Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to Connect to Cisco Pix 501?  (Noob needs commands)

Posted on 2006-11-20
5
Medium Priority
?
260 Views
Last Modified: 2013-11-16
I was wondering how I can connect to our cisco pix 501?  I know how to connect with hyperterminal, but I don't know how to do a (config terminal).

I need to add the following line to our router because our VPN users cannot access the internet when they are connected to our VPN

vpngroup buckstaffuser split-tunnel nonat

Will that work?

Thanks
0
Comment
Question by:buckstaff
  • 2
  • 2
5 Comments
 
LVL 28

Expert Comment

by:batry_boy
ID: 17982139
You need to be in "enable" mode before you can do a "configure terminal" command.  Type "enable" at the ">" prompt, then enter the enable password.  The prompt will change to a "#" prompt...then you can issue the "configure terminal" command.  The prompt will then look like:

hostname(config)#

From that prompt you can issue the "vpngroup" command that you specified.  However, you'll need to have the ACL called "buckstaffuser" already defined.

Hope this helps...
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 2000 total points
ID: 17982697
>you'll need to have the ACL called "buckstaffuser" already

Actually, you need the ACL called "nonat" defined. "buckstaffuser" is the VPN group name

pix>enable
Password:
pix#config t
pix(config)#vpngroup buckstaffuser split-tunnel nonat
pix(config)#exit
pix#write mem

I would not use the same ACL for nonat (nat 0) and for split-tunneling. They are two different concepts, two different processes and you may not get the results you expect if you do use the same one. Without seeing your complete config, it is difficult to say definitively...
0
 

Author Comment

by:buckstaff
ID: 17988837
thanks lrmoore,

How can I verify that the change was made on the pix?  
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17988842
pix#write term
0
 

Author Comment

by:buckstaff
ID: 17988906
you rock.  I really need to get my Cisco certs one of these days.
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question