Solved

PDM Locations and PDM groups

Posted on 2004-09-10
2
305 Views
Last Modified: 2010-04-09
I read in the cisco documentation that the PDM locations and PDM groups could all be removed without any effect on the firewall.  As I understand it the next time someone opens up the WEBGUI that it will once again add the groups and locations currently in the firewall.  I also saw on here that someone had said it was dangerous to remove a couple key PDM locations.  Can I remove all the groups and locations with out causing some sort of problem?

Thanks,

Sunny
0
Comment
Question by:sunnyd24
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 12028947
The locations can certainly be taken out with no ill effects to the function of the PIX, but these are sort of intertwined with the groups.
the PDM location entry is used to define the PDM groups
The PDM groups have the potential to be referenced within object-groups which can be referenced by access-lists. Removing them without full knowlege of how they are being used could be deterimental to the function of the PIX.

If you will never use the GUI, and there are no object-group configurations, then you are safe to remove all PDM ---- entries.
0
 

Author Comment

by:sunnyd24
ID: 12029506
Thank you!
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question