Solved

How to Restore PIX 506E config

Posted on 2009-04-01
6
325 Views
Last Modified: 2012-05-06
I've made a mess of a PIX configuration trying to setup a new Point-to-Point VPN.  I saved the running configuration before I started hacking at this thing and would like to restore the PIX back to that configuration.  I've done many wr mem.

Can somebody tell me the steps to replace the current configuration with the original saved configuration?  The box had several existing VPNs on it before I started too.

it's running V6.3(4)

Thanks

Bill
0
Comment
Question by:labdunn
  • 3
  • 3
6 Comments
 
LVL 19

Expert Comment

by:nodisco
Comment Utility
Hey

do you have a notepad copy of the original or a tftp copy?

Either way what I would do is firstly make a copy of what you have, then erase the config and reload.
wri erase
reload

Either paste the notepad config back in or restore it from your tftp server.
To do tftp - setup your inside interface with an ip address and follow instructions here:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008072142a.shtml#write

hth
0
 
LVL 1

Author Comment

by:labdunn
Comment Utility
Thanks!
0
 
LVL 1

Author Comment

by:labdunn
Comment Utility
?
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 19

Accepted Solution

by:
nodisco earned 250 total points
Comment Utility
Hey labdunn

I think you do have your answer but are closing the Q incorrectly - I take it you were happy with the solution?
You need to select my post as the accepted solution and assign the points accordingly.  If this is not the case, pls advise.

cheers
0
 
LVL 1

Author Comment

by:labdunn
Comment Utility
Thanks again
0
 
LVL 19

Expert Comment

by:nodisco
Comment Utility
no probs mate
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Cisco Pix/ASA hairpinning The term, hairpinning, comes from the fact that the traffic comes from one source into a router or similar device, makes a U-turn, and goes back the same way it came. Visualize this and you will see something that looks …
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now