.

Nokia IP40 Security Platform User’s Guide v1.1 33

Page 34: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

2. Double-click the Network icon.The Network window appears.

In the Network window, check if TCP/IP appears in the network components list and if it is already configured with the Ethernet card installed on your computer.If TCP/IP is already installed and configured on your computer, skip the following procedure about how to install TCP/IP.

34 Nokia IP40 Security Platform User’s Guide v1.1

Page 35: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Before You Install Nokia IP40 Security Platform

To install TCP/IP1. In the Network window, click Add.The Select Network Component Type window appears.

2. Choose Protocol and click Add.The Select Network Protocol window appears.

3. In the Select Network Protocol window, choose Microsoft in Manufacturers and TCP/IP in Network Protocols.

4. Click OK.If you are prompted for original Windows installation files, provide the installation CD and relevant path, D:\win98, D:\win95, and so on.

5. Restart your computer if prompted.If you are connecting the IP40 to an existing LAN, consult your network manager/system administrator for the correct configuration.

To make TCP/IP settings1. In the Network window, double-click the TCP/IP Service for the Ethernet card on your

computer (TCP/ IP > PCI Fast Ethernet DEC 21143 Based Adapter).The TCP/IP Properties window opens.

Nokia IP40 Security Platform User’s Guide v1.1 35

Page 36: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

2. Click the Gateway tab and remove any installed gateways.3. Click the DNS Configuration tab and click Disable DNS.

4. Click the IP Address tab, and click Obtain an IP address automatically.

36 Nokia IP40 Security Platform User’s Guide v1.1

Page 37: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Before You Install Nokia IP40 Security Platform

NoteNokia recommends that you use DHCP to assign IP addresses instead of assigning a static IP address to your computer. To assign a static IP address, click Specify an IP address and enter an IP address in the range of 192.168.10.129 to 254. Enter 255.255.255.0 as the Subnet Mask. Click OK to save the new settings.

5. Click Yes when the Do you want to restart your computer? message appears.Your computer must restart for the new settings to take effect.Your computer is now ready to access the IP40.

Setting Up Nokia IP40 Security Platform With Microsoft Windows XP and 2000 Operating Systems

Windows XP has an Internet connection firewall option. Nokia recommends that you disable the firewall option if you are using Nokia IP40.

To check for TCP/IP installation1. Choose Start > Settings > Control Panel (in Windows XP Start > Control Panel from.)

The Control Panel window appears.

Nokia IP40 Security Platform User’s Guide v1.1 37

Page 38: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

2. Double-click the Network and Dial-up Connections icon (in Windows XP double-click the Network Connections icon).The Network and Dial-up Connections window appears.

3. Right-click the Local Area Connection icon and select Properties from the drop-down list. The Local Area Connection Properties window appears.

38 Nokia IP40 Security Platform User’s Guide v1.1

Page 39: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Before You Install Nokia IP40 Security Platform

4. Check for TCP/IP in the Component list and whether it is configured with the Ethernet card installed on your computer.If TCP/IP does not appear in the Components list, install it as described in the section “To install TCP/IP” on page 35. If TCP/IP is already installed, skip the next section.

To install TCP/IP1. In the Local Area Connection Properties window, click Install. The Select Network

Component Type window appears.

Nokia IP40 Security Platform User’s Guide v1.1 39

Page 40: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

2. Choose Protocol and click Add.The Select Network Protocol window appears.

3. In the Select Network Protocol window, choose Internet Protocol (TCP/IP) and click OK to install the TCP/IP protocol on your computer.TCP/IP protocol is installed on your computer.

To make TCP/IP settings1. In the Local Area Connection Properties window, double-click Internet Protocol (TCP/IP)

and click Properties.The Internet Protocol (TCP/IP) Properties window opens.

40 Nokia IP40 Security Platform User’s Guide v1.1

Page 41: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Before You Install Nokia IP40 Security Platform

2. Click Obtain an IP address automatically.

NoteNokia recommends that you use DHCP to assign IP addresses instead of assigning a static IP address to your computer. To assign a static IP address, select Specify an IP address and enter an IP address in the range of 192.168.10.129 to 254. Enter 255.255.255.0 as the subnet mask. Click Ok to save the new settings.

3. Click Obtain DNS server address automatically.4. Click OK to save the new settings. Your computer is now ready to access your IP40.

Setting Up Nokia IP40 Security Platform with an Apple ComputerUse the following procedure to set up the TCP/IP protocol:

To make TCP/IP settings1. Choose Apple Menus > Control Panels > TCP/IP.

The TCP/IP Window appears.2. Select Ethernet from the Connect via drop-down list.3. Select Using DHCP Server from the Configure drop-down list.

4. Close the window and save the setup.

Nokia IP40 Security Platform User’s Guide v1.1 41

Page 42: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

2 Installing Nokia IP40 Security Platform

Connecting Nokia IP40 Security Platform to the NetworkThe following topology examples illustrate proper network cabling.

Figure 3 IP40 Topologies

Installing Your NetworkPlan your network and the location of the IP40, then install your network.

To install the network 1. Connect the LAN cable:

a. Connect one end of the Ethernet cable to the LAN port at the back of the appliance. b. Connect the other end of the Ethernet cable to the computer, hubs, or another network.

device.2. Connect the DMZ cable:

a. Connect one end of the Ethernet cable to the DMZ port at the back of the appliance. b. Connect the other end of the Ethernet cable to the computer, hubs, or another network

device.3. Connect the WAN cable:

a. Connect one end of the Ethernet cable to the WAN port at the back of the appliance.b. Connect the other end of the Ethernet cable to a cable modem, xDSL modem, or a

corporate network.4. Connect the power adapter to the power socket at the back of the appliance. 5. Plug in the AC power adapter to the electrical outlet.

42 Nokia IP40 Security Platform User’s Guide v1.1

Page 43: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

This chapter explains how to perform the basic configurations and settings you need, to start using your Nokia IP40 Security Platform.This chapter includes the following topics:

First-Time LoginConfiguring Nokia IP40 Security Platform for Internet ConnectionMaking Initial Nokia IP40 Security Platform SettingsLogging On to Nokia IP40 Security PlatformAccessing Nokia IP40 Securely

First-Time Login After you connect your IP40 Security Platform to your network as shown in section “Connecting Nokia IP40 Security Platform to the Network” on page 42, wait for the STAT LED to turn green.

To login for the first time1. Open your Web browser and enter http://my.firewall in the location text box.

The first time login window appears, prompting for a password.If you cannot access the GUI portal, see “Troubleshooting” on page 213 in this document.

NoteThe IP40 ships without a password defined. If you are logging in for the first time, you are prompted to define the password by entering it twice. If you already logged in before, enter the username and password you previously defined.

Nokia IP40 Security Platform User’s Guide v1.1 43

Page 44: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

2. Enter a password and re-enter the password to confirm.

NoteThe password must be between five to eleven alphanumeric characters. To change the password, click Setup on the main menu, and click Password.

Configuring Nokia IP40 Security Platform for Internet Connection

This section provides information about how to make the initial settings for your Nokia IP40 Security Platform by using the Setup wizard and connecting to the Internet.

44 Nokia IP40 Security Platform User’s Guide v1.1

Page 45: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Making Initial Nokia IP40 Security Platform Settings

To connect to the Internet from Nokia IP40 Security Platform1. After you set the administrator password, you are prompted to make the initial settings from

the Setup wizard.

The wizard guides you through making an Internet connection, setting the device time, registering for support services, and performing other basic configurations.

2. Click OK to continue.3. The Internet Connection Method dialog box appears.For more information about how to connect to the Internet, see “To connect to the Internet from Nokia IP40 Security Platform” on page 45.

Making Initial Nokia IP40 Security Platform SettingsWhen you exit the Internet Connection Method wizard, you are prompted to set the device time. This section provides the information about how to use the Setup wizard to set the device time, and to make the initial Nokia IP40 Security Platform settings.

Setting Nokia IP40 Security Platform TimeUse the following procedure to set the time of Nokia IP40 Security Platform.

Nokia IP40 Security Platform User’s Guide v1.1 45

Page 46: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

To set the IP40 Security Platform time1. When the IP40 Set Time wizard dialog box appears, click the appropriate setting, for the

time settings you want to make.

If you click the computer’s clock, the IP40 is automatically updated with the time settings of your computer.If you click Keep the current time, the IP40 retains its current time settings. No changes are made to the time settings.If you click Specify date and time, you can manually update the IP40 time settings.The Specify Date and Time dialog box appears.

2. Click Next to change your IP40 time settings:If you choose to use a time server by clicking on Use a Time Server, the Set Time Wizard dialog box appears:

46 Nokia IP40 Security Platform User’s Guide v1.1

Page 47: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Making Initial Nokia IP40 Security Platform Settings

3. Specify the IP addresses of the Primary and Secondary servers, to use as NTP time servers. Select your time zone from the Time Zone drop down list.

4. Click Next.The IP40 Set Time Wizard dialog box appears, indicating that time settings are changed successfully.

5. Click Finish to exit the Set Time wizard.

Registering with the Nokia Support SiteYou can register with the Nokia Support Site when you make your time settings.The IP40 Setup Wizard dialog box appears when you exit the Set Time wizard.

Nokia IP40 Security Platform User’s Guide v1.1 47

Page 48: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

Check the check box, and click Next.You are automatically taken to Nokia Support Web site:https://support.nokia.com/agreement/SOHOregister.shtml.Use the instructions on the Web site to complete the registration process and gain access to support Web resources and software updates.

Connecting to a Central Management ServerWhen you are registered for support, the Subscription Services window appears.

This window allows you to define the central management server that the IP40 connects to.The IP40 can connect to a central management server to allow central management of the firewall and VPN policies. Central management can also allow the IP40 to subscribe to additional services such as antivirus and URL filtering. The central server can be either a Check Point Smart Center, Smart Center Pro, or Sofaware Management Portal.

48 Nokia IP40 Security Platform User’s Guide v1.1

Page 49: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Making Initial Nokia IP40 Security Platform Settings

If your IP40 is centrally managed by any of these servers, check I wish to connect to a service center and enter the IP address of the central management server in the Specified IP text box, then click Next. You are then prompted to enter the authentication information that allows the IP40 to communicate with the management server where you previously defined the IP40 object.If your IP40 is not managed by a central management server, check I wish to connect to a service center, and click Next.For information connecting to service centers, see “Managing Large Scale Deployments of Nokia IP40” on page 62. For information about how to use subscription services, see “Using Managed Services” on page 197.

Logging On to Nokia IP40 Security PlatformWhen you exit from the Setup wizard, the IP40 Welcome screen appears. The following section shows how to log on subsequently.

To access the user interface of the Nokia IP40 Security Platform1. Open your Web browser, and enter http://my.firewall, in the address bar.2. Click Enter.

The Nokia IP40 initial login page appears.

3. Enter the password directly for the IP40 Tele 8 license.For the IP40 Satellite X licenses, enter the username and password. If you are logging on for the first time, use admin as the username.

Nokia IP40 Security Platform User’s Guide v1.1 49

Page 50: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

NoteThe default user name for all Nokia IP40 licenses is admin. For the IP40 Satellite X licenses, you can define additional users. These additional users have separate usernames and passwords. For the IP40 Tele 8 license, you can only log on with the username admin. However, you can change the password. The password in all cases should be five to eleven alphanumeric characters.

You need to define your password in two instances:At the initial loginWhen you reset the device to defaults

After the initial login, the Welcome window appears. The following is the sample Welcome window.

The Welcome window displays the product identity of your device (Tele 8 or Satellite X).

Accessing Nokia IP40 SecurelyYou can access the IP40 graphical user interface (GUI) through HTTPS either remotely or locally (from your internal network). For information about how to access through HTTPS from a remote location, see “Enabling HTTPS Web Access” on page 116.

NoteFirst configure HTTPS to access the IP40 GUI from a remote location.

50 Nokia IP40 Security Platform User’s Guide v1.1

Page 51: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Making Initial Nokia IP40 Security Platform Settings

To access the IP40 through HTTPS from the Internet1. To access the IP40 locally, enter https://my.firewall in the address bar of your browser (the

URL starts with https, not http).2. The IP40 welcome page appears.

To access the Nokia IP40 Security Platform from a remote location1. Enter https://<external IP address of IP40>:981 in the address bar of your browser.

NoteThe URL starts with https, not http.

If you are accessing the Nokia IP40 Security Platform for the first time, the security certificate in the IP40 is not yet known to the browser, so a security alert appears.

2. Click Yes to install the security certificate of the IP40 that you are trying to access. If you are using Internet Explorer 5.0 or later, do the following:a. Click View Certificate.

The Certificate information window appears, with the General tab displayed.b. Click Install Certificate.

The Certificate Import Wizard opens.c. Click Next.

The Certificate Store appears.Select Automatically select the Certificate Store based on the type of certificate.

d. Click Next.Completing the Certificate Import Wizard message appears.

e. Click Finish.The Root certificate Store message appears.

f. Click Yes.The certificate is installed.

Logging Off from Nokia IP40 Security PlatformLogging off terminates the Nokia IP40 Security Platform session. To connect to the IP40 again, enter the password.To log off from IP40, perform one of the following procedures:

If you are connected locally, click Logout.The Logout window appears.

Nokia IP40 Security Platform User’s Guide v1.1 51

Page 52: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

If you are connected through HTTPS, close the browser window. For information about connecting to your device through HTTPS, see “Understanding the Nokia IP40 Web GUI” on page 52.

Understanding the Nokia IP40 Web GUI When you log on to Nokia IP40 security platform by using HTTP or HTTPS, you can configure the device by using the following methods:

Quick Setup Wizard—configures the most common settings required for the IP40 to be up and running. The GUI automatically guides you through this wizard after your initial login.Advanced GUI—configures the various advanced features provided in the Nokia IP40.

For a configuration to take effect, click Submit.For a brief description of the main components of IP40 GUI, see the following sections.When you are familiar with these components, you are ready to make advanced configuration changes to the IP40 Security Platform.

52 Nokia IP40 Security Platform User’s Guide v1.1

Page 53: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Understanding the Nokia IP40 Web GUI

Using the Nokia IP40 Security Platform Web-based User InterfaceTable 11 Summary of the main components of the Nokia IP40 GUI

Graphical User Interface DetailsThis section provides details about Nokia IP40 v1.1 graphical user interface (GUI).

Figure 4 Main Components of the Nokia IP40 Security Platform GUI

NoteThe Tele 8 license of IP40 does not support all of the features mentioned in the table 12 below. For information on features supported by the Tele configuration, see “Nokia IP40 Security Platform Features” on page 20.

No. Component Description

1. Navigation bar Access various feature sets in the IP40 security platform.

2. Tab bar Access and configure all features in the IP40 security platform.

3. Wizard Set up quickly the IP40 with the most common settings.

4. Status bar Status after a specific configuration.

5. Help Online help to assist you in configuring the IP40.

Nokia IP40 Security Platform User’s Guide v1.1 53

Page 54: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

Table 12 gives the name and functionality of each element in the Nokia IP40 GUI.Table 12 Names and Functions of the Nokia IP40 GUI Elements

Main Tab Secondary Tabs Description

Welcome Displays Welcome and configuration information.

Reports Event Log Displays the last 100 events in four different categories: Blue, Red, Orange, and Green.

Active Computers Allows you to view computers on your network.

Active Connections

Allows you to view current connections between your network and the external world.

VPN Tunnels Displays a list of established VPN tunnels.

Security Firewall Allows you to control firewall security level.

Servers Allows you to selectively allow incoming traffic from known applications and Internet services.

Rules Allows you to customize your security policy.

Exposed Host Allows you to define a Demilitarized Zone, i.e. a computer not protected by firewall.

Services Account Provides information on services available in your service plan, and allows you to manage security services.

Network Internet Displays information on network setup and activity.

My Network Allows you to configure network settings.

Modem Allows you to specify your modem type, dial mode, and port speed.

Static NAT Allows you to specify a NAT address for a given IP address.

Static Routes Allows you to specify individual computers that can connect to the IP40.

Setup Firmware Displays current firmware version and details

Logging Enables you to specify syslog server and syslog port.

Management Allows you to specify the protocols and accessing information for the IP40.

54 Nokia IP40 Security Platform User’s Guide v1.1

Page 55: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Understanding the Nokia IP40 Web GUI

Tools Comprises several tools to effectively manage your IP40.

Users Internal Users Allows you to view, add, edit, and delete list of IP40 users.

RADIUS Allows you to change your RADIUS settings.

VPN VPN Server Allows you to enable or disable a VPN server.

VPN Sites Allows you to view and edit a list of the configured VPN sites.

VPN Login Enables you to manually log in to a VPN site.

Certificate Allows you to control certificates for site-to-site VPN usage.

Help Online Help.

Logout Logs you out of the IP40.

Table 12 Names and Functions of the Nokia IP40 GUI Elements

Main Tab Secondary Tabs Description

Nokia IP40 Security Platform User’s Guide v1.1 55

Page 56: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

3 Getting Started

Table 13 “Status Bar” on page 56 provides information about the elements in Status Bar.Table 13 Status Bar

Field Description

Internet Your Internet connection status.You have different fields under Internet status. They are:Connected: your IP40 device is connected to the InternetNot Connected: your IP40 device is not connected to the InternetEstablishing Connection: your IP40 device is connecting to the Internet.Contacting Gateway: your IP40 device is trying to contact the Internet default gateway.Disabled: The Internet connection has been disabled, manually.You can configure both primary and secondary Internet connections. When both the connections are configured, the Status bar shows this status.

Service Center Displays your subscription services status.Your Service Center offer various subscription services like firewall services, and optional services such as Web filtering, and email antivirus.The service center status can be one of the following:Not Subscribed: you are not subscribe to security servicesConnection Failed: your IP40 device failed to connect to the service center.Connecting: your IP40 device is connecting to the service centerConnected: you are connected to the service center, and the security services are active.

56 Nokia IP40 Security Platform User’s Guide v1.1

Page 57: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Accessing Nokia IP40 Security Platform

This chapter discusses the methods for accessing and configuring the Nokia IP40 Security Platform. This chapter also provides an introduction to centrally managing large scale deployments of the IP40 by using Nokia Horizon Manager, SmartCenter Large Scale Manager, and Sofaware Security Management Portal.The main topics for this chapter include:

Connection MethodsConfiguration MethodsConnecting Nokia IP40 Security Platform to a Computer by Using the Console PortUsing Telnet to Connect to Nokia IP40 Security PlatformEnabling and Disabling Telnet Access to Nokia IP40Accessing Nokia IP40 with HTTP and HTTPSManaging Large Scale Deployments of Nokia IP40

Connection MethodsYou can connect to your Nokia IP40 Security Platform locally through LAN, WAN, DMZ, or console ports for Inband management. You can also connect from a remote location by using modem dial-in for out-of-band management (OOB).For information about how to use OOB to configure your device, see “Configuring Nokia IP40 Through Out-of-Band Management” on page 137.Typically the WAN port for your device is connected to your Internet service provider (ISP), while the LAN port is connected to your computer, or to a hub, if you are using IP40 between your computer network and the outside world. You can connect your computer to the console port of your IP40 to manage the device by using the command-line interface (CLI).

Nokia IP40 Security Platform User’s Guide v1.1 57

Page 58: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Accessing Nokia IP40 Security Platform

Configuration MethodsThe Nokia IP40 Security Platform supports the following configuration methods:

Command-line interface using console, Telnet, Secure Shell (SSH)Web user interface by using HTTP, and HTTPS.

Connecting Nokia IP40 Security Platform to a Computer by Using the Console Port

Your Nokia IP40 Security Platform has a console serial port. Connect the RS-232 cable (that is shipped along with the appliance) from the serial port of your computer to the console port of IP40. You can then manage the device by using a terminal emulation program such as Hyper Terminal.

To Connect to Nokia IP40 with HyperTerminal1. To start the HyperTerminal program, choose: Start > Programs > Accessories >

Communications > HyperTerminal.

The Connection Description window appears.

2. Assign a name for your connection, such as IP40 and click Ok3. Select the serial port that you will use: COM1 or COM2, and click Ok.4. When you select the serial port, the COM1 (or COM2) Properties window appears.

58 Nokia IP40 Security Platform User’s Guide v1.1

Page 59: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuration Methods

Select the following port settings:Bits per second: 9600Data bits: 8Parity: NoneStop bits: 1Flow control: None

5. Click Ok to continue.6. The login prompt is displayed by default.

Nokia IP40 Security Platform User’s Guide v1.1 59

Page 60: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Accessing Nokia IP40 Security Platform

The IP40 ships without a password defined. If you are logging in for the first time,you are prompted to define the password by entering it twice. If you logged in before, enter the username and password you previously defined.

For more information about CLI commands, see Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

Using Telnet to Connect to Nokia IP40 Security PlatformYou can access the command-line interface of your Nokia IP40 Security Platform through a Telnet session. Telnet access is disabled by default. You can allow Telnet access from the LAN, and WAN by configuring separate user rules. (No LAN or WAN access is available until it is configured)

NoteBefore you start Telnet, ensure that the Telnet program is installed on your computer, and that you can access your IP40 by using Telnet. The method for starting Telnet differs between operating systems. You can use the method given here to start a Telnet session from Windows 2000.

To connect to your IP40 Security Platform by using Telnet1. Choose Start > Run2. In the command window that appears, type telnet followed by the IP address of your IP40

security platform.If your device IP address is 192.168.10.1, the run window appears as follows:

3. Click OK.The Telnet command window appears with a login prompt.

60 Nokia IP40 Security Platform User’s Guide v1.1

Page 61: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuration Methods

4. Enter your username and password.You can now, manage your IP40 Security Platform by using simple commands.

5. Press the tab key to view a list of useful, simple commands to start managing your IP40. For more information, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Enabling and Disabling Telnet Access to Nokia IP40Telnet access is disabled by default in Nokia IP40 Security Platform.Use the following command from the IP40 CLI to enable Telnet access to the device:

set acl service telnet enable

Use the following command from the IP40 CLI to disable Telnet:

set acl service telnet disable

This command disables Telnet access from the WAN, LAN, and DMZ ports.

Nokia IP40 Security Platform User’s Guide v1.1 61

Page 62: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Accessing Nokia IP40 Security Platform

Using Secure Shell to Connect to Nokia IP40 Security PlatformYou can use Secure Shell (SSH) to access your IP40 Security Platform, securely. SSH is an application protocol and software suite that allows secure network services over an insecure network such as the Internet.

NoteBy default, SSH access is allowed from LAN, and DMZ.

To access your Nokia IP40 Security Platform with SSH1. Install an SSH client that allows you to make SSH connections to your IP40.2. Provide the following information to connect to the device:

a. IP Address of the deviceb. usernamec. Authentication method, whether Password or Public Key

For more information about SSH, see “Configuring Network Access” on page 105.

Accessing Nokia IP40 with HTTP and HTTPSYou can access and manage your IP40 through a user-friendly GUI. For more information, see Logging On to Nokia IP40 Security Platform on page 49.

Managing Large Scale Deployments of Nokia IP40You can centrally manage Nokia IP40 Security Platform by using the following applications:

Nokia Horizon ManagerCheck Point SmartCenter LSM Sofaware Management Portal

These centralized management applications allow you to manage large-scale deployments.For an overview of how to manage your device by using these systems, see “Using Managed Services” on page 197.

62 Nokia IP40 Security Platform User’s Guide v1.1

Page 63: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Managing Large Scale Deployments of Nokia IP40

Deploying Nokia IP40 Security Platform with Nokia Horizon Manager

You can manage Nokia IP40 Security Platform by using Nokia Horizon Manager. Nokia Horizon Manager is a software application designed to manage, and configure a large number of Nokia IP Security Platforms (devices) that reside on a corporate enterprise, managed service provider (MSP), or hosted applications service provider network (ASP). You can use Nokia Horizon Manager to perform software inventory, configuration, and image management operations.

NoteYou can manage the IP40 Security Platform by using Nokia Horizon Manager v1.3.1 and later.

Deploying Nokia IP40 Security Platform with Check Point SmartCenter Large Scale Manager

The Check Point SmartCenter Large Scale Manager (LSM) allows you to manage many Check Point Remote Office/Branch Office (ROBO) gateways from a single SmartCenter Server. For additional information on installing and configuring LSM, see Check Point SmartCenter LSM documentation.

Deploying Nokia IP40 with Sofaware Management PortalThe SofaWare Management Center (SMC) is a Web-based application for managing and configuring the SofaWare Security Management Portal (SMP). The SofaWare managed security platform enables centralized management of a large number of firewalls embedded in residential broadband access devices or gateways.You can use the Sofaware SMP for both policy and configuration management.

NoteConfigure the management servers by using Sofaware Management Center before you can use subscription services such as Web filtering, email antivirus, and software updates by Nokia IP40.

Using the Software Management Center, you can:Update security policies and user interface files.Configure and fine-tune Sofaware management services like Web filtering, email antivirus, and software updates.

Nokia IP40 Security Platform User’s Guide v1.1 63

Page 64: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

4 Accessing Nokia IP40 Security Platform

64 Nokia IP40 Security Platform User’s Guide v1.1

Page 65: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

This chapter explains how to configure the Internet connection by using Nokia IP40 Security Platform. When the Internet connection is configured, you can access the Internet securely, through IP40.This chapter includes the following topics:

Using the Setup WizardManually Configuring the Internet SettingEnabling or Disabling the Internet ConnectionUsing Quick Internet Connect or DisconnectConfiguring a Backup Internet Connection

Configuring Internet ConnectionYou can configure your Internet connection by using one of the following setup tools:

Setup Wizard—guides you through the configuration process, step by step.Advanced Setup—offers advanced setup options.

NoteYou must configure the Internet connection on initial operation, and reset to defaults operations.

Using the Setup WizardYou can use the Setup Wizard to configure the Internet connection for Nokia IP40 Security Platform through graphical user interface (GUI). The Setup Wizard guides you through the configuration process, step by step.You can connect to the Internet by the following broadband connection methods:

Direct local area network (LAN) connectionCable modem

Nokia IP40 Security Platform User’s Guide v1.1 65

Page 66: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

PPTP or PPPoE dialerDial-up Internet access by using V90 or ISDN T/A modems

To configure the Internet connection by using the Setup wizard1. Click Network from the main menu.

The Internet page appears.

2. Click Setup Wizard at the bottom of the window.The Setup Wizard window appears.

3. Click Next to proceed.The Internet Connection Method window appears.

66 Nokia IP40 Security Platform User’s Guide v1.1

Page 67: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Internet Connection

You can choose between the following modes of broadband connection:Direct Local area network (LAN) connectionCable modemPPTP or PPPoE dialer

4. Select the Internet connection method to connect to the Internet, and click Next.

NoteIf you select PPTP or PPPoE dialer, do not use dial-up software to connect to the Internet. The IP40 does the PPPoE negotiation.

To use a direct LAN connectionTo use a direct LAN connection to connect to the Internet:1. Select Direct LAN from the list of Internet connection methods and click Next tab.

A Connecting message appears followed by a Connected message.When you are connected, the wizard prompts you to register your details and set up your subscription options, which vary from product to product. For information about configuring device time, registering with Nokia Support Center and subscribing to additional services with the Setup wizard, see Chapter 3, “Getting Started”

Nokia IP40 Security Platform User’s Guide v1.1 67

Page 68: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

2. Follow the instructions until the wizard is done, and then click Finish.You are now connected to the Internet through a direct LAN connection.

