Solved

Need remote access

Posted on 2007-11-16
2
183 Views
Last Modified: 2010-04-10
I have a hub and spoke network with a pix 506e at the main location and pix 501 firewalls at the branch locations.  I need to have remote access to my network with a laptop from various locations.  I only need to connect to a unix system so it can be dialup speeds.
0
Comment
Question by:vade_mecum
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 28

Accepted Solution

by:
batry_boy earned 250 total points
ID: 20301262
See the following for configuring the Cisco VPN client software to establish a remote access VPN tunnel to the PIX.

http://www.cisco.com/en/US/products/sw/secursw/ps2308/products_configuration_example09186a00801e71c0.shtml

See the following PDF for how to use the VPN Wizard in the PIX PDM to configure the PIX for remote access VPN use (under "Wizards" on the main page, click on "VPN Wizard" and it will walk you through the steps):

http://www.cisco.com/en/US/docs/security/pix/pix63/pdm30/olh/PDF_Version_-_PDM_OLH/pdm304.pdf
0
 
LVL 28

Expert Comment

by:batry_boy
ID: 20301266
Forgot to mention to click "VPN Wizard Start" after clicking "VPN Wizard" in the above PDF...
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question