Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

PDM Locations and PDM groups

Posted on 2004-09-10
2
Medium Priority
?
317 Views
Last Modified: 2010-04-09
I read in the cisco documentation that the PDM locations and PDM groups could all be removed without any effect on the firewall.  As I understand it the next time someone opens up the WEBGUI that it will once again add the groups and locations currently in the firewall.  I also saw on here that someone had said it was dangerous to remove a couple key PDM locations.  Can I remove all the groups and locations with out causing some sort of problem?

Thanks,

Sunny
0
Comment
Question by:sunnyd24
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 2000 total points
ID: 12028947
The locations can certainly be taken out with no ill effects to the function of the PIX, but these are sort of intertwined with the groups.
the PDM location entry is used to define the PDM groups
The PDM groups have the potential to be referenced within object-groups which can be referenced by access-lists. Removing them without full knowlege of how they are being used could be deterimental to the function of the PIX.

If you will never use the GUI, and there are no object-group configurations, then you are safe to remove all PDM ---- entries.
0
 

Author Comment

by:sunnyd24
ID: 12029506
Thank you!
0

Featured Post

Enroll in September's Course of the Month

This month’s featured course covers 16 hours of training in installation, management, and deployment of VMware vSphere virtualization environments. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question