Cable Modem Connection SettingsIf you selected cable modem connection through the procedure “To configure the Internet connection by using the Setup wizard” on page 66, the Host Name window appears.

Enter the Host name and Mac Clone address if they are required by the ISP.

MAC Cloning Some ISPs require that you register any MAC addresses of the computer behind the cable modem before you establish an Internet connection.

68 Nokia IP40 Security Platform User’s Guide v1.1

Page 69: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Internet Connection

The Nokia IP40 takes the place of the computer behind the cable modem and you can use MAC cloning to enter the original computer MAC address without contacting the ISP to change that information.

To configure for cable modem connection1. Enter the Host name in the host name column.

This field is optional. It might be required by your ISP and if so the ISP provides it.2. Click Next tab.

The Confirmation message appears.3. Click Next tab.

The system attempts to connect to the Internet. At the end of the connection process the Connected message appears. When you are connected, the wizard prompts you to register your details and set up your subscription options, which vary from product to product.

4. Follow the instructions until the wizard is done, and then click Finish.

Cloning a MAC AddressA MAC address is a 12-digit identifier assigned to every network device. If your ISP restricts connections to specific, recognized MAC addresses, you must clone a MAC address.

To clone a MAC address1. Click the Network tab in the main window, and click the Internet tab.

The Internet page appears.2. Click the Edit tab next to the Cloned MAC Address field.

The MAC cloning page appears.

Nokia IP40 Security Platform User’s Guide v1.1 69

Page 70: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

3. Do one of the following:a. Click This Computer to automatically clone the MAC address of your computer to the

IP40.or

b. If the ISP requires authentication by using the MAC address of a different computer, enter the MAC address in the MAC cloning field.

4. Click Apply tab.5. Click Back tab.

The Internet page reappears with the MAC address of your computer displayed.

DSL Connection SettingsSelect PPTP or PPPoE connection method. The DSL Connection Type wizard window appears.

70 Nokia IP40 Security Platform User’s Guide v1.1

Page 71: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Internet Connection

To connect using DSL connection1. Select the connection method that your DSL provider uses. 2. Click Next.

NoteMost DSL providers use PPPoE. If you are uncertain about which connection method to use, contact your DSL provider.

To connect by using a PPPoE connection Select PPPoE. The PPPoE Configuration window appears.

1. In the PPPoE dialog box, enter the following:a. Your Username, and Password and confirm the Password.b. The service name. (this is optional).

2. Click Next.The system attempts to connect to the Internet through the DSL connection. At the end of the connection process, the Connected message appears. Once connected, the wizard prompts you to register your details and set up your subscription options, which vary from product to product.

3. Follow the instructions until the wizard is finished, and then click Finish.

To connect by using the PPTP connection methodSelect PPTP in the . The PPTP configuration window appears.

Nokia IP40 Security Platform User’s Guide v1.1 71

Page 72: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

1. Enter the following information:Username and Password, and confirm the password.Service name.IP address of the DSL modem in the Server IP field.Internal IP address (The IP address required to access the DSL modem).Subnet mask of the DSL modem.

2. Click Next. The Connecting message appears while the system attempts to connect to the Internet through the DSL connection. At the end of the connection process, the Connected message appears.

NoteIf you enabled automatic DHCP, no further settings are required. The Confirmation message appears.

To connect by using the automatic DHCP method1. In the DSL Connection type window, select Automatic DHCP.2. Click Next.

The system attempts to connect to the Internet through the selected connection. The Connecting message appears. At the end of the connection process, the Connected message appears.When you are connected, the wizard prompts you to register your details, install the product key, and set up your subscription options, which can vary from product to product.

3. Follow the instructions until the wizard is done, and then click Finish.

72 Nokia IP40 Security Platform User’s Guide v1.1

Page 73: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Manually Configuring the Internet Setting

Manually Configuring the Internet SettingYou can configure the Internet settings for your IP40 manually also.

To configure the Internet connection1. Proceed as per steps 1 and 2 in “Using the Setup Wizard” on page 65 to connect using

DHCP, PPTP and PPPoE 2. Click Cancel on the Internet Setup wizard window.

The Welcome page appears.

3. Click Setup in the main menu, and click Network.The Internet page appears.

4. Click Edit against Primary.The Internet Setup Page with a list of connection type options appears.

Nokia IP40 Security Platform User’s Guide v1.1 73

Page 74: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

5. From the Connection Type list, select the Internet connection you want to use.The display changes according to the connection type you select. Perform the following procedures in accordance with the connection type you choose.

To use a direct LAN connectionThe following steps gives details about the LAN conection.1. Select LAN connection from the procedure “Manually Configuring the Internet Setting” on

page 73, the following sceen appears:

2. Enter the Host name. This field is optional. If a service center requires it, the Host Name is provided by them.

3. Enter the maximum transmission unit (MTU-1500)4. If you do not want the IP40 to obtain an IP address automatically by using DHCP, do the

following: a. Uncheck the Obtain IP address automatically (using DHCP) check box.b. Enter the IP address that your service provider provides.c. Select the from the pull-down list subnet mask that applies to the IP address you entered.d. Enter the IP address of the default gateway of your service provider.e. Enter the preferred DNS server (primary) IP address.f. Enter the alternate DNS server (secondary) IP address.

5. To assign an IP address automatically by using DHCP, but not configure DNS servers automatically, do the following: a. Uncheck the Obtain DNS Servers automatically check box.b. Enter the preferred DNS server IP address.c. Enter the alternative DNS server IP address.

6. Click Apply.

74 Nokia IP40 Security Platform User’s Guide v1.1

Page 75: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Manually Configuring the Internet Setting

To use a cable modem connection1. Select Cable Modem type Internet connection in procedure as described in “Manually

Configuring the Internet Setting” on page 73.The following window appears:

2. Enter the Host name.This field is optional: some ISPs might require it, and they provide the host name.

3. Click Apply.

To use a PPPoE connectionIf you choose PPPoE type Internet connection in procedure as described in “Manually Configuring the Internet Setting” on page 73, the following window appears:

1. Enter the following information:Enter your Username and Password and confirm the Password.

Nokia IP40 Security Platform User’s Guide v1.1 75

Page 76: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

Enter the service name as given by your service center

NoteIf your service center did not provide you with a service name, leave this text box empty.

You can set the maximum transmission unit size (MTU). Nokia recommends that you leave this field empty. However, to modify the default MTU, consult with your service provider.

2. If you are not using automatic configuration of DNS servers, do the following: Uncheck the Obtain Domain Name Servers automatically check box

The following window appears.

Enter the Preferred (primary) DNS server IP address.Enter the Alternate (secondary) DNS server IP address.

3. Click Apply.

To use a PPTP connectionIf you choose PPTP Internet connection in procedure as described in “Manually Configuring the Internet Setting” on page 73, the following window appears:

76 Nokia IP40 Security Platform User’s Guide v1.1

Page 77: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Direct Dial-Up PPP

1. Enter the following information:a. Your username and password, and confirm the password.b. The service name as given by your service provider.c. The IP address of the PPTP server as given by your service provider.d. The IP address of the PPTP client as given by your service provider.e. Select the PPTP client subnet as given by your service provider.You can configure the MTU size. Nokia recommends that you leave this field empty. Consult your service provider to modify the default MTU.

2. If you are not using automatic configuration of DNS servers, do the following: a. Clear the Obtain DNS servers automatically check box.The Internet page with DNS server options appears.b. Enter the Preferred (primary) DNS server IP address.c. Enter the Alternate (secondary) DNS server IP address.

3. Click Apply.

Direct Dial-Up PPP You can connect the Nokia IP40 Security Platform to the Internet by using a dial-up connection. The device can establish a PPP connection to an ISP by using an external modem connected to an auxiliary port. The modem can be an analog modem or an ISDN terminal adapter. You can use the following modems:

Analog modem 56 Kbps (DTE speed: up to 115200)ISDN TA (using PPP) 64 Kbps (DTE speed: up to 230400)ISDN TA (using MLPPP) 128 Kbps (DTE speed : up to 460800)

Nokia IP40 Security Platform User’s Guide v1.1 77

Page 78: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

Configuring Dial-Up with the GUIThe following sections give details about how to configure dial-up and direct dial-up connections on the Nokia IP40 Security Platform:

Dial-up—when enabled, the WAN connection is established only when interesting traffic enters the network.

NoteAny traffic that goes to the Internet through LAN is called interesting traffic.

Direct dial-up—when enabled, the WAN connection is established regardless of whether or not any interesting traffic is present in the network.You can configure dial-up and direct dial-up by using the following procedure.

NoteYou must use the CLI to configure the dial-up parameters (number, username, password, and so on) before you can connect to dial-up.

To configure dial-up or direct dial-up 1. Click Network on the main menu.

The Internet page appears.

2. Click Edit next to the Primary Internet connection to set dial-up or dial-up direct mode.The following window appears.

78 Nokia IP40 Security Platform User’s Guide v1.1

Page 79: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Direct Dial-Up PPP

3. Select Dialup from the drop-down list.

NoteTo configure direct dialup, select Dialup direct from the drop-down list, and click Apply.

4. Click Apply.Dialup is configured.

Configuring Dial-Up with the CLITo configure the dial-up by using the command line interface, log in through the console port.Use the following command to configure the dialup profile:

set dialup profile <value:1-10>For more information about dial-up commands, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1

CLI WizardUse the following command to configure dial-up by using the CLI wizard:

wizard dialup

For more information about how to use other dialup commands, see the Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

Nokia IP40 Security Platform User’s Guide v1.1 79

Page 80: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

Multiple Dial-up Profiles The Nokia IP40 Security Platform supports 10 dial-up profiles. A Round-robin mechanism is used to choose the profiles for connecting to the Internet. By default, the first dial-up profile is used. On failure of the first dial-up, the device attempts to use the successive profiles for successful Internet connection.Either dial-up or an out-of-band management (OOB) instance alone can exist on the device at any given time.

NoteYou can configure Ten dial-up profiles. Only one profile will be active at a time. You cannot configure dial-up for both primary and secondary Internet connections.

Enabling or Disabling the Internet ConnectionYou can enable or disable the Internet connection by using this feature.

To enable or disable the Internet connection1. Click Network in the main menu and click the Internet tab.

The Internet page appears.2. Next to the Internet connection, do one of the following:

a. To enable the connection, click the adjacent sign (x) mark The button changes to a check mark, and the connection is enabled.

b. To disable the connection, click the adjacent check mark.The button changes to sign (x) mark, and the connection is disabled.

Using Quick Internet Connect or DisconnectBy using connect or disconnect (depending on the connection status) on the Internet page, you can establish a quick Internet connection by using the currently selected connection type. In the same manner, you can terminate the active connection.The Internet connection retains its connected or not connected status until Nokia IP40 is rebooted. The IP40 then connects to the Internet if the connection is enabled. For information on how to enable the Internet connection, see the section on “Enabling or Disabling the Internet Connection” on page 80.

80 Nokia IP40 Security Platform User’s Guide v1.1

Page 81: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Using Quick Internet Connect or Disconnect

Configuring a Backup Internet Connection You can configure both a primary and a secondary Internet connection for Nokia IP40 security platform. The secondary connection acts as a backup, so that even if the primary connection fails, the IP40 remains connected to the Internet.You can configure different DNS servers for the two connections. The IP40 device acts as a DNS relay and routes requests from computers within the network to the appropriate DNS server for the active Internet connection.The two connections can be of different types. But they both cannot be LAN, and DHCP connections.

To set up backup Internet connection1. Click Networks on the main menu, select Internet.2. Click Edit next to Primary, and Secondary connection types to configure a backup Internet

connection.For basic topology illustrations, see “Connecting Nokia IP40 Security Platform to the Network” on page 42

NoteTo physically connect multiple WAN devices to the IP40, you must have a switch, connected to the WAN port.

NoteDo not connect to a DMZ port.

Viewing Internet InformationTo view the status, duration, and activity information on your Internet connections,1. Click Network in the main menu, and click the Internet tab.

The Internet page appears.

Table 14 displays the Internet connection information.

Nokia IP40 Security Platform User’s Guide v1.1 81

Page 82: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

5 Connecting to the Internet with Nokia IP40 Security Platform

Table 14 Internet Connection Information

Field Description

Status Indicates the connection status.

Duration Indicates the connection duration, if active. The duration is given in the format hh:mm:ss, where: hh = hoursmm = minutesss = seconds

IP Address Your IP address

Enabled Indicates whether or not the connection is enabled.

WAN MAC Address

MAC address of IP40.

Cloned MAC Address

Cloned MAC address.

Received packets

Number of data packets received in the active connection.

Sent Packets Number of data packets sent in the active connection.

82 Nokia IP40 Security Platform User’s Guide v1.1

Page 83: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

This chapter explains the step-by-step information required to manage your local area network by using the Nokia IP40 security platform.You can manage and configure your network connection and settings, and view the connections information on the connection in terms of status, connection duration, and activity. This chapter includes the following topics:

Configuring Network SettingsEnabling and Disabling the DHCP ServerChanging IP AddressesEnabling or Disabling Hide NATConfiguring a DMZ NetworkUsing Static NATUsing Static Routes

Configuring Network Settings

CautionNetwork settings are advanced settings. Nokia recommends that these settings not be changed unless it is necessary and you are qualified to do so. Changing network settings might result in losing the connection to the device.

If you change the network settings to incorrect values, and you are unable to correct the error, reset the IP40 to its factory settings. To reset the Nokia IP40 Security Platform to its factory default settings, choose Setup > Firmware > Tools > Factory Settings. You can also press the Reset button at the rear panel of the device.

NoteTo set the device to factory defaults by using the Reset button, press the Reset button for a minimum of seven seconds.

Nokia IP40 Security Platform User’s Guide v1.1 83

Page 84: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

Enabling and Disabling the DHCP ServerNokia IP40 Security Platform has a built-in Dynamic Host Configuration Protocol (DHCP) server that is enabled by default. This allows the IP40 to configure all the devices on your network automatically. If you have another DHCP server configured in your network, you must disable the DHCP server in your IP40 before you connect the IP40 to the network.

To enable or disable the DHCP server1. Click Network in the main menu, and then choose My Network.

The My Network page appears.

2. In the DHCP Servers drop-down list, select Enabled or Disabled.3. Click Apply.4. If you do not have another DHCP server in your network, and your computers were

originally configured differently, do the following:Reconfigure all of the computers on your network.Use DHCP to disable the Obtain IP address automatically setting in the TCP/IP settings.

Changing IP AddressesYou can change the IP address of your Nokia IP40 Security Platform. You can also change the entire range of IP addresses in your network by using the IP40 Satellite X licenses. You might want to do this if, for example, you are adding the IP40 to a large existing network and do not want the network IP address range to change, or if you are using a DHCP server other than the IP40, that assigns addresses within a different range.

84 Nokia IP40 Security Platform User’s Guide v1.1

Page 85: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Network Settings

If you change the IP address of your IP40, you might have to manually change the network interface TCP/IP setting when you use static IP, or renew the DHCP lease when you use dynamic IP.

To change the IP addresses in your network1. Click Network on the main menu, and choose My Network.2. Enter new values in the Internal Network Range fields.3. To reset the network to its default settings, with the DHCP server enabled and the internal

network range is 192.168.10.1, click Default.4. Click Apply.The following things happen:

If you changed the internal network range to X.X.X.X, the IP address of the IP40 is changed to X.X.X.1If you chose to reset the network to its default settings, the settings are reset.

5. Do one of the following:If your computer is configured to obtain its IP address automatically (by using DHCP), and the DHCP server in your IP40 is enabled, restart your computer. Your computer obtains an IP address in the new range.Otherwise, manually reconfigure your computer to use the new address range by using the TCP/IP settings.

Enabling or Disabling Hide NATNetwork Address Translation (NAT) enables you to share a single IP address among several computers.

NoteNAT is enabled by default. NAT can only be disabled in IP40 Satellite X licenses. If NAT is disabled, you need to buy an IP address range.

To enable NAT1. Click Network on the main menu, and choose My Network.

The My Network page appears.2. Select Enabled or Disabled.3. Click Apply.

A warning message appears.If you select Enabled, NAT is enabled.If you select Disabled, NAT is disabled.

Nokia IP40 Security Platform User’s Guide v1.1 85

Page 86: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

Configuring a DMZ NetworkIn addition to the LAN network, Nokia IP40 Security Platform allows you to define a second internal network called a demilitarized zone (DMZ). By default, all traffic is allowed from the LAN network to the DMZ network, and no traffic is allowed from the DMZ network to the LAN network. You can customize this behavior by creating firewall user rules.For example, you can assign your company accounting department to the LAN network and the rest of the company to the DMZ network. The accounting department would be able to connect to all company computers, while the rest of the employees cannot access any sensitive information on the accounting department computers. You can then create firewall rules that allow specific DMZ computers (such as a manager’s computer) to connect to the LAN network and the accounting department.

NoteDHCP server is supported on a DMZ network.

To configure a DMZ networkDMZ configuration is not available for Tele 8 License.1. Connect the DMZ computer to the DMZ port. If you have more than one computer in the

DMZ network, connect a hub or switch to the DMZ port, and connect the DMZ computers to the hub.

2. Click Network in the main menu, and click My Network tab.The My Network page appears.

3. Go to the DMZ Network Settings area.4. If desired, enable or disable Hide NAT.5. In the IP40 DMZ IP text box, enter the IP address of the DMZ network default gateway.

NoteThe DMZ network must not overlap the LAN network.

6. In the DMZ Subnet Mask text box, type the DMZ internal network range7. To reset the network to its default settings, do the following:

a. Click Default.A confirmation message appears.

b. Click OK.The default settings are restored.

c. Click Apply.A warning message appears.

86 Nokia IP40 Security Platform User’s Guide v1.1

Page 87: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Using Static NAT

d. Click OK.A success message appears.

Using Static NATStatic NAT (or one-to-one NAT) allows the mapping of Internet IP addresses or address ranges to hosts inside the internal network.This mapping is useful if you want a computer in your private network to have its own Internet IP address. For example, if you have both an email server and a Web server in your network, you can map each server to a separate Internet IP address.Static NAT rules do not imply any security rules. To allow incoming traffic to a host for which you defined static NAT, you must create an Allow rule. When you specify firewall rules for such hosts, use the host internal IP address, and not the Internet IP address to which the internal IP address is mapped.

NoteYou can use static NAT and hide NAT together.

NoteIP40 supports Proxy Address Resolution Protocol (ARP). When an external source attempts to communicate with a computer that has static NAT enabled, the IP40 automatically replies to ARP queries with its own MAC address, thereby enabling communication. As a result, the static NAT Internet IP addresses appear to external sources to be real computers connected to the WAN interface.

Adding and Editing Static NAT MappingsThe following procedure explains how to add or edit static NAT mappings.

To add or edit a static NAT map1. Click Network in the main menu, and click the Static NAT tab.

The Static NAT page appears.

Nokia IP40 Security Platform User’s Guide v1.1 87

Page 88: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

2. Do one of the following:To add a new static NAT mapping, click the New tab.

The Static NAT wizard opens, with the Static NAT Mapping dialog box displayed.

3. Complete the fields using the information given in the Table 15 on page 904. Click Next

The Static NAT Mapping Updated dialog box appears.

88 Nokia IP40 Security Platform User’s Guide v1.1

Page 89: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Using Static NAT

5. Click Finish.If you added a new mapping, it appears in the static NAT page.To edit an existing static NAT mapping, click Edit tab.

Nokia IP40 Security Platform User’s Guide v1.1 89

Page 90: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

Table 15 Static NAT Fields

Viewing and Deleting Static NAT Mappings

The following procedures explain how to view and delete static NAT mappings.

To view static NAT mappings1. Click Network in the main menu.2. Click the Static NAT tab.

The Static NAT page appears with a list of existing static NAT mappings.

Field Action

Map this WAN IP Maps an Internet IP address to a local computer.You must then fill in the MAP this WAN IP and To this Internal IP fields.

MAP this WAN IP Type the desired Internet IP address.

To this Internal IP Type the IP address of the local computer, or click This Computer to specify your computer.

Map this WAN IP range

Maps a range of Internet IP addresses to a range of local computer IP addresses of the same size.You must then fill in the Map this WAN IP range and To this Internal IP range fields.

MAP this WAN IP range

Type the desired Internet IP address range.

To this Internal IP range

Type the range of local computer IP addresses.

90 Nokia IP40 Security Platform User’s Guide v1.1

Page 91: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Using Static Routes

To delete static NAT mappingTo delete a static NAT mapping, do the following:1. In the desired static NAT mapping row, click the Erase tab.

A confirmation message appears.2. Click Ok.

The mapping is deleted.

Using Static Routes

NoteYou usually do not need to specify static routes. Only define static routes if it is required.

A static route is a setting that explicitly specifies the route for packets destined for a certain subnet. Packets with a destination that does not match any defined static route is routed to the default gateway.The Static Routes page lists all existing routes, including the default, and indicates whether each route is currently connected, or reachable, or not reachable.

To add a static route1. Click Network in the main menu, and click the Static Routes tab.

The Static Routes page appears, with a listing of existing static routes.

Nokia IP40 Security Platform User’s Guide v1.1 91

Page 92: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

2. Click New Route.The Edit Route page appears.

3. Complete the fields by using the information given in Table 16 on page 92.4. Click Apply.

The new static route is saved.

Table 16 Edit Route Page Fields

Field Action

Destination Network

Type the network address of the destination network.

Subnet Mask Select the subnet mask.

92 Nokia IP40 Security Platform User’s Guide v1.1

Page 93: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

To edit a static route1. Click Network in the main menu, and click the Static Routes tab.

The Static Routes page appears, with a listing of existing static routes.2. To edit the route details, do the following:

a. Click New Route at the bottom of the window. The Edit Route page appears, displaying the destination network, subnet mask, and gateway IP of the selected route.b. Edit the fields by using the information inTable 16 on page 92.c. Click Apply.

The changes are saved.

To delete a static route1. Click Network in the main menu, and click the Static Routes tab.

The Static Routes page appears, with a listing of existing static routes.2. In the desired route row, click the Erase tab.

A confirmation message appears.3. Click OK.

The route is deleted.

Gateway IP Type the IP address of the gateway (next hop router) to which to route the packets destined for this network.

Metric Enter the metric value. Route with a lower metric value is preferred.

Table 16 Edit Route Page Fields

Field Action

Nokia IP40 Security Platform User’s Guide v1.1 93

Page 94: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

6 Managing Your Local Area Network

94 Nokia IP40 Security Platform User’s Guide v1.1

Page 95: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

This chapter describes how to set up the Nokia IP40 security policy. It includes the following topics:

Setting the Firewall Security LevelConfiguring Virtual ServersCreating Firewall RulesAllow and Block RulesDeleting RulesDefining an Exposed Host

Setting the Firewall Security LevelYou can define the firewall security level on the Firewall page. This level can be adjusted to three states:

Low-level security—enforces basic control on incoming connections, while permitting all outgoing connections.At this level, all inbound traffic is blocked to the external IP address except for ICMP echoes. All outbound connections are allowed.Medium -level security—enforces strict control on all incoming connections, while permitting safe outgoing connections.When this level is selected, all inbound traffic is blocked. All outbound traffic is allowed to the Internet except for windows file sharing.High level- security—enforces strict control on all incoming and outgoing connections.All inbound traffic is blocked. Restricts all outbound traffic except for the following:Web traffic (HTTP, HTTPS), email (IMAP, POP3, SMTP), FTP, news groups, Telnet, DNS, IPSEC IKE, and VPN traffic.

The default security level is medium. For information on customizing your security policy, see “Customizing Nokia IP40 Security Platform Security Policy” on page 98.

Nokia IP40 Security Platform User’s Guide v1.1 95

Page 96: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

To change the firewall security level1. Click Security on the main menu.

The Firewall page appears.

2. To set the security level, drag the slider or click on the security level that you want to select. The IP40 security level changes accordingly.

NoteYou might experience a temporary break in the service.

Configuring Virtual Servers

NoteIf you do not intend to host any public Internet servers (Web server, email server and so on) in your network, you can skip this section. Configuring servers allows you to create simple Allow and Forward rules for common services. This is equivalent to creating Firewall rules.

You can selectively allow incoming network connections into your network. For example, you can set up your own Web server, email server, Telnet server, or an FTP server.

To allow a service to be run on a host1. Click Security on the main menu.

The Firewall page appears.2. Click the Servers tab.

96 Nokia IP40 Security Platform User’s Guide v1.1

Page 97: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Virtual Servers

The Virtual Servers page appears, displaying a list of services and a host IP address for each allowed service.

3. In the Allow column, check the check box of the desired service or application. If you are using IP40 Satellite X, the appropriate check box in the VPN Only column is to be enabled.

4. To allow connections made through a VPN only, select the VPN Only check box.5. In the Host IP text box of the selected service or application, type the IP address of the

computer that runs the service (one of your network computers) or click This Computer to allow your computer to host the service.

6. Click Apply. A success message appears, and the selected computer is allowed to run the desired service or application.

To restrict access from external network1. Click Security on the main menu, and choose Servers.

The Virtual Servers page appears, displaying a list of services and a host IP address for each allowed service.

Table 17 Server Fields

Field Description

Allow Select the desired service or application.

VPN Only Select this option to allow only connections made through a VPN.

Host IP Type the IP address of the computer that will run the service (one of your network computers) or click the corresponding This Computer button to allow your computer to host the service.

Nokia IP40 Security Platform User’s Guide v1.1 97

Page 98: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

2. In the desired service or application row, click Clear. The Host IP text box of the desired service is cleared.

3. Click Apply. The service or application for the specific host is not allowed.

Customizing Nokia IP40 Security PlatformSecurity Policy

The following sections describe how to customize your security policy.

Creating Firewall RulesThe Nokia IP40 Security Platform checks the protocol used, the ports range, and destination IP address when deciding whether to allow or block traffic. By default, in the medium security level, the IP40 blocks all connection attempts from the Internet (WAN) to the LAN, and allows all outgoing connection attempts from the LAN to the Internet (WAN).

NoteUser defined rules have priority over default rules.

Allow and Block RulesThe Allow and Block rules provide you with greater flexibility in defining and customizing your security policy. You can allow additional inbound services that are not on the virtual servers list, or block outbound communications for specific port ranges and protocols. To permit incoming access from the Internet to your internal network for specific port ranges and protocols you must create a new Allow rule. To block outgoing access from your internal network to the Internet, for specific port ranges and protocols, create a new Block rule.

To create a new rule1. Click Security on the main menu.

The Firewall page appears.2. Click the Rules tab to add any rule.3. Click Add Rule on the Rules page to select the type of rule, to add.

98 Nokia IP40 Security Platform User’s Guide v1.1

Page 99: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Customizing Nokia IP40 Security Platform Security Policy

Depending on the button you select, the Allow and Forward rule, or the Allow Rules, or the Block Rules page appears.The following table gives more information about the firewall rules that you create.

Table 18 Firewall Rules

Rule Description Comments

Allow and Forward

This rules enables you to:• Permit incoming access from

the internet to a specific service in your internal network.

• Forward all such connections to a specific computer in your network.

Creating an Allow and Forward rule is equivalent to defining a server in the servers page.

Nokia IP40 Security Platform User’s Guide v1.1 99

Page 100: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

NoteIn IP40 Tele 8, the Allow Rules page does not contain a VPN Only column, and the Block Rules page does not contain an Also VPN column.

4. Complete the fields using the information in Table 19 on page 101.5. Click Next.

The Destination and Source dialog box appears.

