Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

PDM Locations and PDM groups

Posted on 2004-09-10
2
303 Views
Last Modified: 2010-04-09
I read in the cisco documentation that the PDM locations and PDM groups could all be removed without any effect on the firewall.  As I understand it the next time someone opens up the WEBGUI that it will once again add the groups and locations currently in the firewall.  I also saw on here that someone had said it was dangerous to remove a couple key PDM locations.  Can I remove all the groups and locations with out causing some sort of problem?

Thanks,

Sunny
0
Comment
Question by:sunnyd24
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 12028947
The locations can certainly be taken out with no ill effects to the function of the PIX, but these are sort of intertwined with the groups.
the PDM location entry is used to define the PDM groups
The PDM groups have the potential to be referenced within object-groups which can be referenced by access-lists. Removing them without full knowlege of how they are being used could be deterimental to the function of the PIX.

If you will never use the GUI, and there are no object-group configurations, then you are safe to remove all PDM ---- entries.
0
 

Author Comment

by:sunnyd24
ID: 12029506
Thank you!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Need Advise - System / Network Security 4 58
Firewall connection 10 72
Remote Desktop Encryption error at the client 1 49
Need help on Windows Firewall blocking program 7 46
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question