Solved

How to create a VPN from a Cisco Pix 506 to Cisco 3000 Concentrator

Posted on 2008-06-13
4
261 Views
Last Modified: 2010-04-21
I need help creating a VPN from a Pix to a 3000 Concentrator.  The Concentrator I don't think I should have any issues with, but with the Pix I have basically no knowledge.

Another company has installed one and for us to make the connection, however they don't have the know how to configure it so they've put it my hands.  At this point I only have SSH access to the Pix with logins.  I'm not Cisco Certified so many of the documentation/software I have no access to.  

Please help point me in a good direction or give me some commands to help to get this done.  Thanks
0
Comment
Question by:TTAsupport
  • 2
  • 2
4 Comments
 
LVL 17

Expert Comment

by:Andres Perales
ID: 21779678
The quickest and easiest way I would tell you is to get https access and use the SDM.  If you can ssh you should be able to enable https access and then hit it that way.

Once in via web their is a vpn wizard, one for point to point tunnels and one for client access...
0
 

Author Comment

by:TTAsupport
ID: 21779922
I understand what you're saying, but not how to do it.

I think I know if I type in
http 72.1.79.0 255.255.255.0 outside
that it will give me http allowed access from that subnet, but how do I do it for https?
0
 
LVL 17

Accepted Solution

by:
Andres Perales earned 500 total points
ID: 21780049
Alright, is the PIX not local to you?  I would not open access to the firewall / pix from the outside.  I thought that you were on the inside trying to get access to the SDM from the inside of the network not the outside.

This link should give you what you need: http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_example09186a00800949d2.shtml


http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html

can you get to these docs?

0
 

Author Closing Comment

by:TTAsupport
ID: 31466950
I'll assume your suggestion worked - the person that posted this question is no longer with the company, but he did get the VPN up and running.   Thank you!
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Probable TCP NULL scan detected 10 378
Windows Defender not able to really turn off 5 72
Security Geteway Sonicwall 7 117
Firewall attack 16 190
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question