Allow This rule enables you to:• Permit outgoing access from

your internal network to a specific service on the Internet.

• Permit incoming access from the Internet to a specific service in your internal network.

You can allow outgoing connections for services that are not permitted by the default security policy.

You cannot use an Allow rule to permit incoming traffic if the network or VPN uses hide NAT. You can use Allow rules for static NAT IP addresses.

Block This rule enables you to:• Block outgoing access from

your internal network to a specific service on the Internet.

• Block incoming access from the Internet to a specific service in your internal network.

Table 18 Firewall Rules

Rule Description Comments

100 Nokia IP40 Security Platform User’s Guide v1.1

Page 101: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Customizing Nokia IP40 Security Platform Security Policy

6. Complete the fields using information from the table belowThe Done dialog box appears.

7. Click Finish.The new rule appears in the Firewall Rules page.Table 19 on page 101 gives more information about the firewall rule fields.

Table 19 Firewall Rule Fields

Field Action

Any Service Specifies that the rule should apply to any service.

Standard Service

Specifies that the rule should apply to a specific standard service.You must then select the desired service from the drop-down list.

Nokia IP40 Security Platform User’s Guide v1.1 101

Page 102: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

Deleting RulesThis section provides information how to delete an existing rule.

To delete an existing rule1. Click Security on the main menu.

The Firewall page appears.2. Click the Rules tab, and click the Delete icon of the rule to delete.

A confirmation message appears.3. Click OK. The rule is deleted.

Defining an Exposed HostThe Nokia IP40 Security Platform allows you to define an exposed host, which is a computer that is not protected by the firewall. This allows unlimited incoming and outgoing connections between the Internet and the exposed host computer.

Custom Service

Specifies that the rule should apply to a specific nonstandard service.The Protocol and Port Range fields are enabled. You must fill them in.

Protocol Select the protocol (ESP, GRE, TCP, UDP or ANY) for which the rule should apply.

Ports To specify the port range to which the rule applies, type the start port number in the left text box, and the end port number in the right text box.

NoteIf you do not enter a port range, the rule applies to all ports. If you enter only one port number, the range includes only that port.

Source Select the source of the connections to allow or block.To specify an IP address, select Specified IP and type the desired IP address in the text box.

Destination Select the destination of the connections to allow or block.To specify an IP address, select Specified IP and type the desired IP address in the text box.

Table 19 Firewall Rule Fields

Field Action

102 Nokia IP40 Security Platform User’s Guide v1.1

Page 103: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Defining an Exposed Host

This process is useful for setting up a public server.

CautionEntering an IP address can make the designated computer vulnerable to external attacks. Nokia recommends that you not define an exposed host unless you are fully aware of the security risks.

To define a computer as an exposed hostThe exposed host receives all traffic that is not forwarded to another computer by using Allow and Forward rules.1. Click Security in the main menu, and click the Exposed Host tab.

The Exposed Host window appears.

2. In the Exposed Host text box, type the IP address of the computer to define as an exposed host. Alternatively, you can click This Computer to define your computer as the exposed host.

3. Click Apply.The selected computer is now defined as an exposed host.

Nokia IP40 Security Platform User’s Guide v1.1 103

Page 104: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

7 Setting Up the Nokia IP40 Security Platform Security Policy

104 Nokia IP40 Security Platform User’s Guide v1.1

Page 105: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

This chapter describes how to create and manage Nokia IP40 Security Platform users. Network Access Procedures, Secure Shell (SSH) and Secure Socket Layer (SSL) are also discussed in this chapter.The chapter includes the following sections:

Changing Your PasswordAdding UsersViewing and Editing UsersDeleting UsersSetting Up Remote VPN Access for UsersTelnet AccessSecure Socket LayerUsing RADIUS AuthenticationAccess Control

Changing Your PasswordYou can change the password of your Nokia IP40 Security Platform, any time. The method for changing password varies depending on the IP40 configuration you are using. The default username and password for Nokia IP40 Tele 8 Configuration is admin.You can change the password for this user.

To change the password for IP40 Tele 81. Click Password in the main menu.

The Password page appears.

Nokia IP40 Security Platform User’s Guide v1.1 105

Page 106: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

2. Edit the Password and Confirm password fields.

NoteUse five to twenty five alphanumeric characters for the new password.

3. Click Apply.Your changes are saved.In Nokia IP40 Satellite X, you can define multiple users and perform the following tasks:

Change your passwordAdd usersView and edit usersDelete usersSet up remote VPN access for users

To change the password for IP40 Satellite X1. Click Users in the main menu..

The Users page appears.2. In the username row, click Edit.

The Edit User page appears.3. Edit the Password and Confirm password fields.

106 Nokia IP40 Security Platform User’s Guide v1.1

Page 107: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

NoteUse five to twenty five alphanumeric characters for the new password.

4. Click Apply.Your changes are saved.

Adding UsersYou can add users with IP40 Satellite X only. The number of IP40 users you can add is limited according to your software.

To add a user1. Click Users on the main menu.

The Users page appears. 2. Click New User.

The Edit User page appears. The options that appear on the page depend on the software and services you are using.

3. Complete the fields by using the information in Table 20 on page 108.4. Click Apply.The new user is saved. The Edit User page appears.

Nokia IP40 Security Platform User’s Guide v1.1 107

Page 108: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

Viewing and Editing UsersYou can view and edit users with IP40 Satellite X only.

To view or edit users1. Click Users on the main menu.

The Users page appears. 2. Click Edit against the user you want to edit.

The Edit User page appears with the user's details. The options that appear on the page depend on the software and services you are using.

3. To edit the user's details, do the following:a. Edit the fields with the help of Table 20 on page 108.b. Click Apply.The changes are saved.

4. To return to the Users page without making any changes, click Cancel.Table 20 gives details about the Editing User fields..Table 20 Edit User Page Fields

Field Action

Username Enter a username for the user.You cannot change the admin user's username.

Password Enter a password for the user. Use five to twenty-five alphanumeric characters (letters or numbers) for the new password.

Confirm Password Re-enter the user’s password.

Administrator Level

Select the user’s level of access to the Nokia IP40 portal.The levels are:No Access: the user cannot access the IP40.Read/Write: the user can log on to the IP40 and modify system settings.Read Only: the user can log on to the IP40, but cannot modify system settings. For example, you could assign this administrator level to technical support personnel who need to view the event log.The default level is No Access.The admin user’s administrator level (Read or Write) cannot be changed.

108 Nokia IP40 Security Platform User’s Guide v1.1

Page 109: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Deleting UsersYou can delete users with IP40 Satellite X only.

NoteThe admin user cannot be deleted.

To delete a user 1. Click Users on the main menu.

The Users page appears. 2. Click the Erase icon in the user’s row that you want to delete.

A confirmation message appears.3. Click OK.

The user is deleted.

Setting Up Remote VPN Access for UsersYou can set up VPN access for users with IP40 Satellite X only. If you are using the IP40 as a VPN server, you can allow users to access it remotely through their VPN clients (a Check Point SecureClient, Check Point SecuRemote, IP40 Tele 8, or another IP40 Satellite X).

To set up remote VPN access for a user1. Enable your VPN server by using the procedure in “To set up your IP40 as a VPN server” on

page 163.2. Add the user to the system by using the procedure in “Adding Users” on page 107.

You must select the VPN Remote Access option.

VPN Remote Access

Allows the user to connect to this IP40 by using their VPN client. For further information about setting up VPN remote access, see Chapter 14, “Working with VPNs.”This option is available in IP40 Satellite X configuration only.

Web Filtering Override

Allows the user to override Web filtering.This option only appears if the Web filtering service is defined.

Table 20 Edit User Page Fields

Field Action

Nokia IP40 Security Platform User’s Guide v1.1 109

Page 110: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

Using RADIUS AuthenticationYou can use RADIUS to authenticate both Nokia IP40 Security Platform users, and VPN clients trying to connect to the IP40. When a user accesses the IP40 GUI and tries to log on, the IP40 sends the entered username and password to the RADIUS server. The server then checks whether the RADIUS database contains a matching username and password pair. If so, the user is logged on.

To use RADIUS authentication1. Click Users in the main menu, and click the RADIUS tab.

The RADIUS page appears.

2. Complete the fields by using the information in Table 21 on page 110.You can enable the VPN Remote access check box (optional).

3. Click Apply.Table 21 gives more information about the fields in RADIUS page.

Table 21 RADIUS Page Fields

Fields Action

Address Type the IP address of the computer that will run the RADIUS service (one of your network computers) or click the corresponding This Computer button to allow your computer to host the service.To clear the text box, click Clear.

Port Type the port number on the RADIUS server’s host computer.To reset this field to the default port (1812), click Default.

110 Nokia IP40 Security Platform User’s Guide v1.1

Page 111: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Access ControlYou can set access control to your Nokia IP40 Security Platform.

To set the access control1. Click Setup on the main menu.

The Firmware page appears.2. Select Management.

The Management window appears.

Shared Secret Type the shared secret to use for secure communication with the RADIUS server.

Administrator Level

Select the level of access to the IP40 portal to assign to all users that the RADIUS server authenticates. The levels are:No Access: The user cannot access the IP40.Read/Write: The user can log on to the IP40 and modify system settings.Read Only: The user can log on to the IP40, but cannot modify system settings.The default level is No Access.

Web Filtering Override

Select this option to allow all users authenticated by the RADIUS server to override Web filtering.This option appears only if the Web filtering service is defined.

Table 21 RADIUS Page Fields

Fields Action

Nokia IP40 Security Platform User’s Guide v1.1 111

Page 112: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

3. Select (Access from) from the drop-drown list for HTTPS, SSH, and SNMP Access control. You can select one of the following:

Internal Network—you can access the device only when you are within a LAN.Internal Network +VPN—you can access the device when you are in a LAN or connected through VPN.IP Address Range—only specified computers with a given IP address range can access the device.ANY—you can access the device from any location.

Telnet Access

NoteTelnet access is disabled by default. To allow Telnet access from the LAN, WAN, and DMZ, configure separate user rules.

For more information about Telnet access to Nokia IP40, see “Using Telnet to Connect to Nokia IP40 Security Platform” on page 60

Secure ShellNokia IP40 supports SSH 2.0. The SSH feature in IP40 provides secure remote access to the appliance. In addition, SCP is supported to enable secure upgrade of the device, downloading of public keys, HTTPS certificates, import and export features.

Configuring SSHTo start using SSH remotely, first set IP40 to accept requests from SSH clients.

To enable IP40 to accept SSH requests1. On the main menu, click Setup

The Setup window appears2. Click the Management tab.The Management page appears.

112 Nokia IP40 Security Platform User’s Guide v1.1

Page 113: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

NoteSecure Shell access is enabled by default from the LAN and DMZ interfaces. Setting of management rules, which is described in this section, is applicable only for allowing SSH access from the WAN side.

3. From the SSH drop-down list, choose one of the following.Internal NetworkInternal Network + VPNIP Address RangeANY

Click Internal Network to enable only computers from your internal network to access your IP40 through SSH. Similarly, click ANY to enable any host (with any IP address) to connect to IP40 through SSH, and so on.

Enabling or Disabling SSH Service

NoteSecure Shell (SSH) options cannot be configured from the Nokia IP40 GUI. Use the command-line options from a command shell (such as HyperTerminal) to configure these options. A brief list of important command-line options for configuring Secure Shell (SSH) is included in the user guide for the purpose of introduction. For additional and detailed information, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Use the following commands to enable, disable, and view the status of SSH service:To enable the SSH service, use the following command:

set ssh server enable <0 | 1>

Nokia IP40 Security Platform User’s Guide v1.1 113

Page 114: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

To view the SSH service, use the following command:

show ssh server enable

Argumentsenable <0 / 1>

The value of 0 disables SSH and the value of 1 enables SSH. The default value is 1 since SSH is enabled by default.

SSH Authentication MethodsYou can perform the SSH authentication in the following ways:

Password authentication—set up by default. In this method, you can connect to the SSH server running on IP40 from the SSH client installed on your computer, after entering your password.Public-key authentication—one of the most secure ways to authenticate by using SSH. The basic principle in public-key authentication is the use of a pair of computer-generated keys: private key and public key. A public key is not useful unless you have the corresponding private key.

Using SSH ClientYou need an SSH client to connect to the SSH server running on IP40. Install an SSH client if you do not have one already.You can use the SSH client to connect to the IP40 by using password authentication or public key authentication. For additional information, see User Manual of the SSH client you are using.

Configuring Advanced Secure Shell Server OptionsFor additional information on using the command line options, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Configuring Server Authentication of UsersUse the following commands to configure the type of authentication the server uses to authenticate users:

set ssh serverpassword-authentication <0 | 1>publickey-authentication <0 | 1>

Use the following commands to show user authentication configurations:

show ssh serverpassword-authenticationpublickey-authentication

114 Nokia IP40 Security Platform User’s Guide v1.1

Page 115: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Server Protocol Details

Use the following commands to configure SSH protocols:

set ssh serverciphers namekeepalives <on / off>listen-addr addresslisten-addr2 addressmaxconnections Numberport <1-65535>

Use the following commands to show SSH protocol configurations:

show ssh servercipherskeepaliveslisten-addrlisten-addr2maxconnectionsport

Configuring Service Details

Use the following commands to configure the service details:

set ssh serverlogin-grace-time integer

Use the following commands to show the service details:

show ssh serverlogin-grace-time

Configuring Server Implementation

Use the following commands to configure the type of authentication the server will use to authenticate users.

set ssh serverlog-level name

Use the following commands to show service detail configurations:

show ssh serverlog-level

Configuring and Managing SSH Key PairsThis section provides details about how to configure and manage your SSH key pairs.

Nokia IP40 Security Platform User’s Guide v1.1 115

Page 116: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

Managing New Host Keys

Use the following commands to generate new host keys:

set ssh hostkeydsa size <768 | 1024 | 2048 |4096>rsa size <768 | 1024 | 2048 |4096>

Use the following commands to view host keys:

show ssh hostkeydsarsa

Managing Authorized KeysUse the following commands to add authorized keys:

add ssh authkeys<dsa | rsa> user admin <openssh-format | ssh2-format> file

Use the following commands to delete authorized keys:

delete ssh authkeys<dsa | rsa> user admin id

Use the following commands to view keys configured for various user accounts:

show ssh authkeys<dsa | rsa> user admin id identifier<dsa | rsa> user admin list

Secure Socket LayerSecure Socket Layer (SSL) enables secured communication over insecure networks. This protocol uses a private key to encrypt data that is passed through an SSL connection and ensures a secure connection between the client and the server.

Enabling HTTPS Web AccessYou can enable HTTPS remote access, so that IP40 users can securely access the IP40 portal from the Internet, by accessing the URL https://X.X.X.X:981, where X.X.X.X is the IP40 Internet IP address.

116 Nokia IP40 Security Platform User’s Guide v1.1

Page 117: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

NoteThe URL https://my.firewall is accessible from the Internal network by default.

To enable HTTPS Web access1. In the main menu, click Setup.

The Setup page appears.2. Click the Management tab.

The Management page appears.

3. In the HTTPS menu, click :Internal Network— to enable only users of your internal network to access your IP40 through HTTPS.Internal Network + VPN— to enable users of your internal network and users connected to your IP40 through a VPN tunnel to access your IP40 through HTTPS.IP Address Range—to give a range of IP addresses. Traffic from these IP addresses only can access your IP40 through HTTPS.ANY— to enable traffic generated from any IP address to access your IP40 through HTTPS.

4. Click Apply when you are finished making the settings. The Saved Successfully message appears.

Generating a Self-Signed Certificate and Private KeyUse the following command to generate a certificate and its associated private key. To better ensure your security, generate the certificate and private key over a trusted connection.

Nokia IP40 Security Platform User’s Guide v1.1 117

Page 118: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8 Configuring Network Access

generate https ssl-certificate key-bits <512 | 768 | 1024> <passphrase name | prompt-passphrase> country name state-or-province name locality name organization name organizational-unit name common-name name e-mail address name <cert-file path | cert-request-file path> key-file path

For more information see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Installing a Certificate and Private KeyUse the following commands to copy a certificate and its associated private key in the /var/etc/https_ssl_cert_server.crt and /var/etc/https_ssl_server.key files. Copying the certificate and private key to these files makes them available to establish SSL-secure Web connections.

set https ssl-certificatecert-file path key-file path <passphrase name | prompt-passphrase>

For more information, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

118 Nokia IP40 Security Platform User’s Guide v1.1

Page 119: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

9 Configuring and Monitoring SNMP

This chapter provides information about how to configure the Simple Network Management Protocol (SNMP) and how to use SNMP to manage the Nokia IP40 Security Platform.This chapter covers the following topics:

SNMP DescriptionSNMP Configuration from Nokia IP40 Security PlatformSetting Up SNMP Access to Nokia IP40 Security PlatformConfiguring the SNMP ParametersConfiguring SNMP Parameters from the Command-Line Interface

SNMP DescriptionSNMP is the industry standard for monitoring and managing devices on data communication and telecommunication devices or systems. SNMP helps in centrally monitoring and diagnosing such devices.Nokia IP40 Security Platform supports the following MIBs:

MIB-II (for more information, see RFC 1213)Host Resource MIB (for more information, see RFC 1514)

SNMP Configuration from Nokia IP40 Security PlatformYou can use the Nokia IP40 GUI portal and the command-line interface (CLI) to set, change, and view parameters for SNMP.

Setting Up SNMP Access to Nokia IP40 Security PlatformAllow or disallow SNMP manager software running outside your network to monitor the Nokia IP40 Security Platform.

Nokia IP40 Security Platform User’s Guide v1.1 119

Page 120: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

9 Configuring and Monitoring SNMP

To enable SNMP access1. Click Setup in the main menu, and click the Management tab.

The Management window appears.

2. Select one of the following from the SNMP drop-down menu list.Internal NetworkInternal Network + VPNIP Address RangeANYDisabled

If you select Internal Network, SNMP access to the IP40 is allowed from computers in your internal network or LAN only; if you select IP Address Range, you can specify a range of IP addresses from which SNMP access is allowed to your IP40.

Configuring the SNMP ParametersWhen you set the SNMP access rules, you can configure the SNMP parameters from the Nokia IP40 Security Platform GUI.

To configure the SNMP parameters1. Define the SNMP community name in the Management window. See “To enable SNMP

access” on page 120A community name must be specified to monitor your device by using SNMP.

2. Click the Advanced tab.The SNMP Configuration window appears.

120 Nokia IP40 Security Platform User’s Guide v1.1

Page 121: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

SNMP Description

3. Specify the System Location, such as IP40 lab or California.4. Specify the System Contact, such as contact person and phone number.5. Specify the SNMP port.This number defines the port where the SNMP daemon will run.6. Define the SNMP traps to be generated:

Startup— this trap is generated and reported to the SNMP Manager when the SNMP daemon re-initializes.Link up/down—this trap is generated and reported to the SNMP Manager when the connection to WAN or LAN is temporarily unavailable or becomes available.User Login—this trap is generated and reported to the SNMP manager when SNMP access is attempted with an incorrect community name.

7. Specify the IP address where the SNMP Manager is running, so that traps that are generated can be sent to the correct IP address. The default port number is 162.

NoteSet the trapPduAgent to a specified IP address from the command prompt so as to view the IP address of the device from where a trap is generated. Use the command set snmp trappduAgent ip_address from the IP40 CLI for setting the trapPduAgent. You cannot set the trapPduAgent from the IP40 GUI portal. For more information, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Configuring SNMP Parameters from the Command-Line InterfaceYou can use the SNMP command- line interface (CLI) to set and view parameters for SNMP.

Setting SNMP Parameters Nokia IP40 supports SNMPv2c and SNMP v1 and v2 traps.

Nokia IP40 Security Platform User’s Guide v1.1 121

Page 122: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

9 Configuring and Monitoring SNMP

Use the following commands to set the SNMP parameters:

set snmpcontact - SNMP Contactenable - Enables SNMP Daemonlocation - SNMP Locationport - SNMP PorttrapPduAgent - snmp trappduagenttrapreceiver - snmp Trapreceivertraps - SNMP Traps

Viewing SNMP ParametersUse the following commands to view the SNMP parameters:

show snmpcommunity - SNMP Communitycontact - SNMP Contactenable - Displays SNMP Daemonlocation - SNMP Locationport - SNMP PorttrapPduAgent - snmp trappduagenttrapreceiver - snmp Trapreceivertraps - SNMP Traps

For additional and detailed information on how to use the set and show commands, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

122 Nokia IP40 Security Platform User’s Guide v1.1

Page 123: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

The Nokia IP40 Security Platform supports multiple access technologies in many combinations to connect the remote and branch offices of distributed enterprise to the headquarters with high availability feature that provides reliable, dependable and business-class secure access. Nokia IP40 supports VRRP that caters to device failures, connects to multiple ISP supporting Demand Dialing, Internet link selection by using BGP to cater to ISP link failures, and seamless routing of encrypted traffic across multiple WAN links.This chapter includes the following topics:

Virtual Router Redundancy ProtocolDual HomingRoute Based VPN and BGP

Virtual Router Redundancy ProtocolNokia IP40 Security Platform eliminates the single point of failure in static default routed environment for the networks connected to LAN, and DMZ ports with Virtual Router Redundancy Protocol (VRRP). VRRP is an election protocol that dynamically assigns responsibility to a virtual router. For more information, see RFC 2338.

Configuring VRRPBasic VRRP configuration on Nokia IP40 security platform can be explained as follows:

Nokia IP40 Security Platform User’s Guide v1.1 123

Page 124: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

IP40 (R1), the address owner, acts as the master, and IP40 (R2) acts as backup.The four end hosts in the LAN are configured to use 192.168.1.1/24 as the default router.The primary function of the VRRP is to send the traffic that originates from H1, H2, H3, and H4 (addressed to the Internet) to IP40 (R1), default router. VRRP specifies a mechanism that IP40 (R2) uses to start acting as the default router when IP40 (R1) fails, and the hosts in the LAN do not become isolated. As shown in the preceding figure, the branch office network uses a single virtual router ID (V1). If IP40 (R1) becomes unavailable, IP40 (R2) takes over VRID (V1) and its associated virtual IP addresses. Packets sent to the Internet using 192.168.1.1 as the router are then forwarded by IP40 (R2). When IP40 (R1) becomes active again, it takes over as the master and IP40 (R2) reverts to backup.

NoteYou can configure VRRP through CLI only. HA support in not provided in Nokia IP40 GUI. A brief list of CLI commands are included in the user guide as an introduction. For more information, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Configuring VRRP with CLI commandsThe VRRP CLI commands are divided into the following two groups:

Setting or changing the parametersViewing the parameters.

The following sections provide the basic commands for configuring VRRP:

124 Nokia IP40 Security Platform User’s Guide v1.1

Page 125: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Dual Homing

Configuring VRRP for LAN and DMZ networks

Use the following commands to configure the VRRP interface:

set vrrp interface <lan | dmz>authtype <none | simple password <value>>offon

Setting Virtual Router Parameters

Use the following commands to set the virtual router parameters:

set vrrp interface <lan | dmz> virtual-router <value> vrid <value>Hello-interval <value>priority <value>virtual-address <value ip_address>

Viewing VRRP Configuration

Use the following command to view the VRRP configuration and status on an interface:

show vrrpinterface <lan | dmz> <config-summary | status>

Use the following command to view the VRRP configuration on LAN and DMZ interfaces:

show vrrp interfaces

Disabling VRRP for LAN and DMZ networks

Use the following commands to delete the VRRP configuration:

delete vrrpinterface <lan | dmz> virtual-router vrid <value>

For more information about VRRP commands, see the Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Dual HomingNokia IP40 Security Platform supports dual homing Internet connection, which provides an uninterrupted link to the ISP. The Internet connection that uses DSL or cable modem or static IP is the active and permanent link. The dial-up connection is stated as the passive link, which stays in backup mode. When the permanent link fails, the dial-up link is automatically activated.

Nokia IP40 Security Platform User’s Guide v1.1 125

Page 126: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

A simple dual home configuration is shown in the following figure.

Configuring Nokia IP40 Security Platform for Dual HomingISP Connectivity

The following sections give information about how to configure the Nokia IP40 dual homing feature:

Configuring primary Internet profile for DSL/ Cable/Automatic DHCP (see “Configuring Internet Connection” on page 65).Configuring secondary Internet profile for dial-up mode (see Chapter 5, “Configuring Dial-Up with the GUI” on page 78)·Configuring modem parameters.

Use the following commands to configure modem parameters. For more information, see Nokia IP40 Security Platform CLI Reference Guide Version, 1.1

set modem dialmode <tone | pulse>

set modem extrainit string

set modem manufacturer <standard | custom>

set modem rate <9600 | 19200 | 38400 | 57600 | 115200 | 230400 |460800>

Use the following commands to view the modem parameters:

show modem <all | dialmode | extrainit | manufacturer | rate>

126 Nokia IP40 Security Platform User’s Guide v1.1

Page 127: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Route Based VPN and BGP

Configuring ISP Dial-Up Profiles Use the following command to configure ISP dial-up profiles by using the CLI wizard:

wizard dialup

For more information about how to use other dial-up commands, see th Nokia IP40 SecurityPlatform CLI Reference Guide, Version 1.1.Use the following commands to modify ISP dial-up profiles:

set dialup profile <id>user <username>password <password>number <telephone Number>[authentication <none | pap | chap | any>externalip <ip_address>mtu <value>staticdns <yes | no>dns1 <ip_address>dns2 <ip_address>

Use the following command to delete selected ISP dial-up profiles:

set dialup profile <id> disable

Route Based VPN and BGPThe Nokia IP40 Security Platform has built-in features to automatically detect the failure of an IPSec VPN connection from a remote office or branch office to the headquarters. On failure, it forwards the traffic by using an alternative link (dial backup or VPN) through another ISP.The IP40 Security Platform uses Border Gateway Protocol (BGP) to detect IPSec VPN connection failures, and to activate alternative links. IP40 monitors each IPSec VPN tunnel in association with a BGP neighbor at the headquarters.

Nokia IP40 Security Platform User’s Guide v1.1 127

Page 128: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

The following figure depicts a simple dynamic VPN implementation.

To detect IPSec VPN connection failure, the Nokia IP40 Security Platform monitors the reachability of the remote BGP peers associated with the VPN tunnel.On failure, the passive link is activated to establish an alternative IPSec VPN connection to reach the associated BGP remote peer. Nokia IP40 continues to monitor the remote BGP peer reach ability on the preferred (primary) connection to the headquarters. Nokia IP40 falls back to preferred VPN connection as soon as the associated BGP remote peer becomes accessible.A pair of loopback addresses (active and passive) are defined on Nokia IP40 Security Platform with restricted BGP route advertisement of LAN and static NAT addresses. This scenario is supported with Check Point SmartLSM. The VPN policy installed on Nokia IP40 includes the topology of immediate protected network behind the central office gateway only. This enables the traffic between these two networks tunneled, including the communication between BGP peers. The central office BGP peer advertises the CO networks to the IP40 and BGP. The traffic originating from the IP40 LAN destined to the central office network is tunneled and sent.

Border Gateway Protocol Nokia IP40 Security Platform participates in Autonomous System (AS), and can establish a neighbor relationship, and exchange routes with other non-adjacent routers. An AS is a network or group of networks under common administration and with common routing policies. Nokia IP40 supports a limited set of BGP-4 features for route-based VPN and failover.

