Solved

Using PIX 506 Wizard to set up a VPN

Posted on 2007-04-03
2
269 Views
Last Modified: 2013-11-16
I am trying to configure a VPN on our PIX 506.  I am using the VPN wizard because I am not familiar with the terminal programming method.  I thought it would be an easy fill in the blanks process but the information our vendor sent us does not match the fields in the wizard.  If anyone knows how the information below translates to the fields in the vpn wizard I would greatly appreciate your help!

Remote tunnel endpoint:
216.243.72.68
Remote network range:
192.168.50.0/24
Security Mode:
Compatable
IKE proposal types, Phase I and II:
Phase I: pre-g2-3des-sah/pre-g2-3des-md5/pre-g2-des-sha/pre-g2-des-md5
Phase II: nopfs-esp-3des-sha/nopfs-esp-3des-md5/nopfs-esp-des-sha/nopfs-esp-des-md5
IKE Timeouts:
Ph1 timeout is 28800 seconds.
Ph2 timeout is 3600 seconds.
0
Comment
Question by:thyatt5473
2 Comments
 
LVL 2

Accepted Solution

by:
flscott earned 500 total points
Comment Utility
Be wary of posting all your VPN information on a public message board. Not all of the people here are as honest as we would like to presume.

Here's the documentation for setting up a VPN with a pix box
http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172787.html

What are the fields that the PIX is asking for?
0
 

Author Comment

by:thyatt5473
Comment Utility
flscott,
Thanks!  You are right and I posted without thinking.  The article you posted was most helpful and I think I have it now.  Thanks again!
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now