Solved

How to Restore PIX 506E config

Posted on 2009-04-01
6
327 Views
Last Modified: 2012-05-06
I've made a mess of a PIX configuration trying to setup a new Point-to-Point VPN.  I saved the running configuration before I started hacking at this thing and would like to restore the PIX back to that configuration.  I've done many wr mem.

Can somebody tell me the steps to replace the current configuration with the original saved configuration?  The box had several existing VPNs on it before I started too.

it's running V6.3(4)

Thanks

Bill
0
Comment
Question by:labdunn
  • 3
  • 3
6 Comments
 
LVL 19

Expert Comment

by:nodisco
ID: 24045852
Hey

do you have a notepad copy of the original or a tftp copy?

Either way what I would do is firstly make a copy of what you have, then erase the config and reload.
wri erase
reload

Either paste the notepad config back in or restore it from your tftp server.
To do tftp - setup your inside interface with an ip address and follow instructions here:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008072142a.shtml#write

hth
0
 
LVL 1

Author Comment

by:labdunn
ID: 24046137
Thanks!
0
 
LVL 1

Author Comment

by:labdunn
ID: 24046144
?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 19

Accepted Solution

by:
nodisco earned 250 total points
ID: 24046160
Hey labdunn

I think you do have your answer but are closing the Q incorrectly - I take it you were happy with the solution?
You need to select my post as the accepted solution and assign the points accordingly.  If this is not the case, pls advise.

cheers
0
 
LVL 1

Author Comment

by:labdunn
ID: 24046167
Thanks again
0
 
LVL 19

Expert Comment

by:nodisco
ID: 24046169
no probs mate
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now