128 Nokia IP40 Security Platform User’s Guide v1.1

Page 129: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Route Based VPN and BGP

NoteYou can configure BGP by using the Nokia IP40 CLI only. This feature is not supported in the IP40 GUI. Use the command-line options from a command shell (such as Hyper terminal) to configure these options. A brief list of important commands are included in this guide to provide an introduction. For more information on these commands, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Enabling BGP RoutingUse the following command to enable the BGP routing protocol:

set bgp daemon <restart | enable | disable>

Configuring the Local AS and Router-IDUse the following command to configure the local AS:

set bgp as <value> router-id <value ipaddress>

Configuring Nokia IP40 Security Platform for BGP Route AdvertisementThe network and redistribute commands are used to inject routes into the BGP table. The network-mask portion of the IP address allows supernetting and subnetting.Use the following commands to configure route advertisements:

add bgpnetwork <value ipaddress | netmask-length>redistribute <connected | kernel | static>

Use the following commands to delete BGP route advertisement:

delete bgp network <value ipaddress | netmake-length >redistribute < connected | kernel | static >

Monitoring BGP Use the following show commands to monitor BGP activity:

show bgp config all

show bgp summary

show bgp config running

Nokia IP40 Security Platform User’s Guide v1.1 129

Page 130: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

Viewing Debugging InformationUse the following debug commands to display information on BGP logs for inbound or outbound events, or both:

set bgp debugevent <on | off >keepalive <on | off >update <on | off >fsm <on | off >

Adding a BGP Peer to Nokia IP40n Security PlatformNokia IP40 Security Platform supports both internal and external BGP neighbors. Internal neighbors are in the same autonomous system; external neighbors are in different autonomous systems. Normally, external neighbors are adjacent to each other and share a subnet, while internal neighbors can be anywhere in the same autonomous system.Use the following command to add BGP neighbors:

add bgp neighbor <value ip_address> remote-as <value>

Use the following command to delete a BGP neighbor:

delete bgp neighbor <value ip_address>

Clearing BGPClearing a BGP neighbor session resets BGP connections to enable inbound and outbound policy changes. Use the following commands to clear a BGP neighbor session:

clear bgp <neighbor <value ip_address> | neighbors>

Creating Prefix Lists on Nokia IP40 Security PlatformPrefix lists are used to filter the updates to and from a peer on the basis of network prefixes, and masks. A prefix list is associated with a sequence number and prefix length range for a specified prefix and mask. The sequence number determines the order of the lookup and permits heavily used prefixes. Prefix lists filtering is easier to use and is more efficient than access lists. Use the following commands to add prefix lists:

add bgp prefix-list <list-name> seq-no <value> action <permit | deny> any prefix <value>

Use the following commands to delete prefix lists:

delete bgp prefix-list <all-unused |name <value> [seq-no <value>] >

130 Nokia IP40 Security Platform User’s Guide v1.1

Page 131: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Route Based VPN and BGP

Creating Access- Lists on Nokia IP40 Security PlatformAccess lists are filters that enable you to restrict the routing information a router advertises to a neighbor. BGP uses address-based access lists. Use the following commands to configure access lists:

add bgp access-list <list-name> action < permit | deny > any prefix <value>

Use the following commands to delete access lists:

delete bgp access-list all-unused | name <value>

Creating Route Maps on Nokia IP40 Security PlatformRoute maps are used to control distribution of routing updates. Route maps consist of a list of match and set commands. The match commands specify match criteria and the set commands specify the action to be taken if match criteria are met. Only those routes that pass through the route-map (inbound route maps) are accepted or forwarded (outbound routes).Use the following commands to add route-maps:.

add bgp route-map name <map-name> action <permit | deny> seq-no <value> match <ip-address <value> | ip-next-hop <value> | metric <value> |> set ip-next-hop <value ip_address> local-preference <value> weight <value> metric <value> as-path-prepend <value>

Use the following commands to delete route-maps:

delete bgp route-map <all-unused | name <value> [seq-no <value>]>

Configuring Routing Policies on Nokia IP40 Security PlatformRouting policies for a remote peer include all of the configurations such as route-map, distribute list, prefix-list, and filter-list that might affect inbound or outbound routing table updates.

Nokia IP40 Security Platform User’s Guide v1.1 131

Page 132: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

Use the following commands to configure the routing policies for the created BGP Peer:set bgp neighbor <value ip_address>

dont-capability negotiate <on | off>ebgp-multihop <on | off>keepalive <value> holdtime <value>maximum-prefix <value <value> [warning-only <on | off>|] off>next-hop-self <on | off>no-shutdownpassive <on | off >peer-group < value <value> | off >port < value <value> | off>prefix-list <value> direction <in |out | both> state <on | off>route-map <value> direction <in |out | both> state <on | off>route-reflector-client <on | off>update-source <value> state <on | off>weight <value <value>| off>shutdowndistribute-list <value> direction <in |out | both> state <on | off>

Configuring a Remote BGP Peer with MD5 AuthenticationYou can invoke MD5 authentication with a remote BGP peer such that each segment sent on the TCP connection between the peers is verified. This feature must be configured with the same password on both BGP peers or the connection between them is not established. The authentication feature uses the MD5 algorithm. Invocation of this feature enables Nokia IP40 to generate and check the MD5 digest of every segment sent on the TCP connection. If authentication is invoked and a segment fails authentication, a message appears on the console.

NoteMD5 authentication with remote BGP peer is implemented external to the BGP routing process on Nokia IP40. This authentication mechanism has stronger coupling with VPN modules. Therefore, this feature is not supported for clear text BGP updates.

Use the following commands to configure BGP remote peers:

add bgp remote-peer <value ip_address> vpn-peer <value ip_address> priority <normal | high> [gateway <value> password <value>]

132 Nokia IP40 Security Platform User’s Guide v1.1

Page 133: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Route Based VPN and BGP

Configuring a Local Loopback InterfaceLoopback interfaces enable your BGP connection to stay connected of the interface used to reach the neighbor. Configure this loopback interface IP address as the source address for the BGP process to communicate with a remote BGP peer.

Use the following commands to configure loopback interface:

set interface loopback id <value> address <value> mask-length <value>

Use the following commands to view a loopback interface:

show interface loopback <all | id <value>>

Use the following commands to delete a loopback interface:

delete interface loopback id <value>

Configuring High-Availability OptionsWhen high availability (HA) is configured, device monitors the status of BGP peers and dial-up, based on the WAN failover node. HA triggers VPN tunnels associated with normal priority BGP peers if it finds all of the high priority BGP peers are unreachable. HA continues to monitor the status of high priority peers and drops the tunnels associated with lower priority BGP peers as soon as at least one of the high-priority BGP peers becomes reachable.

Use the following commands to configure the high availability options:

set hamonitoring-interval <value>wan-failover <none |dialup | secondary | bgp | bgp-dialup | bgpexternal>

Use the following commands to view the high availability options:

show ha monitoring-level | wan-failover

The high availability options are explained as follows:none—no high availabilitydialup—this mode is used in Single Device HA. This mode is useful if device has dial-up as primary Internet connection with multiple dial-up profiles. In this mode, device uses dial-up profiles for fail over. If the BGP peer becomes unreachable using one profile, the device automatically switches to the next dial-up profile. This process continues in round-robin fashion until the BGP peer becomes reachable.secondary—this mode is used in Single Device HA. This mode is useful it the device has LAN/PPPOE/PPTO/DHCP/ as primary Internet connection and dial-up as secondary Internet connection (optionally with multiple profiles). In this mode, device fails over to secondary Internet connection (dial-up) if all high priority BGP peers become unreachable. It continues to monitor the status of high priority BGP peers and falls back to primary

Nokia IP40 Security Platform User’s Guide v1.1 133

Page 134: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

Internet connection if any one high priority BGP peer becomes reachable. It drops the dial-up connection when device falls back to primary Internet connection.BGP—This mode is useful if device has LAN/PPPOE/PPTP/DHCP as primary Internet connection and has no dial-up connection. Primary device of the Dual Device HA scenario is configured to operate in this mode. In this scenario, you have another device acting as backup. The backup device can have either dial-up or LAN/PPPOE/PPTP/DHCP for Internet connection. primary and backup devices establish internal BGP (IBGP) session with each other. The fail-over automatically takes place in the primary device based on the availability of CO routes. (external or internal BGP (EBGP or IBGP)).BGP-external—this mode is useful if the device has LAN/PPPOE/PPTO/DHCP as primary Internet connection and DMZ as secondary Internet connection. In this mode, DMZ is assumed to be secure and the traffic passing through DMZ will not be encrypted. So, DMZ can be connected to an external VPN device or a router connected to frame relay network. In this mode, IP40 uses DMZ as backup to the primary Internet connection. The traffic is tunneled as long as BGP peer is reachable over VPN through primary Internet connection. As soon as the BGP peer becomes unreachable, the traffic goes in plain text through DMZ interface. Similar to the other modes, device continues to monitor the status of high priority BGP peers and falls back to primary Internet connection if atleast one high priority BGP peer becomes reachable.

NoteIn this mode, encrypt flag must be disabled for DMZ.

Configuring Criteria for Path SelectionA VPN tunnel established with the given VPN peer is assumed to be disconnected or unavailable if the corresponding BGP peer is unreachable.

HA enforces the primary Internet connection as the path for each high priority BGP peer and its associated VPN peer by inserting static routes towards primary Internet connection. This ensures continuous status monitoring of high priority BGP peers. Use the following command to configure a remote-peer:

add bgp remote-peer <value ip_address> vpn-peer <value ip_address> priority <normal | high> [gateway <value> password <value>]

Use the following command to delete a remote peer:

delete bgp remote-peer <value-ip_address>

134 Nokia IP40 Security Platform User’s Guide v1.1

Page 135: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

High- Availability Solution with a Single Nokia IP40 Security Platform

High- Availability Solution with a Single Nokia IP40 Security Platform

In this scenario, the branch office is always securely connected to the central office on the Internet with single Nokia IP40 Security Platform by using DSL or cable connection or dial-up as backup. Nokia IP40 (R1) connects to the RO1 and establishes VPN connection on DSL (preferred connection). Nokia IP40 (R1) and BGP peer (R3) located in RO1 establishes a BGP connection over VPN. If this BGP session fails because of any service interruption, dial-up is activated. Nokia IP40 (R1) connects to RO2 and establishes a VPN connection. R1, and the BGP peer (R4) located in RO2 establish a BGP connection over VPN, and the traffic from the branch office flows through this alternative path. As soon as IP40 (R1) detects the established BGP session on the DSL connection, the dial-up connection to RO2 is discontinued.

Nokia IP40 Security Platform User’s Guide v1.1 135

Page 136: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

10 High Availability

High Availability Solution with Dual Nokia IP40

This scenario supplements the single device HA solution with VRRP to cater to device failures at branch office coupled with dedicated link between the Nokia IP40 Security Platforms on DMZ ports and internal BGP to synchronize the route updates from central office on both the devices. The dedicated links between both Nokia IP40 devices is secured with IPSec VPN.Nokia IP40 (R1) acts as the default virtual router for the branch office network, and is connected to RO1 by using DSL or a cable connection (preferred path). If any service interruption occurs in the R1 LAN , Nokia IP40 (R2) takes over as the default virtual router and forwards the branch office traffic on the DMZ to RO1 securely. If the IP40 (R1) device fails, R2 becomes master and dial-up is activated. Now R2 connects to RO2 and establishes a VPN connection. R2,and the BGP peer (R4) located in RO2 establish a BGP connection over VPN, and the traffic from branch office flows through this alternative path. As soon as IP40 (R1) detects the established BGP session on the DSL connection, the dial-up connection to RO2 on R2 is discontinued.

136 Nokia IP40 Security Platform User’s Guide v1.1

Page 137: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

11 Configuring Nokia IP40 Through Out-of-Band Management

This chapter explains how to configure the Nokia IP40 Security Platform using out-of-band management (OOB). It includes the following topics:

OverviewConfiguring OOB from the Nokia IP40 Security Platform GUIRemote Configuration Mode in the Nokia IP40 Security Platform

OverviewNokia IP40 Security Platform supports remote management by using Out-Of-Band management (OOB), where IP40 acts as a remote access server (RAS) and waits for the incoming call. To use OOB, connect a modem to the AUX port of your appliance with dial-up Internet connection.Out Of Band management is useful in the cases where you cannot connect to your device locally by using either LAN, WAN or DMZ ports. In these cases, you can use OOB to connect the device for normal operations. Nokia IP40 supports ISDN terminal adaptor or analog modems for modem dial-in.You can dial into the device using a dial-up Internet connection, and use HTTPS, SSH, and SNMP protocols to configure or monitor the device. By default, OOB is enabled (factory defaults) in IP40 security platform.

To connect a modem to Nokia IP40 Security Platform1. Connect a modem to the AUX port of your IP40 device.2. Dial in to the device from a computer that is configured with the dial-up connection.3. Use the username and password already defined to log in.

Nokia IP40 Security Platform User’s Guide v1.1 137

Page 138: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

11 Configuring Nokia IP40 Through Out-of-Band Management

Configuring OOB from the Nokia IP40 Security Platform GUI

Configure the modem settings from the IP40 GUI before you use the OOB feature.

To configure the modem settings from the IP40 Security Platform GUI1. Click Network from the main menu.

The Internet page appears2. Select the Modem tab.

The Modem page appears.

3. Select Standard or Custom from the Modem Type drop-down list.For a Custom Modem, you can specify an additional initialization string, apart from the standard initialization string (see step 6).

4. Select Tone or Pulse from the Dial Mode drop-down list. 5. Select the port speed in bps from the Port Speed drop-down list.

This speed defines the modem port speed. The values can be 9600, 19200, 38400, 57600, 115200, 230400, or 460800 bps.

6. Check Answer incoming PPP calls, to answer the incoming PPP calls.7. Enter a suitable string next to Initialization String.This string is used to access additional

modem features. For example, to disable the modem speakers, enter the initialization string ATM0.

NoteTo find the suitable to find the suitable init string see the user manual of your modem.

138 Nokia IP40 Security Platform User’s Guide v1.1

Page 139: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Secure Shell and HTTPS Access Through Out-of-Band Dial-In

8. Click Apply to save your modem settings.9. Click Test to verify whether your modem settings are working.

NoteYou cannot configure all of the OOB parameters from the IP40 GUI. The parameters that cannot be configured from the GUI, such as the address of the OOB interface, destination address of the OOB interface, and set IP header compression, have default values. Use the CLI to change these values only.

Secure Shell and HTTPS Access Through Out-of-Band Dial-In

You can access and configure Nokia IP40 Security Platform by using SSH or HTTPS. When you dial in to the Nokia IP40 from a modem (see “To connect a modem to Nokia IP40 Security Platform” on page 137 for details), you can establish a normal SSH or HTTPS session.For details on using the Secure Shell, see “Telnet Access” on page 112, and for details on using HTTPS see “Enabling HTTPS Web Access” on page 116 .

NoteAllow SSH and HTTPS access on the Nokia IP40 before you establish the sessions from OOB dial-in. For more details, see “Configuring Virtual Servers” on page 96.

Remote Configuration Mode in the Nokia IP40 Security Platform

By using remote configuration mode, you can configure and manage your IP40 security platform, from a remote location. In this mode, firewall allows access to SSH/HTTPS from OOB for a time period of 30 minutes, irrespective of the current firewall filters. To boot your Nokia IP40 in Remote Configuration Mode, hold the Reset button and connect the power to the device. The default username and password for OOB are admin and password respectively, if the first time password is not set.

NoteIn this mode, the device is set to factory defaults.

Nokia IP40 Security Platform User’s Guide v1.1 139

Page 140: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

11 Configuring Nokia IP40 Through Out-of-Band Management

140 Nokia IP40 Security Platform User’s Guide v1.1

Page 141: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

This chapter describes how to configure common device functions such as setting the host name, configuring the date and time, and system logging. The chapter also discusses how to load the factory default configuration, perform a firmware upgrade, and upgrade the product key.This chapter covers the following topics:

Host Name Configuration by Using the CLIDate and Time ConfigurationSystem Logging ConfigurationExporting the Nokia IP40 Security Platform ConfigurationUpgrading FirmwareResetting Nokia IP40 Security Platform to Factory Defaults

Host Name Configuration by Using the CLIUse the following commands to view or change your platform host name:

show hostname

set hostname name

For more information on setting the host name, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1.

Date and Time ConfigurationFor information on setting the date and time, see “Setting Nokia IP40 Security Platform Time” on page 45.For advanced date and time configuration using the NTP server, see the Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

Nokia IP40 Security Platform User’s Guide v1.1 141

Page 142: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

System Logging ConfigurationYou can configure the Nokia IP40 Security Platform to send event logs to a syslog server that resides in your internal network or on the Internet. The logs detail the date and the time each event occurred. If the event is a communication attempt that was rejected by the firewall, the event details include the source and destination IP address, the destination port, and the protocol used for the communication attempt (for example, TCP or UDP).Nokia IP40 supports local event logging, which you can view from Reports > Event Log. Up to 100 events can be logged here. You can also configure an external syslog server by using the following method.

To configure an external syslog server1. Click Setup from the main menu, and select the Logging tab.

The Logging page appears.

2. Enter the IP address for the syslog server in the Syslog Server field.

NoteThe syslog server can run either on a computer outside your network, or on a computer inside your IP40 network.

3. Specify the port number where the syslog server will run. The default port number is 514.

Setting the Syslog ServerUse the following commands to set the syslog server:

set syslogaddress - Syslog server addressport - Syslog server port

142 Nokia IP40 Security Platform User’s Guide v1.1

Page 143: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Network Utilities

For more information about how to set the syslog server, see Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

Network UtilitiesYou can use the following network utilities from the IP40 Security Platform GUI:

PingTracerouteWHOIS

In addition to the above utiliities, you can also use the following utilities by using the command exec:

arpnetstatnslookuppingtcpdumptraceroute

To use the network utilities from the Nokia IP40 GUI1. Click Setup from the main menu, and select the Tools tab.

The Tools page appears.

2. Select either ping, traceroute, or WHOIS from the IP Tools drop-down list, depending on the tool you want to use.

3. Enter the IP address in the Address field.Click Go on the right.

4. The IP Tools window appears, providing the network statistic.

Nokia IP40 Security Platform User’s Guide v1.1 143

Page 144: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

The following window shows an example of ping tool usage.

Managing Configuration You can export and import the existing Nokia IP40 Security Platform configuration.This procedure is useful when you want to upgrade the firmware of your device, but do not want to lose the current configuration. You can also use this feature when the device is accidentally misconfigured, and the original configuration needs to be restored.You can use the configuration file (*.cfg), which includes all the IP40 settings to backup and restore the settings.

Exporting the Nokia IP40 Security Platform ConfigurationYou can export the Nokia IP40 Security Platform configuration to a *.cfg file, and use this file to back up and restore IP40 settings, as needed.The configuration file includes all of your settings.

Exporting the Nokia IP40 Security Platform configuration

1. Click Setup in the main menu, and click the Tools tab.The Tools page appears.

144 Nokia IP40 Security Platform User’s Guide v1.1

Page 145: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Managing Configuration

2. Click Export.A standard File Download dialog box appears.

3. Click Save this file to disk. The Save As dialog box appears.4. Browse to a destination directory of your choice.5. Type a name for the configuration file and click Save.

The *.cfg configuration file is created and saved to the specified directory.

Importing the Nokia IP40 Security Platform ConfigurationTo restore the configuration of your appliance from a configuration file, you must import the file:

Nokia IP40 Security Platform User’s Guide v1.1 145

Page 146: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

To import the Nokia IP40 Security Platform configuration1. Click Setup in the main menu, and click the Tools tab

The Tools page appears.2. Click Import.

The Import Settings page appears.

3. Do one of the following:In the Import Settings field, type the full path to the configuration file.

orClick Browse, and browse to the configuration file.

4. Click Upload.A Confirmation message appears.

5. Click OK.IP40 settings are imported.A success message appears.

6. Click OK.The Tools page reappears.

NoteYou can use the HTTP, TFTP, FTP, SCP protocols through the IP40 CLI for configuration export and import. For additional information, see Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

146 Nokia IP40 Security Platform User’s Guide v1.1

Page 147: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Upgrading Firmware

Upgrading Firmware You can upgrade Nokia IP40 Security Platform to a new firmware version of the product. If you are subscribed to Software Updates, firmware updates are performed automatically. These updates include new product features and protection against new security threats.If you are not subscribed to the Software Updates service, you must update your firmware manually.

To update firmware manually1. Click Setup on the main menu.

The Firmware page appears.2. Click Firmware Update.

The Firmware Update page appears.

3. Click Browse. A browse window appears.

4. Select the firmware file that you purchased. 5. Click Upload. 6. The IP40 firmware is updated.This might take one minute.

When the update is complete, the IP40 restarts automatically.

Installing Your Product KeyNokia IP40 Security Platform is identified by the product key that is obtained when you purchase the device. You can purchase and upgrade to any of the other versions of IP40.

Nokia IP40 Security Platform User’s Guide v1.1 147

Page 148: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

To install a product key1. Click Setup on the main menu.2. Click the Firmware tab.

The Firmware page appears.

3. Click Upgrade Product.The Setup wizard opens, with the Install Product Key dialog box displayed.

4. Select Product Key.5. In the Product Key field, enter the new product key.6. Click Next.

148 Nokia IP40 Security Platform User’s Guide v1.1

Page 149: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Dynamic DNS

The Installed New Product Key dialog box appears.

7. To register your IP40, check I want to register my product.

8. Click Next.A new browser window opens with https://support.nokia.com/agreement/SOHOregister.html.

9. Click Finish.IP40 restarts and the Welcome page appears.

Dynamic DNS The Nokia IP40 Security Platform supports the use of a domain name without requiring a permanent IP address on the Internet. This is useful for Nokia Horizon Manager to locate the IP40 devices that it manages by the host names that are used at remote office and branch offices.

Nokia IP40 Security Platform User’s Guide v1.1 149

Page 150: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

The Dynamic Domain Name Server (DDNS) feature on Nokia IP40 updates the ISP-provided IP address to the DNS located at the headquarters. The DDNS feature works with DNS supporting BIND-8.2.x, BIND-9.x, and Windows DNS.

Configuring DDNSYou can configure DDNS through the CLI.

NoteBefore you configure DDNS, make sure your DNS is configured.

Use the following command to configure DDNS:

set ddns <server | client >

Use the following command to add DDNS:

add ddns server < ip address >

For more information about DDNS commands, see Nokia IP40 Security Platform CLI Reference Guide, Version 1.1.

Resetting Nokia IP40 Security Platform to Factory Defaults

You can reset Nokia IP40 to its default settings. When you reset your IP40, it reverts to the state it was originally in when you purchased it, and your firmware reverts to the version that shipped with the device.

CautionResetting to factory defaults erases all of your settings and password information. You must set a new password and reconfigure your IP40 for Internet connection.

You can reset IP40 to defaults through the Web management interface (software) or by manually pressing the Reset button (hardware) located at the back of the device.

To reset IP40 Security Platform to factory defaults through the Web interface1. Click Setup in the main menu, and click the Tools tab.

The Tools page appears.2. Click Factory Settings.

A confirmation message appears.

150 Nokia IP40 Security Platform User’s Guide v1.1

Page 151: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Resetting Nokia IP40 Security Platform to Factory Defaults

3. Click OK.The Please Wait window appears.The IP40 returns to its factory defaults.The IP40 restarts.This can take up to a minute.The Login page reappears.

NoteSince the network settings change, you cannot access the device immediately. Release, and renew the IP address by running the Refresh IP tool located in the tools folder on the CDROM, and then access the IP40 GUI portal.

Resetting Nokia IP40 Security Platform to Factory Defaults by Using the Reset Button

The Restore Defaults button is inside a hole on the back panel of Nokia IP40. To press the button, use a large flat-tipped object, such as a thick paper clip. Pressing the Restore Defaults button for seven seconds restores all IP40 settings back to factory defaults. The button works only after booting is complete, and the green light must be illuminated to activate the button. The status light goes off while defaults are being restored, and relights after defaults are restored and the IP40 begins to reboot. It takes over two minutes to restore defaults.An Amber light is displayed while rebooting. Until the first-time login and password are set, the green light blinks. A blinking green states that the device is set to factory defaults.

Nokia IP40 Security Platform User’s Guide v1.1 151

Page 152: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

12 Configuring Device Functions

NoteYou can also reset your Nokia IP40 to factory defaults by using the GUI, or the CLI, and remote config mode.

152 Nokia IP40 Security Platform User’s Guide v1.1

Page 153: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

13 Viewing Reports

This chapter provides an overview of the reports you can view from the Nokia IP40 Security Platform GUI, and how to view them. This chapter includes the following topics:

Viewing the Event LogViewing Active ComputersViewing Active ConnectionsViewing VPN TunnelsViewing the Diagnostics Summary

Viewing Reports on Nokia IP40 Security PlatformYou can view the following reports on the IP40 GUI:

Event logActive computersActive connectionsVPN tunnels

Viewing the Event LogYou can track network activity by using the event log. The event log displays the last 100 events in the following categories:

Events highlighted in Green indicate the traffic accepted by the firewall.Events highlighted in Blue indicate changes in your setup that you made or that are the result of a security update implemented by your service center.Events highlighted in Red indicate connection attempts that your firewall blocked.Events highlighted in Orange indicate connection attempts that your custom security rules blocked.

The logs detail the date and time that the event occurred, and its type. If the event is a communication attempt that was rejected by the firewall, the event details include the source and

Nokia IP40 Security Platform User’s Guide v1.1 153

Page 154: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

13 Viewing Reports

destination IP address, the destination port, and the protocol used (TCP, UDP, and so on) for the communication attempt.

To view the event log1. Click Reports on the main menu.

The Event Log page appears.

2. Do any of the following:Click Refresh to refresh the display.Click Clear to clear all events. If an event is highlighted in red, indicating a blocked attack on your network, you can display the attacker's details by clicking the IP address of the attacking computer.

Nokia IP40 queries the Internet WHOIS server, and a window displays the name of the entity to whom the IP address is registered and their contact information. This information is useful in tracking down external attacks.

Viewing Active ComputersThe Viewing Active Computers option allows you to view the currently active computers on your network. In the Active Computers report, licensed computers are shown in green. Computers that did not pass through the firewall (and therefore not a node) are displayed in blue. Computers that attempt to exceed the license are displayed in red and are blocked from accessing the Intranet. If a formerly active computer does not pass traffic through the firewall for a certain period of time, it is considered inactive, and is shown in blue. Another node can pass through the firewall instead.

154 Nokia IP40 Security Platform User’s Guide v1.1

Page 155: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Viewing Reports on Nokia IP40 Security Platform

To view the active computers1. Click Reports on the main menu and choose Active Computers.

The Active Computers page appears.

If you exceed the maximum number of computers allowed by your license, a warning message appears, and the computers that exceed the node limit are marked in red. These computers might not be able to access the Internet through IP40.

NoteTo increase the number of computers that your license allows, you must upgrade your product.

If desired, click Refresh to refresh the display. 2. To view node limit information:

a. Click Node Limit.The Node Limit window appears with the installed software product and the number of nodes used displayed.

Nokia IP40 Security Platform User’s Guide v1.1 155

Page 156: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

13 Viewing Reports

b. Click Close to close the window.

Viewing Active ConnectionsThe Viewing Active Connections option allows you to view the currently active connections between your network and the external world. The active connections are displayed as a list, specifying source IP address, destination IP address and port, and the protocol used (TCP, UDP, and so on).

