About This Guide; In This Guide; Conventions This Guide Uses - Nokia Check Point IP150 Installation Manual

Security platform
Hide thumbs Also See for Check Point IP150:
Table of Contents

Advertisement

About this Guide

This guide provides information for the installation and use of the Check Point IP150 security
platform. Installation and maintenance should be performed by experienced technicians or
Check Point-approved service providers only.
This preface provides the following information:

In This Guide

Conventions This Guide Uses

In This Guide
This guide is organized into the following chapters and appendixes:
Chapter 1, "Overview"
Platform.
Chapter 2, "Installing a Check Point IP150 Security Appliance"
the appliance and how to physically connect it to a network and power.
Chapter 3, "Connecting to the Ethernet Ports"
Ethernet ports.
Chapter 4, "Performing the Initial Configuration"
available on the network.
Chapter 5, "Installing and Replacing
the built-in encryption acceleration feature.
Chapter 6, "Troubleshooting"
solutions to these problems.
Appendix A, "Technical Specifications"
characteristics.
Appendix B, "Compliance Information"
Conventions This Guide Uses
The following sections describe the conventions this guide uses, including notices, text
conventions, and command-line conventions.
Check Point IP150 Security Platform Installation Guide
presents a general overview of the Check Point IP150 Security
Components"describes how to configure and activate
discusses problems you might encounter and proposes
gives technical specifications such as interface
includes compliance and regulatory information.
explains how to rack mount
describes how to connect to the supported
explains how to make the appliance
9

Advertisement

Table of Contents
loading

Table of Contents