I have a host of remote users and offices that VPN to a PIX 520 daily, for access to a central system. We are implementing a DMZ to bring web and dns in house the higher ups here are afraid to execute a "clear xlate", for fear it will kill all VPN sessions and the help desk will get slammed with calls.
My question is, does "clear xlate" affect VPN tunnels originating from the outside, or does it only affect xlates that are created from the inside interfaces on the PIX?
Also what affect does this have? Will is kill users telnet sessions, or cause them to need to reconnect?
I apologize if this is a silly question in any way, but I can not find any information answering this anywhere on cisco.com.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...