To view active connections1. Click Reports on the main menu, and then choose Active Connections.

The Active Connections page appears.

2. Do the following:Click Refresh to refresh the display.To view information about the destination computer, click its IP address.

156 Nokia IP40 Security Platform User’s Guide v1.1

Page 157: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Viewing Reports on Nokia IP40 Security Platform

The IP40 queries the Internet WHOIS server, and a window displays the name of the entity to whom the IP address is registered and their contact information.

Viewing VPN TunnelsYou can view a list of currently established VPN tunnels. A VPN tunnel is created whenever your computer attempts to communicate with a computer at the VPN site, after you have logged on to the site. When you log off, all open tunnels connecting to a VPN site are closed.

To view VPN tunnels1. Click Reports on the main menu.

The Event Log page appears.2. In the submenu, click VPN Tunnels.

The VPN Tunnels page appears with a table of open tunnels to VPN sites.

Table 22 VPN Tunnels includes the following columnsTable 22 VPN Tunnels

Column Information

Site VPN site name.

Username User logged on to the VPN site.

Nokia IP40 Security Platform User’s Guide v1.1 157

Page 158: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

13 Viewing Reports

You can refresh the table by refreshing the browser.

Viewing the Diagnostics SummaryYou can view the diagnostics summary for your device from the IP40 GUI. The diagnostics summary provides useful information about your device, such as node limit, network status, primary network status, secondary network status, my network status, setup state, users state, security, and subscription services. Apart from this, you can get the following basic information about your IP40 from the diagnostics summary.

To view the diagnostics summary1. From the main menu, select Setup > Tools.

The Tools page appears.2. Click Diagnostics, on the right side.3. The Diagnostics window opens.The following figure shows a sample section of the

diagnostics window that displays information about your IP40.

Encryption Type

Type of encryption used to secure the connection, followed by the type of authentication used to verify the user’s identity.This information is presented in the following format:Encryption Type/ Authentication Type.

Established Time

Time when the VPN Tunnel is established.This information is presented in the following format:Hour:Minute:Second.

VPN Gateway

IP Address of the VPN Gateway to which the tunnel is connected.

Table 22 VPN Tunnels

Column Information

158 Nokia IP40 Security Platform User’s Guide v1.1

Page 159: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Viewing Reports on Nokia IP40 Security Platform

4.

5. Use the scroll bar to view more information.

Nokia IP40 Security Platform User’s Guide v1.1 159

Page 160: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

13 Viewing Reports

160 Nokia IP40 Security Platform User’s Guide v1.1

Page 161: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

About VPN

14 Working with VPNs

This chapter describes how to use the Nokia IP40 as a VPN client, server or gateway. It includes the following topics:

About VPNSetting Up Nokia IP40 as a VPN ServerConfiguring Remote Access VPNsNokia Satellite X to Nokia Satellite X (VPN Gateway to Gateway)VPN ScenariosVPN Routing Between Two Nokia IP40 Security PlatformsNokia IP40 Tele 8 to Check Point FP1,FP2, FP3, NG, or NG AINokia IP40 Tele 8 to Check Point NG AI

About VPN In addition to a full firewall functionality, the Nokia IP40 Tele 8, and Nokia Satellite X enables secure telecommuter access from home to the office network through the virtual private network (VPN) functionality.VPN consists of at least one VPN server or gateway, and several VPN clients. A VPN server makes the corporate network remotely available to authorized users, such as employees working from home, who connect to the VPN server by using VPN clients. A VPN gateway can be connected to another VPN gateway in a permanent, bidirectional relationship. The two connected networks function as a single network.A connection between two VPN sites is called a VPN tunnel. VPN tunnels encrypt and authenticate all traffic passing through them. Through these tunnels, you can safely use your company network resources when you work at home. For example, you can securely read email, use your company intranet, or access your company database from home.The Nokia IP40 Tele 8, and Satellite 16/32/U licenses provide VPN functionality. Nokia IP40 Tele 8 contains a VPN client and can act as a VPN server. Nokia IP40 Satellite 16/32/U can act as a VPN client, a VPN server, or a VPN gateway.Both Nokia IP40 Tele 8, and Nokia IP40 Satellite X enables a number of solutions to support your VPN connectivity needs that are explained in the subsequent sections.

Nokia IP40 Security Platform User’s Guide v1.1 161

Page 162: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

Figure 5 VPN Topologies

Table 23 VPN Topologies

VPN Client Gateway

SecuRemote, R55/R56 VPN Client

Nokia IP40 Satellite

Nokia IP40 Tele Nokia IP40 Satellite

Nokia IP40 Tele Check Point NG AI, NG, FP3, FP2, FP1

Nokia IP40 Tele Check Point NG AI using VPN-1 Edge/Embedded Gateway (RAS Community)

Nokia IP40 Satellite (Gateway) Nokia IP40 Satellite (Gateway)

Nokia IP40 Satellite (Gateway) Check Point NG AI, NG, FP3, FP2, FP1

Nokia IP40 Satellite Check Point NG AI using VPN-1 Edge/Embedded Gateway Check Point Smart LSM using VPN-1 Edge/Embedded ROBO Gateway.

SecuRemoteCheck Point NG AI/NG/FP1/FP2/VPN-1Edge/Embedded Gateway (RAS community)

Check Point Smart LSM (VPN-1Edge/Embedded ROBO Gateway)Check Point NG AI/NG/FP1/FP2/FP3 (DAIP)VPN-1Edge/Embedded Gateway (Star VPN community) Windows 2000 (server and host)

VPN Clients VPN Gateway

IP40 Tele

IP40 Satellite

IP40 Satellite VPN-1 Gateway

162 Nokia IP40 Security Platform User’s Guide v1.1

Page 163: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Setting Up Nokia IP40 as a VPN Server

Setting Up Nokia IP40 as a VPN ServerUsing Nokia IP40 Security Platform, you can make your network remotely available to authorized users by setting up your Nokia IP40 as a VPN server. Remote access users can connect to the VPN server through Check Point SecuRemote or a Nokia IP40 VPN client in remote access VPN mode.IP40 Tele and Satellite both provide VPN functionality. Nokia IP40 Tele license contains a VPN client and can act as a VPN server. Nokia IP40 satellite can act as a VPN client, a VPN server, or a VPN gateway.

To set up your IP40 as a VPN server1. Click VPN on the main menu.

The VPN Server page appears.

2. Drag the Enabled/Disabled lever to Enabled.The VPN server is enabled.

3. Follow the procedures in “Setting Up Remote VPN Access for Users” on page 109.

Nokia IP40 Satellite Check Point NG AI using VPN-1 Edge/Embedded Gateway (Star Community)

Nokia IP40 Satellite Windows 2000, Nokia CryptoCluster series, CISCO PIX.

Table 23 VPN Topologies

VPN Client Gateway

Nokia IP40 Security Platform User’s Guide v1.1 163

Page 164: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

NoteTo allow authenticated users to access your internal network without restriction, and bypass NAT, select Unrestricted access.

Configuring Remote Access VPNsThe following sections describe about how to configure a remote access VPN and VPN site.

To configure a remote access VPN 1. Click VPN in the main menu, and click the VPN Sites tab.2. Click New Site at the bottom of the page.3. The IP40 VPN site wizard appears.

If you select Remote Access VPN, the VPN Network Configuration dialog box appears.

To configure a remote access VPN site1. Enter the IP address of the VPN gateway.2. Do one of the following:

To obtain the network configuration by downloading it from the VPN site, select Download Configuration. This option automatically configures your VPN settings by downloading the network topology definition from the VPN server.

NoteYou can download the network configuration only if you are connecting to a Check Point VPN-1 or Nokia IP40 Security Platform.

To provide the network configuration manually, select Specify Configuration.To route all network traffic through the site, including Internet traffic, select Route All Traffic in the GUI wizard.

This option increases network security. For example, if your VPN consists of a central office and a number of remote offices, and the remote offices are allowed to access the Internet resources through the central office only, you can choose route all traffic from the remote offices through the central office.

NoteYou can configure only one VPN site to route all traffic.

3. Click Next.The following happens in this order:

164 Nokia IP40 Security Platform User’s Guide v1.1

Page 165: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Remote Access VPNs

If you choose Specify Configuration, a second VPN Network Configuration dialog box appears. Do the following:a. In the Destination network column, enter up to three destination network addresses at the

VPN site to which you want to connect.b. In the Subnet mask column, select the subnet masks for the destination network

addresses.

NoteObtain the destination networks and subnet masks addresses from the VPN gateway’s system administrator.

c. In the configure backup gateway column, type the name of the VPN gateway to use if the primary VPN gateway fails.

NoteThe backup gateway can be configured only in case of Check Point Multiple Entry Point. For information about how to configure the primary and secondary Check Point management stations, see the Check Point Multiple Entry Point document.

d. Click Next.The VPN Login page appears.

4. Do one of the following:a. To configure the site for manual login, select Manual Login. Enter a username and

password to be used for logging on to the VPN site.b. To enable the IP40 to log on to the VPN site automatically, Select Automatic Login

Nokia IP40 Security Platform User’s Guide v1.1 165

Page 166: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

NoteWhile automatic login provides all of the computers on your home network with constant access to the VPN site, manual login connects only to the computer you are currently logged from, and only when the appropriate username and password are entered.

For more information on automatic and manual Login, see “Logging to a VPN Site” on page 170The Connecting window appears.The Contacting VPN Site window appears.

5. Click Next.Proceed to “Completing Site Creation” on page 169.

NoteThe automatic login option in the GUI is supported for Nokia IP40 Satellite X and only manual login is available for Nokia IP40 Tele license.

Configuring Site-to-Site VPN If you selected site-to-site VPN, the VPN Gateway Address window appears.

To configure a site-to-site VPN gateway1. Enter the IP address of the VPN gateway as given to you by the network administrator.2. Check the Unrestricted Access check box if the NAT rules should be bypassed, and to allow

the VPN site to access your internal network without restrictions.3. Click Next.

166 Nokia IP40 Security Platform User’s Guide v1.1

Page 167: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Remote Access VPNs

The VPN Network Configuration window appears

4. Select the Download Configuration, the Authentication window appears:

5. if the topology is to be downloaded.a. Enter the Topology username, and Topology password.b. Check Use Shared Secret or Use Certificate, depending on the secure communication

method to be used.c. If you choose Use Shared Secret, enter the Shared Secret.

6. If Specify Configuration option is selected, the following window appears:

Nokia IP40 Security Platform User’s Guide v1.1 167

Page 168: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

a. In the Destination network column, enter up to three destination network addresses at the VPN site to which you want to connect.

b. In the Subnet mask column, select the subnet masks for the destination network addresses.

NoteObtain the destination networks and subnet masks from the VPN site system administrator.

c. Click Next.The Authentication window appears.

168 Nokia IP40 Security Platform User’s Guide v1.1

Page 169: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Remote Access VPNs

d. Enter the shared secret to use for secure communications with the VPN site.This shared secret is a string used to identify the VPN sites to each other. The secret can contain spaces and special characters.

e. Click Next.7. If the Route All Traffic option is selected, you are ready to complete your VPN site. See

Completing Site Creation on page 169, to continue.

Completing Site CreationWhen you configure a VPN site, the Site Name dialog box appears.

To complete VPN site creation1. Enter a name for the VPN site. You may choose any name.2. Click Next.

The VPN Site Created window appears.a. Enter the Site nameb. If the Keep Alive Option is selected enter the Host IP address.

The connection is kept active by sending packets to the IP address that you enter.3. Click Finish.

The VPN Sites page reappears. If you added a VPN site, the new site appears in the VPN Sites list. If you edited a VPN site, the modifications are reflected in the VPN Sites list.

NoteYou can see the downloaded topology on your IP40 device from http://my.firewall/vpntopo.html

Deleting a VPN SiteYou can delete a VPN site from the IP40 Tele 8 and IP40 Satellite X.

To delete a VPN site 1. Click VPN on the main menu.

The VPN Server page appears. 2. Click VPN Sites.

The VPN Sites page appears with a list of VPN Sites.

Nokia IP40 Security Platform User’s Guide v1.1 169

Page 170: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

3. In the desired VPN site row, click the Erase icon.A confirmation message appears.

4. Click Ok. The VPN site is deleted.

Logging to a VPN SiteIf you chose automatic login, a VPN tunnel is created automatically when you try to access the VPN site.If you chose manual login, log on to a VPN site every time you want to access the VPN site. You can log on to a VPN site either through the Nokia IP40 GUI or the my.vpn page. When you log on, a VPN tunnel is established. Only the computer from which you logged on can use the tunnel. To share the tunnel with other computers in your home network, you must log on to the VPN site from those computers, using the same username and password.

NoteYou can use a single username and password for each VPN destination gateway.

170 Nokia IP40 Security Platform User’s Guide v1.1

Page 171: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Configuring Remote Access VPNs

Logging on from the Nokia IP40 Security Platform GUITo log on to a VPN site from the Nokia IP40 GUI, do the following:1. Click VPN.

The VPN Sites page appears, with a list of VPN sites.2. In the VPN submenu, click VPN Login.

The VPN Login page appears.

3. Select the site to log on to.

4. Enter your username and password in the appropriate fields.5. Click Connect.

If your IP40 is configured to automatically download the network configuration, the IP40 downloads the network configuration.If you specified a network configuration when you add the VPN site, the IP40 attempts to create a tunnel to the VPN site.The VPN Login Status dialog box and the Connecting window appears. When the IP40 is finished connecting, the Status field changes to Connected. The VPN Login Status dialog box remains open until you log off of the VPN site.

When the IP40 is finished connecting, the status changes to connected.

Nokia IP40 Security Platform User’s Guide v1.1 171

Page 172: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

Logging On Through my.vpn

NoteYou do not need to know the my.firewall page administrator's password to use the my.vpn page.

To log on to a VPN site through the my.vpn page1. Go to http://my.vpn.The VPN Login window appears.

172 Nokia IP40 Security Platform User’s Guide v1.1

Page 173: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Installing VPN Certificates

2. Select the site to which you want to log on. 3. Enter your username and password in the appropriate fields.4. Click Connect:

If the IP40 is configured to automatically download the network configuration, the IP40 downloads the network configuration.When adding the VPN site, if you specified a network configuration, the IP40 attempts to create a tunnel to the VPN site.The VPN Login Status dialog box appears. The Status field tracks the progress of the connection.When the IP40 is finished connecting, the Status field changes to Connected.The VPN Login Status box remains open until you log off of the VPN site.

Logging Off a VPN SiteYou need to manually log off a VPN site if:

You are using IP40 Tele.The VPN site is a remote access VPN site configured for manual login.

To log off from a VPN site, in the VPN Login Status dialog box, click Close. All open tunnels from the IP40 to the VPN site are closed, and the VPN Login Status dialog box closes.Closing the browser or dismissing the VPN Login Status box also terminates the VPN session within a short time.

Installing VPN CertificatesA digital certificate is a secure means of authenticating the Nokia IP40 Security Platform to other VPN gateways. The certificate is issued by the Certificate Authority (CA) to entities such as gateways, users or computers. The entity then uses the certificate to identify itself and provide verifiable information. For instance, the certificate includes the distinguishing name (DN - identifying information) of the entity, as well as the public key (information about itself). After two entities exchange and validate each other’s certificates, they can begin encrypting information between themselves by using the public keys in the certificates. The Nokia IP40 Security Platform supports certificates encoded in the personal information exchange syntax standard (PKCS) format. The PKCS#12 file must have a.p12 file extension. If you do not have a PKCS#12, obtain it from your network security administrator.

NoteTo use certificates authentication, each Nokia IP40 Security Platform should have an unique certificate. Do not use the same certificate for more than one gateway.

Nokia IP40 Security Platform User’s Guide v1.1 173

Page 174: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

To Install VPN certificates manually1. Click VPN in the main menu and click Certificates.

The VPN Certificate page appears as follows:

2. Click Install CertificateThe certificate page appears as follows:

3. Click Browse to open a file browser. Locate and select the file.4. Click Upload.

you will be prompted to enter the pass phrase.5. Type the pass-phrase that your received from the network administrator.6. Click Ok.

Your certificate is installed, and a success message appears. 7. Click Ok.

174 Nokia IP40 Security Platform User’s Guide v1.1

Page 175: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Installing VPN Certificates

The name of the CA that issues the certificate, and the name of the gateway to which this certificate was issued, appear.

Installing VPN Certificates by Using CLIYou can download and install the VPN certificate by using the command line interface.Use the following command to install the certificate on the device:

set vpn certificate <file name>

Installing VPN Certificates from SmartCenter VPN certificates are used to authenticate a VPN connection established between Check Point SmartCenter NG AI that uses Check Point Large Scale Manager and the dynamically configured IP40 security platform that uses the DAIP.The certificate created on the Check Point NG AI can be uploaded to the IP40 Satellite.

To upload VPN certificates and to create a dynamic VPN site by using Check Point Smart LSM1. Click Services on the main menu, and then choose Connect.

The Subscription Services wizard appears.2. Enter the IP address of the Check Point NG AI Management station.

The Connecting window appears.3. Enter the Gateway ID and Registration Key which is used while creating the IP40 Dynamic

Object on the LSM.4. The Connecting window appears.

When the connection is complete, the list of Services downloaded is displayed.5. Click Finish.6. Click VPN on the main menu and click the VPN Certificate tab.

Nokia IP40 Security Platform User’s Guide v1.1 175

Page 176: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

7. Click the VPN Sites tab to see the Dynamic VPN tunnel created between your Nokia IP40 and the Check Point NG AI management station.

Uninstalling the Certificate from your Nokia IP40 Security Platform

Follow this procedure to uninstall VPN certificate from Nokia IP40 Security Platform.

To uninstall certificate from Nokia IP401. Click Services on the main menu, and then choose Connect.

The Subscription Services Wizard appears.2. Uncheck I wish to Connect to the Service Center.3. Click Next.4. Click Finish.5. Click VPN on the main menu and select the VPN Sites tab.

The Site is automatically deleted6. Select VPN Certificates tab and click Uninstall Certificate to delete the certificate.

Downloading the Pre-compiled Security PolicyFor traditional policy management solutions, create a customized policy for each individual customer. You can upload the customized High-Medium-Low *.pfz file from the SmartCenter server to the Nokia IP40 Security Platform. The Check Point INSPECT engine enables you to dynamically update a security policy, adding support for new applications and attaching signatures to a firewall. The downloading procedure is as follows:1. The Check Point policy editor generates an INSPECT code.

NoteThe INSPECT library can be manually edited by a network security professional in order to add support for special applications.

2. The policy editor adds policy rules to the INSPECT library and compiles a *.pfz (single compressed signed file) file.

3. The *.pfz file is then downloaded to the Nokia IP40 Security Platform by using the CLI.Use the following commands to download the security policy:

download policyurl urlname[user username][password password]

176 Nokia IP40 Security Platform User’s Guide v1.1

Page 177: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Downloading the Pre-compiled Security Policy

Use the following commands to install the security policy manually:

set vpn policy <file name>

filename is the name of the file, downloaded.

Installing the Security Policy by Using GUIYou can install the security policy by using the graphical user interface (GUI) also. The procedure is described in the following sections:

To install the security policy by using GUI1. Click Setup on the main menu.

The Firmware window appears

2. Click Firmware Update.The Firmware Update window appears.

Nokia IP40 Security Platform User’s Guide v1.1 177

Page 178: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

3. Click Browse.A browse window appears.

4. Select the policy file that you purchased.5. Click Upload.6. The IP40 policy is updated.

NoteYou can verify the new security policy form Diagnostics page. See “Running Diagnostics” on page 221 for more information.

VPN ScenariosNokia IP40 Security Platform supports the following VPN scenarios:

NoteThe following sections provide only an introduction to the VPN scenarios supported by Nokia IP40 Security Platform. They DO NOT discuss the complete usage scenario. For more information about usage scenarios, contact the Nokia support site.

Nokia IP40 as VPN ServerNokia IP40 as a VPN server supports the following scenario:

178 Nokia IP40 Security Platform User’s Guide v1.1

Page 179: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

VPN Scenarios

SecuRemote to Nokia IP40 Satellite X (VPN Client to Gateway)This VPN topology enables Nokia IP40 Tele 8, Nokia IP40 Satellite X, Check Point SecuRemote and SecureClient VPN clients to connect to an IP40 Satellite X acting as a VPN server.

NoteIn this configuration, the IP40 Satellite X VPN server must have a static IP address and domain name.

The following figure shows sample implementation of the VPN client-to-IP40 Satellite X VPN server solution, in which two IP40 devices, a Check Point SecuRemote, and a Check Point SecureClient act as VPN clients that download topology information from the IP40 Satellite X VPN server.

Figure 6 SecuRemote and SecureClient to Satellite X

Setting Up Nokia IP40 Satellite XConfigure a VPN tunnel between SecuRemote and IP40 Satellite X.

To set up IP40 Satellite X 1. Add a User. 2. Enable VPN Access for the user.

IP40 TeleExt: 66.93.53.4/22�

Int: 192.168.10.1/22

IP40 HUBExt: 66.93.53.2/22Int: 192.168.1.1/22

IP40 SatelliteExt: 66.93.53.3/22�

Int: 192.168.11.1/22

192.168.10.1/22

SecuRemote SecureClient

192.168.11.0/22

192.168.1.0/22

Tele - manual mode VPNSatellite - Automatic mode VPN

Nokia IP40 Security Platform User’s Guide v1.1 179

Page 180: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

3. Enable a VPN server.

Setting Up SecuRemote

Define your VPN sites as IP40 Satellite X to set up SecuRemote. For configuring remote to site VPN between Nokia IP40 Satellite x and a VPN client using hybrid mode authentication with RADIUS server see Hybrid mode authentication of Nokia IP40.doc

NoteWhile establishing a remote to site VPN between Nokia IP40 Satellite x and securemote R55/ R56, ensure that IP40 has a VPN certificate installed in the device.

For information about how to configure SecuRemote, see Check Point Desktop Security Guide

Nokia IP40 as VPN ClientThe following are supported.

Remote access VPN with another IP40Remote access VPN with VPN-1

For more information on remote access VPNs, see “Configuring Remote Access VPNs” on page 164.

Setting Up the Nokia IP40 Tele 8 as VPN ClientYou can configure the IP40 Tele 8 as a VPN client.

To enable the VPN client functionality in your IP40 deviceIf you have subscribed to security services, then connect with your service provider or enterprise and receive a security subscription.If you are using the IP40 in a standalone mode, add the license manually.

Adding VPN Sites by Using Nokia IP40 Tele 8Using Nokia IP40 Tele 8 licenses, you can define only remote access VPN sites. To define site-to-site VPN gateways, you must have IP40 Satellite X license.VPN sites represent VPN gateways to which you can connect. You must define VPN sites before you connect to them.

To add or edit VPN sites1. Click VPN on the main menu.

The VPN Sites page appears, with a list of VPN sites.

180 Nokia IP40 Security Platform User’s Guide v1.1

Page 181: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

VPN Scenarios

2. Do either of the following: a. To add a VPN site, click New Site.b. To edit a VPN site, click Edit in the desired VPN site row.:If you click the option a, the Nokia VPN Site Wizard opens, as shown in the following window:

3. Click Next.The VPN Gateway Address dialog box appears.

4. Enter the IP address of the VPN gateway to connect to as given by the network administrator.

5. Click Next. The VPN Network Configuration dialog box appears.

Nokia IP40 Security Platform User’s Guide v1.1 181

Page 182: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

6. Do one of the following: Download Configuration—to obtain network configuration from a VPN site. This option automatically downloads the network topology (gateway information and rules) from the VPN site. Specify Configuration—to provide the network configuration manually.Route All Traffic—to route all network traffic from the VPN site.

NoteYou can download the network configuration only if you are connecting to a Check Point VPN-1 or Nokia IP40 Satellite X VPN Gateway.

To specify configuration

7. If you chose Specify Configuration in the preceding procedure, a dialog box appears.

8. Enter destination network address and subnet mask of the site to connect.

NoteObtain destination network and subnet mask from the VPN gateway system administrator.

9. Click Next.The Site Name dialog box appears.

10. Enter a name for the VPN site.11. Click Next.The VPN Site Created window appears.

182 Nokia IP40 Security Platform User’s Guide v1.1

Page 183: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

VPN Scenarios

12. Click Finish.13. Select the VPN Login tab.

Login if you need to authenticate each time a VPN tunnel is created.For all the computers connected to the LAN network of the Nokia IP40 Tele 8 user has to manually login with the same user name and password on all the login all pages of the connected computers.

NoteAutomatic Login feature is not available for IP40 Tele 8 License.

To download configuration

If you chose Download Configuration in Adding VPN sites by using IP40 Tele 8, a dialog box appears.1. Click Next, the Network Topology is downloaded from the specified VPN gateway.

The VPN Login page appears.2. Follow steps 9 to 13 in “To specify configuration” on page 182, to proceed.The VPN sites page updates with the added VPN sites. If you edited a VPN site, the modifications are reflected in the VPN sites list.To route all traffic

If you chose Route All Traffic in Adding VPN sites by using the IP40 Tele 8, the VPN Network Configuration dialog box appears with the following message:

Only one VPN Profile can be configured as Route All Traffic.1. Check either Download Configuration or Specify Configuration, depending on how you

want to obtain the VPN network configuration2. Follow steps 9 to 13 in “To specify configuration” on page 182 to proceed.

Nokia IP40 Security Platform User’s Guide v1.1 183

Page 184: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

Nokia IP40 Site-to-Site VPNs supportThe following sections describe about site-to-site VPNs, and the modes they support.

Adding VPN Sites by Using Nokia IP40 Satellite XYou can define each VPN site according to the function you want IP40 Satellite X to perform when connecting to the site:

VPN Client—define the VPN site as a remote access VPN site using the following procedure.VPN Gateway—do the following:

Define the second VPN site as a site-to-site VPN gateway by using the following procedure.Define the first VPN site as a site-to-site VPN gateway.

To add or edit VPN sites by using Nokia IP40 Satellite X1. Click VPN on the main menu.

2. The VPN Server page appears3. .In the VPN submenu, click VPN Sites.

The VPN Sites page appears with a list of VPN sites.4. Do either of the following:

To add a VPN site, click New Site.To edit a VPN site, click Edit in the desired VPN site row.

The IP40 VPN Site Wizard opens, with the Welcome to the VPN Site Wizard dialog box displayed.

184 Nokia IP40 Security Platform User’s Guide v1.1

Page 185: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele to IP40 Satellite X (VPN Client to Gateway)

5. Do one of the following:Select Remote Access VPN to establish remote access from your VPN client to a VPN server or gateway.Select site-to-site VPN to create a permanent bidirectional connection to another gateway.

6. Click Next.The VPN Gateway Address dialog box appears.

7. Enter the IP address of the VPN gateway to connect, as given to you by the network administrator.

8. Click Next.9. The VPN Network Configuration dialog box appears. See “Setting Up Nokia IP40 as a VPN

Server” on page 163 to proceed.The Reports > VPN tunnels page allows you to view the active VPN tunnels with the Phase-I negotiation used.In order to see the Phase-II negotiation refer to Reports > Active Connections and point the mouse on the lock symbol of the FTP, HTTPS, SSH traffic passing through the VPN tunnel.

