Solved

PDM Locations and PDM groups

Posted on 2004-09-10
2
310 Views
Last Modified: 2010-04-09
I read in the cisco documentation that the PDM locations and PDM groups could all be removed without any effect on the firewall.  As I understand it the next time someone opens up the WEBGUI that it will once again add the groups and locations currently in the firewall.  I also saw on here that someone had said it was dangerous to remove a couple key PDM locations.  Can I remove all the groups and locations with out causing some sort of problem?

Thanks,

Sunny
0
Comment
Question by:sunnyd24
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 12028947
The locations can certainly be taken out with no ill effects to the function of the PIX, but these are sort of intertwined with the groups.
the PDM location entry is used to define the PDM groups
The PDM groups have the potential to be referenced within object-groups which can be referenced by access-lists. Removing them without full knowlege of how they are being used could be deterimental to the function of the PIX.

If you will never use the GUI, and there are no object-group configurations, then you are safe to remove all PDM ---- entries.
0
 

Author Comment

by:sunnyd24
ID: 12029506
Thank you!
0

Featured Post

Turn Insights Into Action

You’ve already invested in ITSM tools, chat applications, automation utilities, and more. Fortify these solutions with intelligent communications so you can drive business processes forward.

With xMatters, you'll never miss a beat.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question