[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

PIX-501 command questions

Posted on 2005-04-10
2
Medium Priority
?
552 Views
Last Modified: 2011-09-20
what are the commands to view the current config and save it to a txt file as well as save it to my hard drive. And or do a config backup.

I am very new to PIX (as if you couldn't tell).. I wonder how many different ways to acces the config and edit it there are.

lastly is there any literature that lists the commands and how they work to a noobie like myself?

0
Comment
Question by:Bill Warren
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 2000 total points
ID: 13749541
Best place for literature
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/index.htm

How many different ways to access/edit the config
 - https using the Pix Device Manager (PDM) GUI
 - telnet (from inside only)
 - console
 - ssh

Ways to save the config:
 - enable a tftp server on your desktop
 - enter this command in the pix:
     pix(config)#tftp server <ipaddress of PC>\
 - then write to the tftp server
     pix#write net
 - Using PDM GUI - File | Show Running Config in new window
     From that new browser window, File, Save as.... save it anywhere you want
 - Using PDM GUI - File | Save Running Config to TFTP server
 - Hyperterm to console connection.
   Transfer | Capture Text | start
   pix#write term
   Use the spacebar to continue until you reach the end
     Transfer | Capture Text | stop
 - Telnet/ssh
    Open Notepad
     pix#write term
    Cut/copy each screen, paste into notepad

To restore, it's mostly the reverse.
  - Telnet/ssh/console
      pix#config t
      pix(config)#
   open saved config file in notepad. Edit | select all | copy
      pix(config)# <right-click mouse, paste to host>

 - from tftp server
     pix#config net
 
0
 

Author Comment

by:Bill Warren
ID: 13750086
Thanks again
0

Featured Post

Firewall Management 201 with Professor Wool

In this whiteboard video, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. Watch and Learn!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
This video tutorial shows you the steps to go through to set up what I believe to be the best email app on the android platform to read Exchange mail.  Get the app on your phone: The first step is to make sure you have the Samsung Email app on your …
Suggested Courses

590 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question