316 Nokia IP40 Security Platform User’s Guide v2.0 Chapter 8, “Setting Up the Nokia IP40 Security Platform Security Policy” explains methodsto define the firewall level, configure virtual servers, and create firewall rules. Chapter 9, “Configuring Network Access,” describes the network access procedures andusage of SSH and SSL. Chapter 10, “Configuring and Monitoring SNMP,” explains the procedure to configureSimple Network Management Protocol, set community strings, send and enable SNMPtraps. Chapter 11, “High-Availability,” explains about the High Availability feature. Chapter 12, “Configuring Nokia IP40 Through Out-of-Band Management,” explains themethod to configure the Nokia IP40 through Out of Band Management. Chapter 13, “Configuring Device Functions,” discusses how to configure device functionssuch as setting date and time, loading factory defaults and performing firmware upgrade. Chapter 14, “Viewing Reports,” explains how to view reports such as Event Log, ActiveComputers, Active Connections, and VPN Tunnels. Chapter 15, “Working with VPNs,” explains how to configure a VPN by using Nokia IP40. Chapter 16, “Using Managed Services” describes methods for enabling and usingsubscription services such as Web filtering, email antivirus, automatic and manual updates. Chapter 17, “Troubleshooting,”discusses typical problems users encounter and providessolutions to these problems. Appendix A, “Specifications,” describes the Nokia IP40 specifications. Appendix B, “Warranty,” contains the warranty details for the Nokia IP40 Security Platform Appendix C, “End User License Agreement,” contains the End User License Agreement forNokia IP40 Security Platform. Appendix D, “Compliance Information,” contains the compliance information of NokiaIP40 Security Platform.Conventions This Guide UsesThe following sections describe the conventions this guide uses, including notices, textconventions, and command-line conventions.NoticesWarningWarnings advise the user that either bodily injury might occur because of a physical hazard,or that damage to a structure, such as a room or equipment closet, might occur because ofequipment damage.