<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 getting file via HTTPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-getting-file-via-https/m-p/3296790#M1009091</link>
    <description>So, before anyone bothers helping me out: It seems, this is a more or (more) less well known problem. I stumbled across this topic here: &lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/t5/vpn/tls-1-2-on-asa-clientless-ssl-vpn/td-p/2173348" target="_blank"&gt;https://supportforums.cisco.com/t5/vpn/tls-1-2-on-asa-clientless-ssl-vpn/td-p/2173348&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It seems, that the ASA up to version 9.3 have some weird difficulties with Diffie Hellman algorithms. After I set this command in the admin-context: "ssl encryption aes128-sha1 aes256-sha1 3des-sha1" it actually worked. Pretty sad and weird behaviour for an ASA but what gives...&lt;BR /&gt;&lt;BR /&gt;Thanks for reading, Topic done.</description>
    <pubDate>Fri, 15 Dec 2017 11:47:44 GMT</pubDate>
    <dc:creator>Icarus</dc:creator>
    <dc:date>2017-12-15T11:47:44Z</dc:date>
    <item>
      <title>ASA 5510 getting file via HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-getting-file-via-https/m-p/3296674#M1009090</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a little problem here. It might be an error on my side, but as it is with every error: I have no clue what is actually going wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First, what I want to do: I want to be able log into my ASA5510 with Software Version 9.1(7)19, go to the system context and enter this command: copy https://username:password@server-ip//path/file flash:/filename&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The path is actually correct. I can get this file from one of my C3750G and load it into my flash. When I do it with my ASA from the system context, I always get this error: "%Error opening https://username:password@server-ip//path/file (I/O error)"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I do a term mon on this device, it shows me that "Device failed SSL handshake". When I capture the handshake, everything looks ok for my taste. I installed a CA certificate in the admin-context, which is just above the server certificate in the whole chain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I compare the capture from my C3750G and my ASA, it really looks the same. Both use TLSv1, both agree on one cipher suite with the server, but right after the capture says "Server Key Exchange", the ASA sends a TCP packet with the fin flag set and terminates the session. I really have no clue why this happens.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there some best practice on how to configure this? All I find if I search for "https" and "ASA" is the ASDM, and that is not what I am searching for. Even though the ASDM is working fine. Just saying. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-getting-file-via-https/m-p/3296674#M1009090</guid>
      <dc:creator>Icarus</dc:creator>
      <dc:date>2020-02-21T14:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 getting file via HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-getting-file-via-https/m-p/3296790#M1009091</link>
      <description>So, before anyone bothers helping me out: It seems, this is a more or (more) less well known problem. I stumbled across this topic here: &lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/t5/vpn/tls-1-2-on-asa-clientless-ssl-vpn/td-p/2173348" target="_blank"&gt;https://supportforums.cisco.com/t5/vpn/tls-1-2-on-asa-clientless-ssl-vpn/td-p/2173348&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It seems, that the ASA up to version 9.3 have some weird difficulties with Diffie Hellman algorithms. After I set this command in the admin-context: "ssl encryption aes128-sha1 aes256-sha1 3des-sha1" it actually worked. Pretty sad and weird behaviour for an ASA but what gives...&lt;BR /&gt;&lt;BR /&gt;Thanks for reading, Topic done.</description>
      <pubDate>Fri, 15 Dec 2017 11:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-getting-file-via-https/m-p/3296790#M1009091</guid>
      <dc:creator>Icarus</dc:creator>
      <dc:date>2017-12-15T11:47:44Z</dc:date>
    </item>
  </channel>
</rss>