Nokia IP40 Tele to IP40 Satellite X(VPN Client to Gateway)

Nokia IP40 Tele 8 functions in VPN client mode, in which connection is initiated only by the VPN client.Nokia IP40 Tele 8 uses only a manual mode VPN connection. To select the VPN gateway to which you want to establish a VPN connection, go to http://my.vpn.

Figure 7 IP40 Tele 8 as VPN Client

If the VPN client is enabled, the IP40 GUI main menu includes a VPN menu option. In addition, the Reports pages include an additional VPN Tunnels submenu that allows you to view the active VPN tunnels.

Non Routable IPsNetwork 1

Non Routable IPsNetwork 2

Initiate VPN Session/ Tunnel

IP40 Tele IP40 Satellite

Nokia IP40 Security Platform User’s Guide v1.1 185

Page 186: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

Setting Up Nokia IP40 Tele 8Configure a VPN tunnel between an IP40 Tele 8 and an IP40 Satellite X.

Setting Up Nokia IP40 Satellite XConfigure a VPN tunnel between an Nokia IP40 Tele 8 and an Nokia IP40 Satellite X.

To set up Nokia IP40 Satellite X1. Add a User.2. Enable VPN remote access for the user you added.3. Enable the VPN Server.

Nokia IP40 Tele 8 to Check Point FP1,FP2, FP3, NG, or NG AI

You can use the IP40 Tele 8 as a VPN client to establish a Remote to Site VPN connectivity with a Check Point server by using version 4.1, FP1, FP2, FP3, NG, or NG AI.For more information, see Check Point documentation

Setting Up Nokia IP40 Tele 8Configure a VPN tunnel between an IP40 Tele 8 and an IP40 Satellite X.

Setting Up Check Point ServerOpen the Check Point policy editor and select the Firewall-1/ VPN -1 workstation object that will receive the VPN-1 Edge/Embedded gateway session request.For more information, see Check Point FP3 documentation

Nokia IP40 Tele 8 to Check Point NG AIThe Nokia IP40 Tele 8 can be used as a VPN client to establish a VPN connectivity with Check Point NG AI server using VPN-1 Edge/Embedded gateway dynamic object. This topology uses a remote access VPN community.IP40 Tele 8 uses a manual mode VPN connection only.To select the VPN gateway to establish a VPN connection, go to http://my.vpn.

186 Nokia IP40 Security Platform User’s Guide v1.1

Page 187: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele 8 to Check Point NG AI

Setting Up Nokia IP40 Tele 8To configure a VPN tunnel between Nokia IP40 Tele 8 and Check Point FP3, on IP40 Tele 8, (VPN client) add a VPN site.

Setting Up Check Point NG AIConfigure a VPN-1 Edge/Embedded gateway object on the Check Point Smart Dashboard.

To set up Check Point NG AI1. Create a gateway by using Check Point > VPN-1 Edge/Embedded gateway.2. Create a user and add the user to the VPN users group.3. Create a remote access VPN community.

Include NG AI firewall object in the participating gateway.Include the Users group in the participating users.

4. In the policy editor, create a rule with the following parameters:Source User: anyDestination: anyThrough: remote access communityTarget: NG AI firewall object

NoteYou can also use Check Point FP3 or FP4 in place of NG AI.

Nokia Satellite X to Nokia Satellite X (VPN Gateway to Gateway)

The VPN configuration between Nokia IP40 Satellite X and another Nokia IP40 Satellite X enables you to establish site-to-site VPN connections between two Nokia IP40 site-to-site VPN gateways.

NoteIn this configuration, both Nokia IP40 Satellite X site-to-site VPN gateways must have a static IP address.

Figure 8 on page 188 shows a sample implementation of the Satellite X to Satellite X solution with three Satellite X devices. Each Nokia IP40 device acts as a Site-to-Site VPN gateway for a fully secure network. The networks communicate through VPN connections.

Nokia IP40 Security Platform User’s Guide v1.1 187

Page 188: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

Figure 8 Nokia IP40 Satellite X to Nokia IP40 Satellite X

Setting Up Nokia IP40 Satellite XConfigure a VPN tunnel between two Nokia IP40 Satellite X devices (site-to-site VPN).

To set up the IP40 Satellite X1. Specify the IP address of Nokia IP40 Satellite X on the remote Nokia IP40 Satellite X.2. Enter the shared secret (a password that is known to both the IP40 Satellite X devices).

To set up the remote Nokia IP40 Satellite X1. Specify the IP address of your IP40 Satellite X.Enter the shared secret (a password that is known to both the IP40 Satellite X devices.)

Nokia IP40 Satellite X in NAT and No-NAT ModesVPN configuration allows you to choose how your VPN should function. Use of NAT and No-NAT modes offer great flexibility. NAT mode allows you to define VPNs at peer gateway sites without knowing the protected network behind the IP40 devices.To access a resource that is protected by a VPN in NAT mode, you must contact the hiding (Internet) address of the VPN gateway. Your request is then forwarded to the correct computer in the protected network according to the defined security rules. To access a resource that is protected by a VPN in No-NAT mode, you must contact the IP address of the final computer in the destination network that you want to reach.

NoteYou can establish VPN tunnels between a combination of NAT and No-NAT devices. This possibility is not discussed in this guide.

SatelliteExt: 66.93.53.4/22�nt: 192.168.10.1/22

SatelliteExt: 66.93.53.5/22

Int: 192.168.20.1/22

SatelliteExt: 66.93.53.3/22�

Int: 192.168.12.1/22

192.168.10.1/22 192.168.12.0/22

192.168.20.0/22

188 Nokia IP40 Security Platform User’s Guide v1.1

Page 189: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele 8 to Check Point NG AI

Unrestricted Modeif you select unrestricted mode while configuring site-to-site VPNs, the traffic will reach both the internal networks of the VPN sites irrespective of the NAT rules.

NoteYou can use No-NAT mode only with IP40 Satellite X.

Figure 9 on page 189 shows a site-to-site VPN in No-NAT or unrestricted mode. Both VPN peers are considered site-to-site VPN gateways, and traffic is directly established from the source host to the destination host. In this example, hosts on either network can initiate traffic to hosts on the peer network. Both network 1 and network 2 are uses routable IP addresses.

Figure 9 No-NAT Mode

NAT ModeUse NAT mode in site-to-site VPNs, where bidirectional initiation of traffic between networks using public IP addresses is required.“NAT Mode” shows two instances of a site-to-site VPN gateways in NAT mode.

Figure 10 NAT Mode

Solution A: Nokia IP40 Satellite X to VPN-1 (Site-to-Site VPN)Hosts on Network 1 establish the TCP/IP connection to the external IP address of the IP40 Satellite X site-to-site VPN gateway. The IP40 Satellite X device is configured through the IP40 GUI Security page to port forward the inbound traffic to the defined host.

Solution B: Nokia IP40 Satellite X to Satellite X (Site-to-Site VPN)IP40 Satellite X supports the creation of site-to-site VPN connections between two or more IP40 Satellite X devices. Hosts on either network can directly initiate traffic to hosts on the peer

Nokia IP40 Security Platform User’s Guide v1.1 189

Page 190: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

network. The IP40 Satellite X is configured through the IP40 GUI Security page to port forward the inbound traffic to the defined host.

Defining a Backup VPN GatewayYou can define backup VPN gateway to support the main or primary VPN gateway. If the primary VPN gateway fails, the back up gateway takes over.

To define a backup VPN Gateway1. Click VPN from the main menu, and select the VPN Sites tab.2. Click the New Site at the bottom of the page.

The VPN Site Wizard page appears.3. Select Site-to-Site VPN, and click Next.

The VPN Gateway address page appears.4. Enter the IP address of the primary Check Point management station with enforcement

module, and click Next.The VPN Network Configuration page appears.

5. In the Destination Network text box 1, enter the network address behind the primary Check Point management station with enforcement module.Enter 255.255.255.0 as the subnet mask.

6. In the Destination Network text box 2, enter the network address behind the secondary Check Point management station with enforcement module.Enter 255.255.255.0 as the subnet mask.

7. Enter the IP address of the secondary Check Point management station in the Backup Gateway field.

For information about how to configure the primary and secondary Check Point management stations, see the Check Point Multiple Entry Point document.

Nokia IP40 Satellite X to VPN-1 (Site-to-Site VPN)Nokia IP40 Satellite X to VPN-1 or Check Point v4.1, FP1, FP2, FP3, NG, or NG AI configuration enables you to establish site-to-site VPN connections between an IP40 Satellite X site-to-site VPN gateway and a VPN-1 site-to-site VPN gateway.

NoteIn this solution model, both the VPN-1 and IP40 Satellite X site-to-site VPN gateways must have a static IP address.

Figure 11 on page 191 shows an implementation of the IP40 Satellite X to Check Point VPN-1 solution, in which two IP40 Satellite X devices are connected to a VPN-1 site-to-site VPN gateway.

190 Nokia IP40 Security Platform User’s Guide v1.1

Page 191: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele 8 to Check Point NG AI

Figure 11 Nokia IP40 Satellite X to VPN-1

Setting Up Nokia IP40 Satellite XConfigure a VPN tunnel between a Nokia IP40 Satellite X and Check Point VPN-1 server or gateway.

To configure Nokia IP40 Satellite X1. Specify the IP address of Nokia IP40 Satellite X on the VPN-1 server.2. Enter the shared secret (a password that is known to both the IP40 Satellite X and the VPN-

1 Server).

NoteFor information about how to set up VPN-1, see the Check Point Virtual Private Network documentation.

Nokia IP40 Satellite X to Check Point FP3 or DAIPYou can use Nokia IP40 Satellite X as a VPN server to establish a VPN connectivity with Check Point FP3 server by using Check Point FP3 DAIP object.

Setting Up Check Point FP3Configure a VPN tunnel between an IP40 Satellite X and Check Point FP3 server.

To set up Check Point FP31. Define a DAIP object.

Enable IKE.2. Use the VPN export tool to create a.p12 certificate from the internal certificate defined for

the DAIP object.

SatelliteExt: 66.93.53.4/22�

Int: 192.168.10.1/22

VPN-1 (Hub)Ext: 66.93.53.2/22Int: 192.168.1.1/22

Check PointFirewall-1 NG

SatelliteExt: 66.93.53.3/22�

Int: 192.168.11.1/22

192.168.10.0/22 192.168.11.0/22

192.168.1.0/22

Nokia IP40 Security Platform User’s Guide v1.1 191

Page 192: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

3. Configure a rule, set with the following parameters:Source: internal network of the IP40 DAIP objectDestination: internal network of FP3Select Encrypt

4. Push the policy on to the FP3 firewall object.5. Import the certificate to the computer to which the IP40 Satellite X is connected.

Use FTP or a floppy disk to import the certificate.

Setting Up Nokia IP40 Satellite XConfigure a VPN tunnel between an IP40 Satellite X and Check Point FP3 server.

To set up Nokia IP40 Satellite X1. On the IP40 GUI, click VPN.

The VPN page appears.2. Click Certificates.

On the Certificates page, browse for the certificate.Click Upload.

3. Enter the Certificate pass phrase that you use to create the certificate.4. Click OK.When you create a VPN connection between IP40 Satellite X and Check Point FP3, select Use Certificate instead of Use Shared Secret.

Nokia IP40 Satellite X to Check Point SmartCenter FP3/NG AI You can use Nokia IP40 Satellite X as a VPN server to establish a VPN connectivity with SmartCenter FP3/NG AI server by using VPN-1 Edge/Embedded gateway or using VPN-1 Edge/Embedded ROBO gateway in case of Smart LSM (VPN Star Community).

Setting Up Check Point SmartCenter FP3/NG AIConfigure the Check Point SmartCenter FP3 for a VPN connection with Nokia IP40 Satellite X.

To set up Check Point SmartCenter FP3/NG AI1. Define a VPN-1 Edge/Embedded Gateway.2. Create a new Star Community.3. Configure a VPN central gateway as the FP3 firewall object.4. Configure VPN-1 Edge/Embedded gateway as a Satellite X gateway.5. Define access rules with the following parameters:

192 Nokia IP40 Security Platform User’s Guide v1.1

Page 193: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele 8 to Check Point NG AI

Source: anyDestination: anyIf Via: Remote accessAction: acceptInstall On: FP3 firewall object

Setting Up the Nokia IP40 Satellite Xfor VPN connection with SmartCenter FP3The following sections describe about how to setup Nokia IP40 Satellite X for VPN configuration with SmartCenter FP3:

To configure the IP40 Satellite X for VPN connection with SmartCenter FP31. Specify the IP address of Nokia IP40 Satellite X on the VPN-1 server.2. Enter the shared secret (a password that is known to both the IP40 Satellite X and the VPN-

1 Server).

Setting Up Check Point SmartCenter NG AI by UsingCertificates with Smart LSMConfigure the Check Point SmartCenter NG AI for a VPN connection with Nokia IP40 Satellite X using Certificates with Smart LSM.

To set up Check Point Smart LSM1. Define a VPN-1 Edge/Embedded ROBO gateway with a dynamic IP address on the Smart

LSM.2. Create a Check Point Smart LSM object on the Check Point Smart Dashboard.3. Create a new Star Community.4. Configure a VPN central gateway as the NG AI firewall object.5. Configure VPN-1 Edge/Embedded gateway as a Satellite X gateway.6. Define access rules with the following parameters:

Source: AnyDestination: AnyIf Via: Star CommunityAction: AcceptInstall On: NG AI firewall object

Nokia IP40 Security Platform User’s Guide v1.1 193

Page 194: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

To configure IP40 Satellite X for VPN connection with SmartCenter NG AI using Certificates. 1. Click Services on the main menu, and choose Connect.

The Subscription Services Wizard appears.2. Enter the IP address of the Check Point NG AI Management station.

The Connecting window appears.3. Enter the Gateway ID and Registration Key that is used while creating the IP40 dynamic

object on the LSM.4. The Connecting window appears.

After the connection is complete, the list of Services downloaded window appears.5. Click Finish.6. Click VPN on the main menu and click VPN Certificate tab7. Click the VPN Sites tab and click New Site.8. Specify the IP address of the Check Point NG AI management station and check the

Unrestricted. 9. Click Next10. Select Specify Configuration.11. Enter the Destination network and the subnet mask12. Click Next13. Click Use Certificate.14. Click Next.15. Click Finish.

NoteIn order to download the certificate from Check Point NG AI and create a VPN site manually on the Nokia IP40 use the VPN-1 Edge/Embedded gateway on the Smart Dashboard and create a Star VPN community

Site-to-Site VPN with Windows 2000You can configure for VPN connectivity between the Nokia IP40 Satellite X and a Microsoft Windows 2000/XP IPSec for site-to-site VPN.Authentication supported: preshared secretThe following scenarios are supported:

Windows Gateway to Nokia IP40 Satellite X in Unrestricted mode—in this mode, traffic is encrypted between the gateways’ subnets (network A to network B).

194 Nokia IP40 Security Platform User’s Guide v1.1

Page 195: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Nokia IP40 Tele 8 to Check Point NG AI

Windows Gateway to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is encrypted between the network behind the Windows gateway, and the Nokia IP40 WAN IP address (network a to Nokia IP40 external IP)Windows Host to Nokia IP40 Satellite X in Unrestricted mode—in this mode, traffic is encrypted between the Windows host and the Nokia IP40 internal network (Windows machine to Network B)Windows Host to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is encrypted between the Windows host and the Nokia IP40 WAN IP address (Windows machine to Nokia IP40 external IP).

For more information on how to configure the Windows 2000 server, see SofaWare’s Configuring Windows 2000/ XP IPSec to Site-to-Site VPN.

Site-to-Site VPN with Nokia CryptoClusterYou can configure for VPN connectivity between the Nokia IP40 Satellite X, and a Nokia VPN Gateway (CryptoCluster) for site-to-site VPN.Authentication supported: preshared secretPerfect Forward Secrecy: supportedThe following scenarios are supported:

Nokia VPN Gateway to Nokia IP40 Satellite X in Unrestricted mode—in this mode, traffic is encrypted between the gateways’ subnets (network A to network B).Nokia VPN Gateway to Nokia IP40 Satellite X in Restricted mode—in this mode, traffic is encrypted between the network behind the Windows gateway and the Nokia IP40 WAN IP address (network a to Nokia IP40 external IP).

For more information about how to configure the CryptoCluster, see Configuring Nokia CryptoCluster to Nokia IP40 Site-to-Site VPN.

Site-to-Site VPN with Cisco PIXYou can configure for VPN connectivity between the Nokia IP40 Satellite X and Cisco secure PIX firewall (using PDM 2.0 and above) for site-to-site VPN.Authentication supported: preshared secretThe following scenarios are supported:Cisco PIX Gateway to Nokia IP40 Satellite X in unrestricted mode—in this mode, traffic is encrypted between the gateways’ subnets (network A to network B).For more information about how to configure CISCO PIX, see Sofaware’s Configuring Site-to-Site VPN with CISCO PIX.

Nokia IP40 Security Platform User’s Guide v1.1 195

Page 196: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

14 Working with VPNs

VPN Routing Between Two Nokia IP40 Security Platforms VPN Routing is a feature which is designed to fulfill the need for gateways to encrypt with each other indirectly, via a central VPN-1 Module which acts as a VPN Router by decrypting the traffic coming from one gateway and encrypting it to forward to another gateway. This feature is very useful in many scenarios such as:

DAIP (VPN-1 Module with a Dynamic IP address) to DAIP encryption: Since the DAIP Modules are not aware of each others dynamically assigned IP address, one solution is to forward traffic through a central VPN-1 Router, to which both DAIP modules connect.Mimicking the architecture of Frame Relay networks for an easier migration from traditional networks to IP based network using IPsec VPN.Enabling simple configuration for branch offices by hiding from it the entire network while allowing them full connectivity.

Mesh VPN Support This section explains mesh VPN support between different Nokia IP40 Security Platforms using Check Point R55 with HotFix 4 and above.The Nokia IP40 Security Platform supports mesh VPN topology using Check Point where different IP40 Security Platforms are configured as site to site VPNs within a mesh topology. The limitation in this scenario is that the IP40 configured on Check Point should have a static WAN IP address.

196 Nokia IP40 Security Platform User’s Guide v1.1

Page 197: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

You can integrate your IP40 Security Platforms into an overall enterprise security policy, for maximum security. The Check Point Security Management Architecture (SMART) delivers a single enterprise-wide security policy that you can centrally manage and automatically deploy an unlimited number of IP40 gateways.This chapter explains how to start and use subscription services, such as automatic software and security policy updates, content filtering, email virus scanning, and remote logging. It includes the following topics:

Starting Your Subscription ServicesSofaware Security Management PortalAutomatic and Manual UpdatesManaging with Nokia Horizon ManagerCheck Point SmartCenter LSM

For information about how to use Sofaware Management Center to configure subscription services like Web filtering, email antivirus, and software updates, see “Deploying Nokia IP40 with Sofaware Management Portal” on page 63

Starting Your Subscription ServicesThe following sections give you information about how to start your subscription services.

NoteThese services work on Nokia IP40 Security Platform. Nokia does not offer these services directly.

To start your subscription1. Click Services in the main menu, and click the Account tab.

The Account page appears.

Nokia IP40 Security Platform User’s Guide v1.1 197

Page 198: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

2. In the Service Account area, click Connect.The Setup Wizard opens, with the Subscription Services dialog box displayed.

3. Make sure that I wish to connect to a Service Center check box is checked.4. Do the following:

To specify a Service Center, do the following:Select SpecifiedIn the Specified text box, enter the IP address of the desired Service Center, as given to you by the service center.

5. Click Next.The Connecting screen appears.

198 Nokia IP40 Security Platform User’s Guide v1.1

Page 199: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Starting Your Subscription Services

If the Service Center requires authentication, a second Service Center Login dialog box appears.

Do the following:a. Enter your gateway ID and registration key in the appropriate fields, as given to you by

your service provider.b. Click Next.

The Connecting window appears.The Confirmation dialog box appears with a list of services to which you are subscribed.

Nokia IP40 Security Platform User’s Guide v1.1 199

Page 200: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

6. Click Next.The Done window appears with a success message.

7. Click Finish.The following things happen:

If a new firmware is available, the IP40 downloads it. This can take several minutes. When the download is complete, the IP40 restarts by using the new firmware.The Welcome page appears.The services to which you are subscribed are now available on your IP40 and listed as such on the Account page. For more information, see “Viewing Service Information from the Account Page” on page 201.

200 Nokia IP40 Security Platform User’s Guide v1.1

Page 201: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Viewing Service Information from the Account Page

Viewing Service Information from the Account PageTable 23 provides the information about your subscription:

Refreshing Your Service Center Connection The refresh option restarts the connection to the service center and refreshes the service settings of your device.

To refresh your service center connection1. Click Services in the main menu, and click the Account tab.

The Account page appears.

Table 24 Account Page Fields

Field Description

Service Center Name

Name of the Service Center to which you are connected (if known).

Subscription will end on

Date on which your subscription to services ends.

Service Services available in your service plan.

Subscription Status of your subscription to each service:• Subscribed• Not Subscribed

Status Status of each service:• Connected: you are connected to the service through the

Service Center.• N/A: the service is not available.

Mode Mode to which each service is set.

For further information, see sections on Web Filtering, Virus Scanning and Automatic and Manual Updates.

Nokia IP40 Security Platform User’s Guide v1.1 201

Page 202: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

2. In the Service Account area, click Refresh.The IP40 reconnects to the Service Center.Your service settings are refreshed.

Configuring Your AccountYou to access your service center Web site, which might offer additional configuration options for your account.

To configure your account1. Click Services in the main menu, and click the Account tab.

The Account page appears.2. In the Service Account area, click Configure.

NoteIf no additional settings are available from your service center, this button does not appear.

Your service center Web site opens.3. Follow the on-window instructions.

202 Nokia IP40 Security Platform User’s Guide v1.1

Page 203: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Sofaware Security Management Portal

Disconnecting From Your Service CenterIf desired, you can disconnect from your Service Center.

To disconnect from your service center1. Click Services in the main menu, and click the Account tab.

The Account page appears.2. In the Service Account area, click Connect.

The Setup Wizard opens, with the first Subscription Services dialog box displayed.3. Uncheck the I wish to connect to a service center check box.4. Click Next.

The Done window appears with a success message.5. Click Finish.

The following things happen:You are disconnected from the Service Center.The services to which you were subscribed are no longer available on your IP40.

Sofaware Security Management PortalThe SofaWare Management Center (SMC) is a Web-based application for managing, and configuring the SofaWare Security Management Portal (SMP). SofaWare managed security platform enables centralized management of a large number of firewalls embedded in residential broadband access devices or gateways.

NoteConfigure the management servers by using SMC, before you can use subscription services such as Web filtering, email antivirus, and software updates.

Using the Software Management Center, you can:Browse and update your user database.Update security policies and user interface files.Configure and fine-tune SofaWare management servers.

To configure Sofaware Management Center (On SMC):1. Click New Gateway in the main menu of SMC portal.

The new gateway page appears:2. Select a new gateway type, IP40.The registration key is automatically generated.

Nokia IP40 Security Platform User’s Guide v1.1 203

Page 204: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

3. Save the settings that you made.Click the Servers on the main menu for a list of server groups and management servers.For more information, see Sofaware Management Portal/Sofaware Management Center documents.

Web FilteringWhen Web filtering is enabled, access to Web content is restricted according to the categories specified under Allow Categories. Adult users can view Web pages with no restrictions, only after they provide the administrator password from the Web filtering popup window.

NoteIf you are remotely managed, contact your service center to change these settings.

To enable or disable Web filtering1. Click Services in the main menu, and click the Web Filtering tab.

The Web filtering page appears.

2. Drag the On/Off lever upwards or downwards.

204 Nokia IP40 Security Platform User’s Guide v1.1

Page 205: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Sofaware Security Management Portal

Web Filtering is enabled or disabled for all internal network computers

Selecting Categories to BlockYou can define which types of Web sites are considered appropriate for your family or office members, by selecting the categories. Categories marked with a check mark remain visible, while categories marked with a plus mark (+) are blocked and require the administrator password for viewing.

NoteIf you are remotely managed, contact your service center to change these settings.

To allow or block a category1. In the Allow Categories area, click the check mark or the plus sign (+) next to the desired

category.2. Click Apply.

To temporarily disable Web filtering1. Click Services in the main menu, and click the Web Filtering tab.

The Web Filtering page appears.2. Click Snooze.

Web filtering is temporarily disabled for all internal network computers.Snooze changes to Resume.

Nokia IP40 Security Platform User’s Guide v1.1 205

Page 206: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

The Web Filtering Off popup window opens.

3. To re-enable the service, click Resume, either in the popup window, or on the Web Filtering page.

The service is re-enabled for all internal network computers.If you clicked Resume in the Web Filtering page, the button changes to Snooze.If you clicked Resume in the Web Filtering Off popup window, the popup window closes.

Virus ScanningEnabling this option results in automatic scanning of your email for the detection and elimination of all known viruses and vandals.

Enabling or Disabling Email AntivirusThis section gives you information about how to enable or disable the email antivirus option.

NoteIf you are remotely managed, contact your service center to change these settings.

206 Nokia IP40 Security Platform User’s Guide v1.1

Page 207: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Sofaware Security Management Portal

To enable or disable email antivirus1. Click Services in the main menu, and click the Email Antivirus tab.

The Email Antivirus page appears.

2. Drag the On/Off lever upwards or downwards.Email Antivirus is enabled or disabled for all internal network computers.

Selecting Protocols for ScanningIf you are locally managed, you can define which protocols should be scanned for viruses:

Email retrieving (POP3). If enabled, all incoming email in the POP3 protocol is scanned.Email sending (SMTP). If enabled, all outgoing email is scanned.

Protocols marked with a check mark are scanned, while those marked with cross mark (x) are not.

Nokia IP40 Security Platform User’s Guide v1.1 207

Page 208: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

NoteIf you are remotely managed, contact your service center to change these settings.

To enable virus scanning for a protocol1. In the Protocols area, click the check mark or plus sign (+) next to the desired protocol.2. Click Apply.

Temporarily Disabling Email AntivirusIf you are having problems sending or receiving email you can temporarily disable the email antivirus service.

To temporarily disable Email Antivirus1. Click Services in the main menu, and click the Email Antivirus tab.

The Email Antivirus page appears.2. Click Snooze.

Email antivirus is temporarily disabled for all internal network computers.Snooze changes to Resume.

The Email Antivirus Off popup window opens.

208 Nokia IP40 Security Platform User’s Guide v1.1

Page 209: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Automatic and Manual Updates

3. To re-enable the service, click Resume, either in the popup window, or on the Email Antivirus page.

The service is re-enabled for all internal network computers.If you clicked Resume in the Email Antivirus page, the button changes to Snooze.If you clicked Resume in the Email Antivirus Off popup window, the popup window closes.

Automatic and Manual UpdatesIf you are subscribed to Software Updates, you can check for new security and software updates.

Checking for Software Updates when Locally ManagedIf your Nokia IP40 security platform is locally managed, you can set it to automatically check for software updates, or you can set it so that software updates can be checked manually.

To configure software updates when locally managed1. Click Services in the main menu, and click the Software Updates tab.

The Software Updates page appears.

Nokia IP40 Security Platform User’s Guide v1.1 209

Page 210: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

2. To set the IP40 to automatically check for and install new software updates, drag the Automatic/Manual level upwards.IP40 checks for new updates and installs them according to its schedule.

NoteWhen the Software Updates service is set to Automatic, you can still manually check for updates.

