• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 457
  • Last Modified:

need to remove a lan-to-lan vpn on pix 515e

I need to remove (1) lan-to-lan vpn from a pix 515e with multible lan-to-lan vpns configured.
0
tebone68
Asked:
tebone68
  • 3
  • 2
1 Solution
 
Scotty_ciscoCommented:
can you post a limited show run so we can tell you what ACL and Crypto map to remove?

Thanks
Scott
0
 
johanvz1Commented:
Hi,

Easiest way is to login on the Web GUI Interface click on VPN or PPTP or what type of vpn is it will show you what you have click on it and delete the rule.However make sure the computer you want to open the firewall from has access to it via reserved IP address or MAC that is the easiest especially if you do not really have experience on firewalls.

Regards,

Johan
0
 
tebone68Author Commented:
I have never used the GUI for a pix. I was under the impression that you had to do a clear isakmp key and then put the remaining sites back in with the pre-shared keys that are associated with them? The problem is the client doesn't have the keys. I have heard if I do a write net the keys will show up in clear text?
0
Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

 
Scotty_ciscoCommented:
not sure on the write net part of the question but I do know that the isakmp key if you changed that on all the sites and then reconfigured it locally to a new key that the one site would be dropped.  I would still delete the rules if you can a partial show run would help explain this.

Thanks
Scott
0
 
tebone68Author Commented:
I'm not onsite right now so I can't get that show run for you. It would have been nice if Cisco would have allowed a "no isakmp key" command to get ride of connections an easy way.

0
 
Scotty_ciscoCommented:
yes it would .... think that will be an option in the new 7.x code.

Thanks
Scott
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now