Solved

Creating and saving .pcf files for PIX firewall

Posted on 2006-11-02
4
2,293 Views
Last Modified: 2013-11-16
How do you create the actual .pcf file to distribute?  Obviously I can configure it in the VPN client for use but I can't find any way to export it.
Anyone know how to do this?  I'd appreciate it I'm kind of in a bind for time.
Thanks.
0
Comment
Question by:cyberdragon666
4 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 250 total points
ID: 17862351
Just go to C:\Program Files\Cisco\Cisco VPN Client\Profiles (im not sure if that is the correct folder path but you will find it). You will find pcf-Files in there. Just copy it to the desired machine and select Import from the menu in the VPN Client.
0
 
LVL 79

Assisted Solution

by:lrmoore
lrmoore earned 250 total points
ID: 17862662
It can be even easier than that. It is a simple text file.
Yes, it lives in the ..\Profiles directory. Just email that .pcf file to someone, have them copy it to the ..\Profiles directory and then open the client. You don't really even need to use the import.

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now