Solved

Using PIX 506 Wizard to set up a VPN

Posted on 2007-04-03
2
276 Views
Last Modified: 2013-11-16
I am trying to configure a VPN on our PIX 506.  I am using the VPN wizard because I am not familiar with the terminal programming method.  I thought it would be an easy fill in the blanks process but the information our vendor sent us does not match the fields in the wizard.  If anyone knows how the information below translates to the fields in the vpn wizard I would greatly appreciate your help!

Remote tunnel endpoint:
216.243.72.68
Remote network range:
192.168.50.0/24
Security Mode:
Compatable
IKE proposal types, Phase I and II:
Phase I: pre-g2-3des-sah/pre-g2-3des-md5/pre-g2-des-sha/pre-g2-des-md5
Phase II: nopfs-esp-3des-sha/nopfs-esp-3des-md5/nopfs-esp-des-sha/nopfs-esp-des-md5
IKE Timeouts:
Ph1 timeout is 28800 seconds.
Ph2 timeout is 3600 seconds.
0
Comment
Question by:thyatt5473
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
flscott earned 500 total points
ID: 18843229
Be wary of posting all your VPN information on a public message board. Not all of the people here are as honest as we would like to presume.

Here's the documentation for setting up a VPN with a pix box
http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172787.html

What are the fields that the PIX is asking for?
0
 

Author Comment

by:thyatt5473
ID: 18843531
flscott,
Thanks!  You are right and I posted without thinking.  The article you posted was most helpful and I think I have it now.  Thanks again!
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This program is used to assist in finding and resolving common problems with wireless connections.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question