• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 555
  • Last Modified:

PDM configuration statement not supported

I Have a Cisco Pix 501 firewall that I enabled split tunneling on a vpn group and am now presented with the following error in the Cisco PIX Device manager.

PDM has encountered a firewall configuration command statement that PDM does not support. Configuration parsing has been stopped. PDM access is not limited to the Home and Monitoring views during the current session. To regain access to the rest of the PDM, use the command line interface window to fox the unsupported command statement and then refresh PDM with the modified firewall configuration.

Access control list outside_cryptomap_dyn_20 is applied to interface outside for IPSec traffic selection and VPN client group APEX for split tunneling. PDM does not support multiple uses of a given Access Control List.

This is my first time working with a Cisco device and Im hoping that someone can help disable the split tunneling that I have enable. I saw a previous post (http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_24110179.html )that suggested looking at the running config but when I try, the option in the file menu is grayed out.

Is there a command I can issue that will disable the split tunneling on group that I have enabled?
1 Solution
no vpngroup <group_name> split-tunnel <access_list>

I can't say the name of your vpngroup, but if it was VPN:

no vpngroup VPN split-tunnel outside_cryptomap_dyn_20
breynolds01Author Commented:
Excellent answer, thank you so much!  Worked like a charm.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now