Solved

Moving from Cisco Pix 506e to ASA5510

Posted on 2012-04-11
2
455 Views
Last Modified: 2012-04-11
I am replacing a Pix 506e with a ASA5510.  Are the following statements in the pix just there because someone used the PDM to configure it?  They are not doing anything right?

pdm location 192.168.1.0 255.255.255.0 inside
pdm location 192.168.0.0 255.255.255.0 inside
pdm location 192.168.2.0 255.255.255.0 inside
pdm location 192.168.3.0 255.255.255.0 inside
pdm location 192.168.4.0 255.255.255.0 inside
pdm location 192.168.5.0 255.255.255.0 inside
pdm location x.x.171.86 255.255.255.255 outside
pdm location 192.168.0.0 255.255.255.0 outside
pdm location 192.168.2.0 255.255.255.0 outside
pdm location 192.168.3.0 255.255.255.0 outside
pdm location 192.168.4.0 255.255.255.0 outside
pdm location x.x.171.0 255.255.255.0 outside
pdm location 192.168.1.0 255.255.255.0 outside
pdm location 192.168.5.0 255.255.255.0 outside
pdm location 10.10.10.0 255.255.255.0 outside
pdm location 192.168.6.0 255.255.255.0 outside
0
Comment
Question by:denver218
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 37834256
You can safely remove these. They were used in the PIX to define the attached networks (from the top of my head). One thing is for sure, the ASA doesn't need them/use them/will miss them ;)
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 37834459
Thanks
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question