3. To set the IP40 so that software updates must be checked for manually, drag the Automatic/Manual level downwards.The IP40 does not check for software updates automatically.

4. To manually check for software updates, click Update Now.The system checks for new updates and installs them.

Checking for Software Updates When Remotely ManagedIf your IP40 is remotely managed, it automatically checks for software updates and installs them without user intervention. However, you can still Check for updates Manually, if needed.

To manually check for security and software updates1. Click Services in the main menu, and click the Software Updates tab.

The Software Updates page appears.

2. Click Update Now.The system checks for new updates and installs them.

210 Nokia IP40 Security Platform User’s Guide v1.1

Page 211: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Managing with Nokia Horizon Manager

Managing with Nokia Horizon ManagerYou can manage your Nokia IP40 Security Platform by using Nokia Horizon Manager. Nokia Horizon Manager is a software application designed to manage and configure a large number of Nokia security platforms (devices) that reside on a corporate enterprise, managed service provider (MSP), or hosted applications service provider network (ASP).

NoteYou can manage IP40 by using Nokia Horizon Manager 1.3.1 and later only.

To use Nokia Horizon Manager to access and manage your IP40 Security Platform from the GUI:1. Click Setup on the main menu, and choose Management.2. Choose IP Address Range next to SSH, and specify the IP address of Nokia Horizon

Manager.3. Click Apply.

To use Nokia Horizon Manager Interface to access and manage your IP40 Security Platform:1. Click Devices in the main menu and choose Create Devices to create an IP40 device.2. Click Nokia Small Office Series Platform - IP40 for device type.3. In the Device text box, type the Device Name (IP40) or the IP address.4. Click Yes for Use Secure connection.5. Type the device login and password.6. Click OK at the bottom of the menu.Your IP40 device is created.For more details see Nokia Horizon Manager User Guide.

Check Point SmartCenter LSM Check Point SmartCenter Large Scale Manager (LSM) allows you to manage many Check Point Remote Office/Branch Office (ROBO) gateways from a single SmartCenter Server. The Check Point LSM concept is based on Gateway Profiles, which are defined in the standard Check Point SmartDashboard. Each Gateway Profile represents many ROBO gateways.For additional information on installing and configuring LSM, see Check Point SmartCenter LSM documentation.

To configure NG AI and IP40 for site-to-site by using LSM profiles on IP40 Side 1. Connect the IP40 to the SmartCenter.

Click Services on the main menu and choose Connect.

Nokia IP40 Security Platform User’s Guide v1.1 211

Page 212: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

15 Using Managed Services

Specify the IP address of Check Point LSM, and click Next.Type the Gateway ID and registration key as defined in VPN-1 Edge/Embedded ROBO gateway, and click Next to continue.After successful connection, the Confirmation window appears giving a list of services to which you have subscribed.

2. Open http://my.firewall and verify the following before you proceed:a. That Enterprise site was added to the VPN site page.b. That the LSM profile object certificate was synchronized to the device. c. Topology was loaded to the device. This should be verified from

http://my.firewall/vpntopo.html.3. You can verify that the tunnel is open by sending packets from IP40 to the VPN-1 gateway.

To configure NG AI and Nokia IP40 Security Platform for site-to-site by using LSM profiles on Check Point

1. Enable LSM: in the command prompt, type LSMenabler on, and reset the FW services.2. Open SmartDashboard and define a new VPN-1 edge embedded ROBO profile.3. Name the LSM profile, and click OK.4. Click Save on SmartDashboard and close.Open SmartLSM.5. Define a new VPN-1 edge embedded gateway, and select the LSM profile you defined.

Make sure to choose the correct HA type (IP40).6. Open SD again, and define a Star Community.

Place VPN-1 GW in the Central Gateway, and the LSM profile in the Satellite Gateway.7. Define a new UDP service on ports to 9281-9282, and name it SW.8. Place the SW service in the excluded services of the Star Community you defined.9. Create the rule base, or policy used for managing your device.10. Install the policy.

212 Nokia IP40 Security Platform User’s Guide v1.1

Page 213: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Debugging

16 Troubleshooting

This chapter provides troubleshooting tips, problems your Nokia IP40 Security Platform might encounter, and solutions for them. This chapter includes the following topics:

DebuggingConfiguring Debugging LevelsFrequently Asked QuestionsResetting the IP40 Security Platform to Factory DefaultsFailsafe ModeRunning Diagnostics

Debugging Debugging commands serves as a troubleshooting tool for advanced customers and support engineers by displaying feature-specific information to the enabling console and optionally to the log file. You can configure debug levels through the CLI, for the following features:

VRRP DDNSDial-upHAD

The performance of the device does not get affected even if debugging is disabled. But when debugging is enabled for many features, it can affect the primary firewall and VPN task of Nokia IP40. Debugging should be enabled judiciously and for brief periods. The debugging commands enable debugging messages based on customer-defined criteria of feature and level.

Configuring Debugging LevelsUse the following commands to configure VRRP debugging levels:

set debug vrrp level<0-9>

Use the following commands to configure DDNS debugging levels:

Nokia IP40 Security Platform User’s Guide v1.1 213

Page 214: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

16 Troubleshooting

set debug ddns level<0-9>

Use the following commands to configure dial-up debugging levels:

set debug dialup level<0-9>

Use the following commands to configure HAD debugging levels:

set debug had level<0-9>

Viewing Debugging LevelsUse the following commands to view debugging levels:

show debug < vrrp | ddns | dialup | had >

For more information about debug commands, see Nokia IP40 Security Platform CLI Reference Guide Version 1.1

Frequently Asked QuestionsPlease list for the modems that are supported. The following modems are supported:

Analog modem 56 Kbps (DTE speed: up to 115200)ISDN TA (using PPP) 64 Kbps (DTE speed: up to 230400)ISDN TA (using MLPPP) 128 Kbps (DTE speed: up to 460800)

I cannot access the Internet. What should I do?Check for the following:

Check if the PWR LED is active. If not, check the power connection to the IP40.Check if the WAN LED is on. If not check the network cable to the modem and make sure the modem is turned on.Check if the LAN LED for the port that your computer uses is on. If not, check if the network cable linking your computer to the IP40 is connected properly.Use your web browser to go to http://my.firewall and check whether connected appears on the status bar. Make sure that the IP40 network settings are configured according to your service center directions. Check your TCP/IP configuration according to Chapter 2.If the firewall level is set to High, try setting it to Medium or Low.If Web filtering or email antivirus scanning are on, try turning them off.Erase all your block rules through the security menu. Check with your ISP for possible service outage.Check whether you are exceeding the maximum number of computers allowed by your license. See Viewing Computers.

214 Nokia IP40 Security Platform User’s Guide v1.1

Page 215: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Frequently Asked Questions

I cannot access http://my.firewall or http://my.vpn. What should I do?Verify that the IP40 is operating (PWR LED is active).Check if the LAN LED for the port that your computer uses is on. If not, check that the network cable, linking your computer and IP40 is connected properly.Try surfing to 192.168.1.1 instead of to my.firewall.

Note192.168.1.1 is the default value, and it might vary if you changed it in the My Network page.

Check your TCP/IP configuration according to Chapter 2.Restart the IP40 and your broadband modem by disconnecting the power and reconnecting after five seconds.If your Web browser is configured to use an HTTP proxy to access the Internet, add my.firewall or my.vpn to your proxy exceptions list.

Every time I start Internet Explorer, the application searches for an Internet connection. This is unnecessary, since I am connected through the IP40. What should I do?For Internet Explorer, versions 5 and 6, do the following: 1. Open the browser.2. On the Tools menu, click Internet Options then click the Connections tab.3. For each item in the Dial-up Settings list, do the following:

a. Select the item.b. Select Never dial a connection.

4. Click Apply.5. Click OK.6. Close all active browsers and try again.Every time I start Outlook Express, the application searches for an Internet connection. This is unnecessary, since I am connected through the IP40. What should I do?For Outlook Express, versions 5 and 6, do the following:1. Open Outlook Express.2. On the Tools menu, click Accounts, then click the Mail tab.3. For each of the accounts configured in the mail window, do the following:4. Click Properties, then click the Connection tab.5. Clear the Always connect to this account using check box.6. Click OK.7. Click Close.8. Close all active browsers and try again.

Nokia IP40 Security Platform User’s Guide v1.1 215

Page 216: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

16 Troubleshooting

I run a public Web server at home but it cannot be accessed externally, although it is accessible to the computers on my network. What should I do?Surf to the security page and use the Servers submenu to allow access to your server.My network seems extremely slow. What should I do?

The Ethernet cables might be faulty. For proper operation, the IP40 requires STP CAT5 (shielded twisted pair category five) ethernet cables. Make sure that this specification is printed on your cables.Your Ethernet card might be faulty or incorrectly configured. Try replacing your Ethernet card.

I cannot play a certain network game. What should I do?Turn the IP40 security to Low and try again.If the game still does not work, set the computer you wish to play from to be the DMZ server.When you are finished playing the game, make sure to clear the DMZ setting, otherwise your security might be compromised.

I have forgotten my password. What should I do?Reset the IP40 to factory defaults by using the Reset button as detailed in “Resetting the IP40 Security Platform to Factory Defaults” on page 219.This will erase all your settings.I cannot connect to a VPN site using IP40 Satellite or IP40 Tele. What should I do?Check whether your VPN client has a problem.Do one of the following:

If you are using IP40 Tele, add the demo Check Point VPN site, using the procedure “Adding and Editing VPN Sites using IP40 Tele,” as follows:

In the VPN Gateway Address dialog box, enter 207.40.230.20 in the VPN Gateway field.In the VPN Network Configuration dialog box, select Download Configuration.

If you are using IP Satellite, add the demo Check Point VPN site, using the procedure Adding and Editing VPN Sites using IP40 Tele, as follows:

In the Welcome to the VPN Site Wizard dialog box, select Remote Access VPN.In the VPN Gateway Address dialog box, enter 207.40.230.20 in the VPN Gateway field.In the VPN Network Configuration dialog box, select Download Configuration.

Log on to the demo site, using vpndemo as your username and password.Surf to http://207.40.230.22

The Check Point VPN-1 SecuRemote Demo Site should open and inform you that you successfully created a VPN tunnel.I changed the network settings to incorrect values and am unable to correct my error. What should I do?Reset the network to its default settings by using the reset button on the back of the IP40 device.

216 Nokia IP40 Security Platform User’s Guide v1.1

Page 217: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Frequently Asked Questions

I am using the Nokia IP40 Security Platform with another DSL/Cable router, and I am having problems with some applications.The IP40 performs network address translation (NAT). You can use the IP40 behind another device that performs NAT, such as a DSL router or wireless router, but the device will block all incoming connections from reaching your IP40. To fix this problem, do one of the following. (The solutions are listed in order of preference.)

Consider whether you really need the router. You can use the IP40 as a replacement for your router, unless you need it for some additional functionality that it provides, such as wireless access.If possible, disable NAT in the router. For instructions on how to do this, see the router's documentation.

The following suggestions will work only if the router is connected to the WAN port of IP40:If the router has a DMZ computer option, set it to the IP40 external IP address.Set the router to direct all incoming connections to the external IP address of IP40.

Keep in mind that if you use IP40 behind another NAT device, you might lose some of the advantages of the IP40, such as broad application support and high performance.I cannot open http://my.firewall page when the LAN address is changed. What should I do?Renew the IP address of the computer using ipconfig.I cannot connect to the HTTPS server in the DMZ. What should I do? Ensure that HTTPS access to the device is enabled.I cannot establish HTTPS session to the device even when the HTTPS access to the device is permitted. What should I do? Ensure that the browser supports 128-bit cipher strength.I cannot send SMTP or POP3 traffic across the Device what should I do?Do one of the following: (The solutions are listed in order of preference)

If antivirus scanning is on, try turning it off.If the antivirus is required, then make sure that the CVP server and SMTP server in the server page of SMC are correctly configured.

I cannot send HTTP traffic across the IP40. What do I do?Do one of the following (The solutions are listed in order of preference.):

If Web-filtering scanning is on, try turning it off.If the URL filtering is required, then make sure the UFP server in the server page of SMC is correctly configured.

I cannot connect to SmartCenter FP3 VPN site using IP40 Satellite X when using Dynamic IP with certificate support (DAIP). What should I do?

Check for the installed certificate in VPN > Certificate. Check for the following error messages in Reports > Event Log:

Nokia IP40 Security Platform User’s Guide v1.1 217

Page 218: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

16 Troubleshooting

I cannot connect to the Check Point SmartCenter FP3 VPN site by using IP40 Satellite configured using VPN Communities. What should I do?Check for the following error messages in Report > Event Log:

I cannot connect to IP40 Satellite VPN site by using IP40 Satellite X. What should I do?Check for the following error messages in Report->Event Log:

Error Message Verify

Failed to Create VPN tunnel:client Encrypt Notification

Ensure that on the FP3 management station the authentication mechanism followed is 3DES/SHA1.

Failed to Create VPN tunnel:could not validate my certificate

Ensure that the certificate used in the device is the one associated to the certificate created for this gateway on Smart Center FP3.

Failed to Create VPN tunnel:invalid certificate

Ensure that the certificate used is not expired.

Failed to Create VPN tunnel:invalid cert encoding

Ensure that the certificate used is PKCS#12 format.

Error Message Verify

Failed to Create VPN tunnel: payload malformed

Ensure that the safe@gateway object defined for this device at Smart Center FP3 uses the same shared secret.

Extended Authentication Failure

Check for the correct username, password given for the VPN site during login.

Error Message Verify

Failed to Create VPN tunnel: payload malformed

Ensure that both gateways use the same shared secret.

Failed to Create VPN tunnel: N/A

Check for the validity of the user on the remote IP40 gateway.

218 Nokia IP40 Security Platform User’s Guide v1.1

Page 219: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Frequently Asked Questions

I cannot download the certificate. What should I do?Ensure that the device date and management date matches.

Viewing Firmware StatusThe firmware is the software program embedded in the IP40. You can view your current firmware version and additional details.

To view the firmware status1. Click Setup on the main menu.

The Internet page appears.2. Click the Firmware tab.

The Firmware page appears. The Firmware page displays a table with the following information:

Resetting the IP40 Security Platform to Factory DefaultsYou can reset to factory defaults with the GUI or by manually pressing the Reset button.For more information, see “Resetting Nokia IP40 Security Platform to Factory Defaults” on page 150.

Table 25 Firmware Status

Field Description

Firmware Version

the current version of the firmware.

Hardware Type

the type of the current IP40 hardware

Hardware Version

the current hardware version of the IP40.

Installed Product

the licensed software and the number allowed nodes

Uptime the time that elapsed from the moment the unit was turned on.

Nokia IP40 Security Platform User’s Guide v1.1 219

Page 220: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

16 Troubleshooting

Failsafe ModeNokia IP40 Security Platform enters failsafe mode when the main kernel becomes corrupted. If the main kernel becomes corrupted, the IP40 loads a failsafe kernel to the RAM. For the device to function properly, it must be upgraded with a new firmware.You can upgrade the firmware by using OOB or by using the console and LAN.If the device is booted in failsafe mode, you receive the following login prompt:

Welcome to IP40 (failsafe)

login:

The username and password are admin and password respectively.

Upgrading Firmware in Failsafe Mode by Using Console When the IP40 goes to failsafe mode, you can use the following procedure to upgrade the firmware.

To upgrade the firmware using the console and LAN1. Connect to the console.Use admin and password as the default username and password. The

following message appears:

Welcome to IP40 (failsafe)

login: admin

password:

You will see the following message displayed on the console:Device is running in failsafe mode. You must upgrade the device immediately.

2. Specify the LAN IP address and netmask when prompted.The device waits for the FTP client to upload the firmware once the LAN interface is configured.You will see the following message displayed on the console:Device is waiting for ftp client to upload the firmware.

You must close FTP session using quit command after uploading firmware.Press Ctrl+C to Cancel.3. FTP to the configured LAN IP address and upload the firmware.4. The appliance requests your confirmation for firmware upgrade after successful firmware

upload.Press Y to confirm.

220 Nokia IP40 Security Platform User’s Guide v1.1

Page 221: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Upgrading Firmware from Failsafe Kernel

The appliance displays the appropriate message depending on success or failure of firmware upgrade.

Upgrading Firmware from Failsafe KernelIf the firmware of your device gets corrupted, and your device is not working properly, you need to reload the firmware in it. You can reload your firmware by using the Faisafe Kernel. You can use the OOB feature in the IP40 for remote HTTPS or SSH access and to perform firmware upgrades.

NoteFailsafe kernel does not provide any other function other than reloading the firmware.

To upgrade firmware through OOB from the failsafe kernel1. Boot in to the failsafe kernel. See “Failsafe Mode” on page 220 for more details.2. After booting, dial in to the appliance with username admin and password password.

NoteIP40 uses the IP address 192.168.40.1 for the dial-up interface.

3. Open a Telnet session to IP40 by using the preceding IP address and username/password information.

4. Upload the firmware file to the device by using FTP or TFTP. You are prompted to confirm firmware upgrade when the upload is completed.

5. Upgrade the device firmware by clicking Yes. IP40 verifies whether the firmware file you uploaded is valid before upgrading.

Running DiagnosticsYou can view technical information about Nokia IP40 Security Platform hardware, firmware, license, network status, and subscription services. This information is useful for troubleshooting. You can copy and paste the information into the body of an email and send it to technical support.

To run diagnostics1. Click Setup on the main menu.

The Internet page appears.2. Click the Firmware tab.

The Firmware page appears.

Nokia IP40 Security Platform User’s Guide v1.1 221

Page 222: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

16 Troubleshooting

3. Click Diagnostics.Technical information about the IP40 appears in a new window.

4. To refresh the contents of the window, click Refresh.The contents are refreshed.

5. To close the window, click Close.

222 Nokia IP40 Security Platform User’s Guide v1.1

Page 223: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

A Specifications

Technical Specifications

Safety PrecautionsRead the following safety instructions before attempting to install or operate the Nokia IP40. Read the installation and operation procedures provided in this User Guide. Failure to follow the instructions can result in damage to equipment, and or personal injuries.

Before cleaning the IP40, unplug the power cord. Use only a soft cloth dampened with water for cleaning.Any changes or modification to this product not explicitly approved by the manufacturer could void any assurances of safety or performance and could result in violation of part 15 of the FCC Rules.When installing the IP40, ensure that the vents are not blocked.Do not use the IP40 outdoors.Do not expose the IP40 to liquid or moisture.Do not expose the IP40 to extreme high or low temperatures.Do not drop, throw, or bend the IP40 since rough treatment could damage it.Do not use any accessories other than those approved by Nokia. Failure to do so might result in loss of performance, damage to the product, fire, electric shock or injury, and voids the warranty.Do no disassemble or open the IP40. Failure to comply voids the warranty.

Table 26 Specifications

Height 1.2 inches Input DC Power - 12V

Width - 8.0 inches Power Consumption - 13.5 W

Length - 4.8 inches Power Supply - 100 V AC, 120 V AC or 240 V AC

Weight - 1.8 lbs

Nokia IP40 Security Platform User’s Guide v1.1 223

Page 224: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

A Specifications

Do not route the cables in a walkway or in a location that will crimp the cables.

224 Nokia IP40 Security Platform User’s Guide v1.1

Page 225: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

B Warranty

THE TERMS AND CONDITIONS SET FORTH ON THIS DOCUMENT CONSTITUTE THE ENTIRE AGREEMENT BETWEEN Nokia, Inc., A DELAWARE CORPORATION (“NOKIA”), AND CUSTOMER IN RESPECT OF THE NOKIA SOFTWARE INCLUDED IN THE PRODUCT PACKAGE, INCLUDING ANY DOCUMENTATION THERETO (the "SOFTWARE"). NOKIA WILL NOT BE BOUND BY ANY TERMS OF ANY PRIOR AGREEMENT OR UNDERSTANDING THAT ARE INCONSISTENT WITH THE TERMS HEREIN. THE SOFTWARE IS LICENSED ONLY ON THE CONDITION THAT THE CUSTOMER ACCEPTS THE TERMS OF THIS AGREEMENT. BY OPENING THE PACKAGE AND/OR BY MAKING USE OF THE ENCLOSED SOFTWARE YOU AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT PLEASE IMMEDIATELY RETURN THE SOFTWARE IN THE PRODUCT PACKAGE TO THE PLACE YOU PURCHASED IT FOR FULL REFUND.1. SOFTWARE LICENSE. Unless Customer is an approved Managed Service Provider, Nokia grants

to Customer a personal, nonexclusive and nontransferable license to use the Software in object code form solely as embedded in equipment provided by Nokia. If Customer is an approved Managed Service Provider ("MSP"), Nokia grants a nonexclusive and non transferable license to demonstrate the Software to clients and prospective clients in order to market MSP's managed services and to use the Software to provide managed services provided that each copy of the Software is used solely on behalf of and for the benefit of a single client on the single piece of equipment provided by Nokia. An MSP may discontinue use of the Software on behalf of one client and use the Software to provide managed services to another single client.

Customer may make one (1) archival copy of the Software provided Customer affixes to such copy all copyright, confidentiality and proprietary notices that appear on the original. Customer shall not otherwise, in whole or in part, copy the Software or documentation; modify the Software or create derivative works thereof; reverse compile or reverse assemble all or any portion of the Software; rent, lease, distribute, sell, or use for time-sharing purposes, the Software; or use or allow the Software to be used for the direct benefit of any third party. Any fixes, updates or new releases of the Software, which may be made available to Customer, shall be deemed part of the "Software," subject to the restrictions and limitations contained in this license.

2. PROPRIETARY RIGHTS. All right, title and interest in and to the Software and documentation, and any copies thereof provided by Nokia or which may be made by Customer, are and shall remain the exclusive property of Nokia or Nokia’s licensors (Nokia and its licensors are collectively referred

Nokia IP40 Security Platform User’s Guide v1.1 225

Page 226: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

B Warranty

to as “Software Owners”). Each Software Owner shall have the right to enforce this Agreement against the Customer as to such Software Owner’s Software.

3. LIMITED WARRANTY.

a. Software Warranty. Nokia warrants that the Software will substantially conform to the published specifications for a period of ninety (90) days, plus a thirty (30) day transit allowance, from the date of shipment. If the Software is found to contain a substantial nonconformance, Nokia’s sole obligation under this warranty shall be, at Nokia’s option: (a) to correct, or provide a "work around" for any material programming error or defect in the Software, or (b) to refund to Licensee the purchase price paid and this Agreement shall terminate.

b. Warranty Services. In the event of a warranted problem with respect to the Software, Customer shall call its reseller for warranty services. All repair services are provided by Nokia's authorized reseller from whom the Customer has purchased the product on which the Software is imbedded.

c. Exclusions. The above warranty does not apply if the Software or the equipment on which it resides (1) has been altered, except as authorized by Nokia, (2) has not been installed, operated, repaired or maintained in accordance with any installation, handling, maintenance or operating instructions supplied by Nokia, (3) has been subjected to unusual physical or electrical stress, misuse, negligence or accident, (4) has been used in ultra-hazardous activities, or (5) has been used in such a way that Nokia cannot reasonably reproduce the Software error. Furthermore, the above warranty does not apply to any portion of the product supplied by a third party. In no event does Nokia warrant that the Software is error-free or that the Customer will be able to operate it without problems or service interruptions.

d. DISCLAIMER. THE WARRANTY ABOVE IS IN LIEU OF, AND NOKIA DISCLAIMS, ALL OTHER WARRANTIES AND CONDITIONS, EXPRESSED OR IMPLIED, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, QUALITY, NON-INFRINGEMENT, NON-INTERRUPTION OF USE, FREEDOM FROM BUGS OR OTHERWISE. NO DEALER OR RESELLER IS AUTHORIZED TO MAKE ANY MODIFICATIONS, EXTENSIONS, OR ADDITIONS TO THIS WARRANTY. NOKIA SPECIFICALLY DISCLAIMS ANY WARRANTY FOR THIRD PARTY SOFTWARE SUPPLIED WITH THE PRODUCT.

4. LIMITATION OF LIABILITY. IN NO EVENT WILL NOKIA, ITS SUPPLIERS OR RESELLERS BE LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY, TORT OR OTHER THEORY FOR DIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES (INCLUDING WITHOUT LIMITATION LOSS OF PROFIT OR DATA), WHETHER OR NOT THEY BEEN ADVISED OF THE POSSIBILITY OF SUCH LOSS. IN THE EVENT THAT ANY EXCLUSION CONTAINED HEREIN SHALL BEHELD TO BE INVALID FOR ANY REASON AND NOKIA BECOMES LIABLE FOR LOSS OR DAMAGE THAT MAY LAWFULLY BE LIMITED, SUCH LIABILITY SHALL BE LIMITED TO THE PURCHASE PRICE. THESE LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY. SOME STATES DO NOT ALLOW THE

226 Nokia IP40 Security Platform User’s Guide v1.1

Page 227: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

LIMITATION OR EXCLUSION OF CERTAIN LIABILITIES OR DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO CUSTOMER BY LAW.

5. EXPORT RESTRICTIONS. Customer shall not export or transmit, directly or indirectly, the Software or any technical data (including processes and services) received from Nokia, nor the direct product thereof, outside of the United States without prior authorization of the U.S. Government if such authorization is required. Customer shall obtain all licenses, permits and approvals required by any government. Customer agrees to comply with all export laws, rules, policies, procedures, restrictions and regulations of the Department of Commerce or other United States or foreign agency or authority, and not to export, or allow the export or reexport of any goods in violation of any such restrictions, laws or regulations. Customer will indemnify and hold harmless Nokia for any violation or alleged violation by Customer of such laws, rules, policies, procedures, restrictions or regulations.

6. CONFIDENTIAL INFORMATION. Customer agrees that aspects of the Software and documentation, including the specific design and structure of individual programs and the composition of the whole, constitute trade secrets and/or copyrighted material of Nokia. Customer shall not itself, nor shall Customer permit others to, disclose, provide, or otherwise make available such trade secrets or copyrighted material in any form to any third party without the prior consent of Nokia. Customer agrees to implement reasonable security measures to protect such trade secrets and copyrighted material. The obligations of confidentiality shall not apply to information, which has entered the public domain except where such entry is the result of Customer’s breach of this Agreement.

7. FORCE MAJEURE. Nokia shall not be liable for any delay or failure in performance whatsoever due to reasons beyond its reasonable control.

8. TERM AND TERMINATION. This Agreement is effective until terminated. The license to the Software granted by Nokia will terminate upon any attempt by Customer to transfer or assign the Software, this Agreement or any rights or obligations hereunder without Nokia’s prior written consent. In addition, Nokia may terminate this Agreement effective fifteen (15) days following the giving of written notice to Customer upon the occurrence of Customer's failure to perform any of its existing or future obligations hereunder if such breach shall remain uncured. Upon termination, Customer shall cease all use of the Software and shall destroy or return to Nokia the original(s) and all copies of the Software and documentation made or furnished hereunder. Customer may terminate the License at any time by destroying all copies of the Software and documentation. The provisions of Sections 2, 4, 6, 9, and 10 shall survive any termination.

9. APPLICABLE LAW. This Agreement shall be governed by and construed in accordance with the laws of the State of California and the United States without regard to conflicts of laws provisions thereof and without regard to the United Nations Convention on Contracts for the International Sale of Goods. To the extent permitted by law, the parties waive any and all rights, privileges and obligations which may derive from any codification of the body of law generally referred to as the "Uniform Commercial Code".

