Solved

Cisco PIX 501 Remote VPN setup with Cisco VPN client software and RADIUS

Posted on 2007-04-02
2
2,293 Views
Last Modified: 2008-01-09
I have a Cisco PIX 501 firewall setup and running. What I need to do is setup a VPN connection to a remote VPN client running Clisco clint 3.5 software. I'm using the PDM interface to setup the box. I have a internal RADIUS setup to handle authentication and the RADIUS has a secret key. I have DNS and WINS and a local Domain. Is there a document somewhere that has a step by step guide?

0
Comment
Question by:jasonlnlv
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 28

Accepted Solution

by:
batry_boy earned 500 total points
ID: 18840825
Here is an example using the CLI:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00800b6099.shtml

If you want to use the PDM, then I recommend using the VPN Wizard under the Tools menu and choose the "remote access" type VPN tunnel...just follow the wizard and answer the questions...
0
 
LVL 28

Assisted Solution

by:batry_boy
batry_boy earned 500 total points
ID: 18840920
I found the following document on using the VPN Wizard through the PDM:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pdm/v_30/pdm30olh.pdf
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question