10. MISCELLANEOUS. No waiver of rights under this Agreement by either party shall constitute a subsequent waiver of this or any other right under this Agreement. In the event that any of the terms of this Agreement become or are declared to be illegal by any Court of competent jurisdiction, such term(s) shall be null and void and shall be deemed deleted from this Agreement. All remaining terms of this Agreement shall remain in full force and effect. In the event of a breach of this Agreement, the breaching party shall pay to the other party any reasonable attorneys’ fees and other costs and

Nokia IP40 Security Platform User’s Guide v1.1 227

Page 228: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

B Warranty

expenses incurred by the non-breaching party in connection with the enforcement of any provisions of this Agreement.

If the Software is licensed to a U.S. Governmental user, the following shall apply. The Software and documentation licensed in this agreement are “commercial items” and are deemed to be “commercial computer software” and “commercial computer software documentation.” Consistent with the Federal Acquisition Guidelines and related laws, any use modification, reproduction, release, performance, display, or disclosure of such commercial software or commercial software documentation by the US. Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement.

228 Nokia IP40 Security Platform User’s Guide v1.1

Page 229: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

C End User License Agreement

This EndUser License Agreement (the "Agreement") is an agreement between you (both the individual installing the Product and any legal entity on whose behalf such individual is acting) (hereinafter "You" or " Your") and SofaWare Technologies Ltd. (hereinafter " SofaWare ").TAKING ANY STEP TO SET-UP OR INSTALL THE PRODUCT CONSTITUTES YOUR ASSENT TO AND ACCEPTANCE OF THIS END USER LICENSE AGREEMENT. WRITTEN APPROVAL IS NOT A PREREQUISITE TO THE VALIDITY OR ENFORCEABILITY OF THIS AGREEMENT AND NO SOLICITATION OF ANY SUCH WRITTEN APPROVAL BY OR ON BEHALF OF YOU SHALL BE CONSTRUED AS AN INFERENCE TO THE CONTRARY. IF YOU HAVE ORDERED THIS PRODUCT AND SUCH ORDER IS CONSIDERED AN OFFER BY YOU, SOFAWARE'S ACCEPTANCE OF YOUR OFFER IS EXPRESSLY CONDITIONAL ON YOUR ASSENT TO THE TERMS OF THIS AGREEMENT, TO THE EXCLUSION OF ALL OTHER TERMS. IF THESE TERMS ARE CONSIDERED AN OFFER BY SOFAWARE, YOUR ACCEPTANCE IS EXPRESSLY LIMITED TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE WITH ALL THE TERMS OF THIS AGREEMENT, YOU MUST RETURN THIS PRODUCT WITH THE ORIGINAL PACKAGE AND THE PROOF OF PAYMENT TO THE PLACE YOU OBTAINED IT FOR A FULL REFUND.1. DEFINITIONS:

1.1 "Product" means the object code copy of the software program provided to You in connection with this Agreement, together with the associated original electronic media and/or associated hardware devices and all accompanying manuals and other documentation, and together with all enhancements, upgrades, and extensions thereto that may be provided by SofaWare to You from time to time, unless otherwise indicated by SofaWare. If You are a Standard User the Product shall be associated with the SofaWare S-box obtained by you, if you are a Managed Service Provider the Product shall be an object code copy that allows the management of SofaWare S-box Licensed Configurations for a defined amount of Service Customers. 1.2 "Licensed Configuration" means to the extent applicable, as indicated on the License Key, the choice of features and the maximum number of nodes (an internal computing device with an IP address) on the trusted side of the firewall or any other hardware or software specifications, as declared by You in Your purchase order, or request for License Key, if the Product purchased by You does not come with a License Key then the Licensed Configuration shall be the minimum configuration allowed by the user manual of SofaWare S-Box, and upon which the licensing fee was based.

Nokia IP40 Security Platform User’s Guide v1.1 229

Page 230: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

C End User License Agreement

1.3 "License Key" means the code provided to You by SofaWare which enables the Product to operate for the specified Licensed Configuration.1.4 "Third Party Software" means any software programs provided by third parties contained in the Product as detailed in the Third Party Software Addendum attached to this Agreement.1.5 "Third Party Software Provider" means the third party which has the right to provide and grant licenses for the use of Third Party Software. 1.6 You are a "Managed Service Provider" if (a) You are in the regular business of providing firewall, VPN, or IP addressing management for a fee to entities that are not Your affiliates ("Service Customers"); or if you are a Company that provides such managed services to Standard Users that are a part of your corporation or of your affiliated companies ("Clients")(b) You indicated in Your purchase order or in requesting the License Key that You intend to use the Products on behalf of Service Customers or Clients; and (c) you purchased the managed service provider package. 1.7 You are a "Standard User" if You indicated in Your purchase order or in requesting the License Key that You intend to use the Products on Your own behalf, or you obtained the products from a Managed Service Provider, reseller, vendor or any other intermediate supplier.2. LICENSE AND RESTRICTIONS:

2.1 License. Subject to the terms and conditions of this Agreement, SofaWare hereby grants only to You, a non-exclusive, non-sublicensable, non-transferable license to install and use the Product in accordance with the relevant end user documentation provided by SofaWare for the Licensed Configuration. You have no right to receive, use or examine any source code or design documentation relating to the Product. 2.2 Standard User Restrictions. If You are a Standard User, the Products are licensed to You solely for use by You for Your own operations. No Product, nor any portion thereof, may be used by or on behalf of, accessed by, re-sold to, rented to, or distributed to any other party. 2.3 Managed Service Provider Restrictions. If You are a Managed Service Provider, the Products are licensed to You for use by You to provide policy management for the operations of Your Service Customers or Clients from an authorized location. No Product, nor any portion thereof, may be used by or on behalf of, accessed by, re-sold to, rented to, or distributed to any other party, except for the management of Your Clients or Service Customers who have made a valid purchase of the Product. Distribution of the Product to Service Customers requires that You enter into a Reseller and/or Managed Service Agreement with SofaWare or its authorized representative.2.4 General Restrictions. You may not copy the Product, in whole or in part. The Product is licensed to You solely for your internal use by You and for You and the Product or any portion thereof may not be used or accessed by, sub-licensed to, re-sold to, rented to, or distributed to any other party. You agree not to allow others to use the Product and You will not use the Product for the benefit of third parties. You acknowledge that the source code of the Product, and the underlying ideas or concepts, are valuable intellectual property of SofaWare and You agree not to, except as expressly authorized and only to the extent established by applicable statutory law, attempt to (or permit others to) decipher, reverse translate, decompile, disassemble or otherwise reverse engineer or attempt to reconstruct or discover any source code or underlying ideas or algorithms or file formats or programming or interoperability interfaces of

230 Nokia IP40 Security Platform User’s Guide v1.1

Page 231: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

the Products by any means whatsoever. You will not develop methods to enable unauthorized parties to use the Product, or to develop any other product containing any of the concepts and ideas contained in the Product. You will not (and will not allow any third party to) modify Product or incorporate any portion of Product into any other software or create a derivative work of any portion of the Product. You will not (and will not allow any third party to) remove any copyright or other proprietary notices from the Product. 2.5 Specific Restrictions. The Product is licensed to You based on the applicable Licensed Configuration purchased The License permits the use of the Product in accordance with the designated number of IP addresses. Without derogation from any applicable laws, it is a violation of this End User License Agreement to create, set-up or design any hardware, software or system which alters the number of readable IP addresses presented to the Product with the intent, or resulting effect, of circumventing the Licensed Configuration. 2.6 Evaluation License. This Section 2.6 shall only apply if You are licensing the Product for an initial sixty (60) day evaluation period. The license is valid only for a period of sixty (60) days from the delivery of the Product, and is designed to allow You to evaluate the Product during such period. In the event that You wish to enter into a longer-term license agreement with SofaWare, the terms and conditions of this Agreement shall be applicable. In the event that You determine not to enter into a licensing transaction with SofaWare at the end of such sixty (60) day evaluation period, or in the event that SofaWare advises You that discussions with respect to a licensing transaction have terminated, then Your rights under this Agreement shall terminate and You shall promptly return all Product to the representative that supplied the Product. 3. MAINTENANCE AND SUPPORT:

SofaWare has no obligation to provide support, maintenance, upgrades, modifications, or new releases under this Agreement. Any purchase of upgrades shall be subject to this End User License Agreement, unless otherwise determined by SofaWare. 4. TITLE AND INTELLECTUAL PROPERTY:

All right, title, and interest in and to the Product shall remain with SofaWare and its licensors. The Product is protected under international copyright, trademark and trade secret and patent laws. The license granted herein does not constitute a sale of the Product or any portion or copy of it.5. TERM AND TERMINATION:

This Agreement is effective until terminated. SofaWare may terminate this Agreement at any time upon Your breach of any of the provisions hereof. Upon termination of this Agreement, You agree to cease all use of the Product and to return to SofaWare or destroy the Product and all documentation and related materials in your possession, and so certify to SofaWare. Except for the license granted herein and as expressly provided herein, the terms of this Agreement shall survive termination.6. INDEMNIFICATION:

SofaWare shall have the right, but not the obligation, to defend or settle, at its option, any action at law against You arising from a claim that Your permitted use of the Product under this Agreement infringes any patent, copyright, or other ownership rights of a third party. You agree to provide SofaWare with written notice of any such claim within ten (10) days of Your notice thereof and provide reasonable assistance in its defense. SofaWare has sole discretion and

Nokia IP40 Security Platform User’s Guide v1.1 231

Page 232: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

C End User License Agreement

control over such defense and all negotiations for a settlement or compromise, unless it declines to defend or settle, in which case You are free to pursue any alternative You may have.7. LIMITED WARRANTY, WARRANTY DISCLAIMERS AND LIMITATION OF LIABILITY:

7.1 Limited Warranty. SofaWare warrants to You that the encoding of the software program on the media on which the Product is furnished will be free from defects in material and workmanship, and that the Product shall substantially conform to its user manual, as it exists at the date of delivery as can be found on SofaWare's web page (www.sofaware.com or www.s-box.com), for a period of ninety (90) days from the date of purchase. SofaWare's entire liability and Your exclusive remedy shall be, at SofaWare's option, either: (i) return of the price paid to SofaWare for the Product, resulting in the termination of this Agreement, or (ii) repair or replacement of the Product or media that does not meet this limited warranty. EXCEPT FOR THE LIMITED WARRANTIES SET FORTH IN THIS SECTION 7.1, THE PRODUCT AND ANY SERVICES ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED. SOFAWARE DOES NOT WARRANT THAT THE PRODUCT WILL MEET YOUR REQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. SOFAWARE DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to You. This warranty gives You specific legal rights. You may have other rights which vary from jurisdiction to jurisdiction. 7.2 Limitation of Liability. EXCEPT FOR PERSONAL INJURY, IN NO EVENT WILL SOFAWARE BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY DAMAGES ARISING OUT OF THE SUBJECT MATTER OF THIS AGREEMENT, THE PRODUCT OR ANY SERVICES UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY, FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS), OR FOR LOSS OF OR CORRUPTION OF DATA), OR FOR COST OF PROCUREMENT OF SUBSTITUTE GOODS OR TECHNOLOGY, IRRESPECTIVE OF WHETHER SOFAWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOFAWARE'S MAXIMUM LIABILITY FOR DAMAGES SHALL BE LIMITED TO THE LICENSE FEES RECEIVED BY SOFAWARE UNDER THIS LICENSE FOR THE PARTICULAR PRODUCT(S) WHICH CAUSED THE DAMAGES. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You.8. GOVERNMENT REGULATION AND EXPORT CONTROL

8.1 Government Regulations. You agree that the Product will not be shipped, transferred, or exported into any country or used in any manner prohibited by law.8.2 Export. The Product is subject to export control laws of the State of Israel and/or may be subject to additional export control laws applicable to You or in Your jurisdiction, including, without limitation, the United States. If the Product contains any encryption device You must contact SofaWare's export regulation information page (www.sofaware.com or www.s-box.com) for specific information. You agree that You will not ship, transfer, or export the Product into any country, or make available or use the Product in any manner, prohibited by law.

232 Nokia IP40 Security Platform User’s Guide v1.1

Page 233: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

8.3 You understand and acknowledge that upon entry of the Product into the United States it becomes subject to regulation by agencies of the U.S. government, including the U.S. Department of Commerce, which prohibit export or diversion of certain products and technology to certain countries. Any and all of Your obligations with respect to the Product shall be subject in all respects to such United States laws and regulations as shall from time to time govern the license and delivery of technology and products abroad by persons subject to the jurisdiction of the United States, including the Export Administration Act of 1979, as amended, any successor legislation, and the Export Administration Regulations ("EAR") issued by the Department of Commerce, International Trade Administration,and Bureau of Export Administration. You warrant that You will comply in all respects with the export and reexport restrictions applicable to the Product and will otherwise comply with the EAR or other United States laws and regulations in effect from time to time.8.4 You warrant and agree that You are not: (i) located in, under the control of, or a national or resident of Cuba, Iraq, Libya, North Korea, Iran, Syria, Sudan or Yugoslavia, or (ii) on the U.S Treasury Department list of Specially Designated Nationals or the U.S. Commerce Department's Table of Deny Orders.9. GENERAL:

9.1 Miscellaneous. You may not assign your rights or obligations under this Agreement without the prior written consent of SofaWare. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent jurisdiction, that provision of the Agreement will be enforced to the maximum extent permissible so as to effect the intent of the Agreement, and the remainder of the provisions of this Agreement shall remain in full force and effect. The laws of the State of Israel shall govern all issues arising under or relating to this Agreement, without giving effect to the conflict of laws principles thereof. All disputes arising under or relating to this Agreement shall be resolved exclusively in the appropriate Israeli court sitting in Tel Aviv, Israel. This Agreement will not be governed by the United Nations Convention on Contracts for the International Sales of Goods, the application of which is expressly excluded. This Agreement sets forth the entire understanding and agreement between You and SofaWare and may be amended only in writing signed by both parties.9.2 Third Party Software. Certain Third Parties Software may be provided with the Product for use in connection with the Product subject to the licenses of their respective proprietors. The Third Parties Software may be used only in connection with the Products. The provisions of this Agreement shall apply to all Third Party Software Providers and to Third Party Software as if they were the Product and SofaWare, respectively. 9.3 Government Restricted Rights. This provision applies to Product acquired directly or indirectly by or on behalf of any Government. The Product is a commercial product, licensed on the open market at market prices, and was developed entirely at private expense and without the use of any U.S. Government funds. Any use modification, reproduction, release, performance, display, or disclosure of the Product by any Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement, and no license to the Product is granted to any government requiring different terms.9.4 Questions? Should You have any questions concerning this Agreement contact the manufacturer at SofaWare Technologies Ltd., 3 Hilazon St., Ramat-Gan, Israel 52522.

Nokia IP40 Security Platform User’s Guide v1.1 233

Page 234: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

C End User License Agreement

234 Nokia IP40 Security Platform User’s Guide v1.1

Page 235: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

D Compliance Information

Declaration of Conformity according to ISO/IEC Guide 22 and EN 45104Manufacturer’s name:Nokia CorporationManufacturer’s address:313 Fairchild DriveMountain View, CA 94043- 2215 USA

declares that the product:

Product name:IP40

Model number:IP40Product options:AllSerial number:1 to 100,000Date first applied:2004

conforms to the following standards:

Safety:EN60950:1992, A1,A2:1993, A3:1995, A4:1997, A11:1998with Japanese National Deviations

EMC:EN50024, EN55022B 1998, CISPR 22 Class B 1985, EN61000-3-2, EN61000-3-3Supplementary information:

“The product complies with the requirements of the Low Voltage Directive 73/23/EEC and the EMC Directive 89/336/EEC.”

Alan HutchinsonQuality EngineerMountain View, CaliforniaUSA

European contact:Greg ShortellNokia Telecommunications2 Heathrow Blvd, 284 Bath RoadHeathrow, Middlesex UB7 ODQ England

Nokia IP40 Security Platform User’s Guide v1.1 235

Page 236: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

D Compliance Information

Compliance StatementThis hardware complies with the following standards:

EmissionsFCC Part 15, Subpart B, Class B US and CanadaEN55022B: (CISPR 22, Class B) European Community (CE)EN6100-3-2 European Community (CE)EN6100-3-3 European Community (CE)

ImmunityEN50024: European Community (CE)

EN61000-4-2EN61000-4-3EN61000-4-4EN61000-4-5EN61000-4-6EN61000-4-8EN61000-4-11ENV50204

SafetyUL1950 USCAN/CSA 22.2, No. 950-M95 CanadaEN60950 European Community (CE, TUV)EN60950 Japan(with Japanese National Deviations)

FCC Notice (US)This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio or television reception, the user is encouraged to try to correct the interference by one or more of they following measures:

Reorient or relocate the receiving antenna.Increase the separation between the computer and receiver.Connect the computer into an outlet on a circuit different from that to which the receiver is connected.Consult the dealer or an experienced radio/TV technician for help.

CautionAny changes or modifications not expressly approved by the grantee of this device could void the user’s authority to operate the equipment.

236 Nokia IP40 Security Platform User’s Guide v1.1

Page 237: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

FCC Notice (US)

Nokia IP40 Security Platform User’s Guide v1.1 237

Page 238: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

D Compliance Information

238 Nokia IP40 Security Platform User’s Guide v1.1

Page 239: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Aabout SNMP 119about this guide 13about VPN 161accessing Nokia IP40 securely 50accessing Nokia IP40 Security Platform 57accessing Nokia IP40 with HTTP and HTTPS 62account page fields 201adding a static route 91adding BGP peer to Nokia IP40 130adding static NAT mappings 87adding VPN sites

using IP40 Tele 180adding VPN sites using IP40 Satellite X 184automatic and manual updates 209

checking software updates when locally managed 209

checking software updates when remotely managed 210

automatic DHCP connection window 72

Bborder gateway protocol (BGP) 128

Cchanging IP addresses in your network 85Check Point SmartCenter large scale manager ( LSM) 211

clearing BGP 130command-line conventions 15completing site creation 169Compliance Specifications 235compliance standards

emission 236safety 236

configuringcriteria for path selection 133high-availability options 133local loopback interface 133

configuring a backup Internet connection 81configuring a DMZ network 86

using static NAT 87using static routes 91

configuring advanced secure shell options 114configuring server authentication of users 114server implementation 115server protocol details 115service details 115

configuring BGP route advertisements 129

configuring criteria for path selection 134configuring DDNS 150configuring device functions 141

configuring system logging 142date configuration 141exporting the configuration 144host name configuration 141importing the configuration 145managing configuration 144

configuring dial-up with CLI 79CLI wizard 79

configuring dial-up with GUI 78configuring external syslog server 142configuring Internet connection 65

using cable modem 68using LAN connection 67using setup wizard 65

configuring IP40 through out-of-band management (OOB) 137

configuring network access 105adding users 107changing password 105deleting users 109viewing users 108

configuring NG AI and IP40 for site-to-site using LSM profiles 211

configuring Nokia IP40 for dual homing ISP connectivity 126configuring ISP dial-up profiles 127

configuring Nokia IP40 for Internet connection 44configuring OOB form IP40 GUI 138configuring remote BGP peer with MD5 authentication 132

configuring routing policies 131configuring SNMP 119configuring SNMP parameters 120configuring SNMP parameters from CLI 121configuring SSH key pairs 115configuring VRRP 123

configuring VRRP for LAN and DMZ networks 125with CLI commands 124

configuring your account 202connecting to the Internet with Nokia IP40 65connecting to the network 42

installing your network 42control panel window 33conventions used in this guide 14creating 130

access lists 131route maps 131

customizing the Nokia IP40 Security Platform security

Nokia IP40 Security Platform User’s Guide v1.1 Index - 239

Page 240: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

policy 98allowing and blocking rules 98creating firewall rules 98deleting rules 102

DDDNS 149defining a backup VPN gateway 190defining a computer as an exposed host 103defining an exposed host 102deleting a static route 93deleting a VPN site 169deleting static NAT mappings 90deploying Nokia IP40 security platform

with Nokia Horizon Manager 63with Sofaware Management Portal 63

diabling Internet connection 80dial-up and direct dialup configuration 78direct dial-up PPP 77disabling email antivirus 206disabling hide NAT 85disabling SSH 113disabling VRRP for LAN and DMZ networks 125disabling Web filtering 204disconnecting from your service center 203downloading configuration 183downloading pre-compiles policy 176DSL connection settings 70

using automatic DHCP 72using PPPoE 71using PPTP 71

dual homing 125dynamic DNS 149

Eediting a static route 93editing static NAT mappings 87editing users 108emissions 236enabling BGP routing 129enabling email antivirus 206enabling hide NAT 85enabling HTTPS access 116enabling HTTPS web access 117enabling Internet connection 80enabling IP40 to accept SSH requests 112enabling or disabling Internet connection 80

using quick Internet connect or disconnect 80enabling or disabling Telnet access 61enabling SNMP access 120

end user license agreement 229external BGP 134

Ffailsafe mode 220failsafe mode using console 220FCC Notice 236firmware upgrade GUI window 147forgot password 216frequently asked questions 214front panel of Nokia IP40 32

Ggenerating private key 117generating self-signed certificate 117getting started with Nokia IP40 43

connecting to a central management server 48first-time login 43making initial settings 45registering with support site 47setting time 45

GUI diagnostics window 158

Hhigh availability feature 123high-availability solution

with dual Nokia IP40 Security Platform 136with single Nokia IP40 Security Platform 135

HTTPS access through OOB 139

Iimmunity 236Import setting GUI window 146in this guide 13information about VPN tunnels 157installing

security policy using GUI 177installing a certificate 118installing a private key 118installing Nokia IP40 Security Platform 33

before you install 33installing product key 147installing VPN certificates 173

from SmartCenter 175using CLI 175

Internet connection information 82introduction to Nokia IP40 Security Platform 19IP40, Front Panel 31

Index - 240 Nokia IP40 Security Platform User’s Guide v1.1

Page 241: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

IP40 185IP40 appliance overview 29IP40 Internet page 66IP40 rear panel 29IP40 Tele to Satellite 185IP40 time setup wizard screen 46IP40 welcome window 50

LLAN connection window 74list of modems supported 214logging off a VPN site 173logging off from Nokia IP40 security platform 51logging on through my.vpn 172logging on to a VPN site from GUI 171logging on to Nokia IP40 Security Platform 49logging to a VPN site 170Logout window 51

MMAC cloning 68

cloning a MAC address 69MAC cloning page 69main components of IP40 GUI 53managing authorized keys 116managing IP40 device with Nokia Horizon Manager 211

managing large scale deployment mode 62managing new host keys 116managing SSH key pairs 115managing your local area network 83

changing IP addresses 84configuring network settings 83enabling or disabling Hide NAT 85enabling or disabling the DHCP server 84

manually configuring the Internet settings 73menu items 17monitoring BGP 129monitoring SNMP 119multiple dial-up profiles 80

Nnames and functions of IP40 GUI elements 54NAT mode

No - NAT mode 188network protocol window 35Network requirements 28network requirements 28network utilities 143

network window 34Nokia 20Nokia IP40

as VPN client 180as VPN server 178

Nokia IP40 configuration methods 58Nokia IP40 connection methods 57

using console port 58using secure shell 62using Telnet 60

Nokia IP40 Front Panel 31Nokia IP40 login page 49Nokia IP40 registration window 48Nokia IP40 Satellite X to Check Point SmartCenter FP3/NG AI 192

Nokia IP40 Satellite X to VPN-1 (Site-to-Site VPN) 190Nokia IP40 Security Platform Features 20

connectivity 20Nokia IP40 Security Platform features

diagnostics and maintenance 27Firewall connectivity 22management 25security services 26VPN connectivity 23

Nokia IP40 Security Platform licenses 19Satellite 20Tele 8 20

Nokia IP40 Security Platform overview 29front panel 32rear panel 29

Nokia IP40 Security Platform package contents 28Nokia IP40 subscription services window 48Nokia IP40 technical specifications 223Nokia IP40 topologies 42notices 14

OOOB overview 137

PPackage Contents 28password authentication 114PPPoE configuration page 71PPTP configuration page 71prefix lists 130public-key authentication 114

Rrear panel of Nokia IP40 30

Nokia IP40 Security Platform User’s Guide v1.1 Index - 241

Page 242: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

refreshing your service center connection 201related documentation 17remote configuration mode in Nokia IP40 Security Platform 139

resetting Nokia IP40 to factory defaults 150resetting to factory defaults by using Reset button 151route based VPN and BGP 127routing all traffic 183running diagnostics 221

Ssafety 236safety precautions 223secure shell 112

configuring SSH 112enabling SSH 113

secure shell authentication methods 114using SSH client 114

secure socket layer (SSL) 116securemote to Nokia IP40 satellite X 179selecting protocols for virus scanning 207setting access control 111setting the syslog server 142setting up Check Point FP3 191Setting up IP40 Satellite X for VPN connection with SmartCenter FP3 193

setting up Nokia IP40as VPN client 180as VPN server 163

setting up Nokia IP40 Satellite X 179Setting up Nokia IP40 Security Platform

with Apple computer 41with Microsoft Windows 98 or Millennium operating

system 33with Window XP and 2000 operating system 37

setting up Nokia IP40 Security Platform security policy 95configuring virtual servers 96restricting access from external servers 97setting firewall security level 95

setting up remote VPN access for users 109setting up SNMP access 119site-to-site VPN with Nokia CryptoCluster 195site-to-site VPN with Windows 2000 194SNMP configuration 119SofaWare secure management portal 203specifications

compliance 236emissions 236safety 236

SSH access through OOB 139starting your subscription services 197

TTCP/IP properties window 35TCP/IP window 35telnet window 60temporarily disabling email antivirus 208text conventions 16Time configuration 141to configure sofaware management center 203to disconnect from your service center 203troublshooting Nokia IP40 Security Platform 213

configuring debugging levels 213

Uunderstanding the IP40 Web GUI 52uninstalling VPN certificates 176unrestricted mode 189upgrading firmware from failsafe kernel 221upgrading firmware in failsafe mode 220upgrading Nokia IP40 Security Platform firmware 147uploading VPN certificates

by using Check Point Smart LSM 175using managed services 197using network utilities from IP40 GUI 143using RADIUS authentication 110

access control 111Telnet access 112

using the IP40 Web GUI 53more information about GUI 53status bar 56

Vviewing debugging 130viewing debugging levels 214viewing firmware status 219viewing Internet information 81viewing reports on Nokia IP40 Security Platform 153viewing reports on security platform

viewing active computers 154viewing active connections 156viewing event log 153viewing VPN tunnels 157

viewing service information 201viewing SNMP parameters 122viewing static NAT mappings 90viewing the Nokia IP40 diagnostic summary 158viewing VRRP configuration 125

Index - 242 Nokia IP40 Security Platform User’s Guide v1.1

Page 243: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

virtual router redundancy protocol (VRRP) 123virus scanning 206VPN 178VPN scenarios 178VPN topologies 162

Wwarranty 225Web filtering 204

enabling Web filtering 204selecting categories to block 205temporarily disabling Web filtering 205to allow or block a category 205

working with VPNs 161

Nokia IP40 Security Platform User’s Guide v1.1 Index - 243

Page 244: IP40 Security Platform User’s Guide - Check Point …...Nokia IP40 Security Platform User’s Guide v1.1 3 Nokia Contact Information Corporate Headquarters Regional Contact Information

Index - 244 Nokia IP40 Security Platform User’s Guide v1.1