<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASDM was unable to load the firewall's configuration with Firepower Module running in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-was-unable-to-load-the-firewall-s-configuration-with/m-p/4146810#M1073617</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have been having issues getting ASDM to load with the configuration when the Firepower module is running, I have tried updated my Java to the latest, I am already running the latest ASA and ASDM versions on my 5516-X device (screen dump below) I have updated the FirePower to the version shown below but I can't find a later version to upgrade to, I have seem some discussion on 6.x but I can't find anthing later. I have trawled this site looking for a nugget that may help and all have failed so far. If I use the ASDM before the sfr module starts then I can load it ok, once the sfr module is running it always fails to get the FW config, I have even tried running it under Windows 7 with the same results. This really looks like a bug but one I can't find a fix for, is this certificate related (I am used the self signed ones but I have added it to my trusted cert store on Windows 10) or something more spurious?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mod Card Type Model Serial No.&lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt;1 ASA 5516-X with FirePOWER services, 8GE, AC, ASA5516 JAD20xxxxxx&lt;BR /&gt;sfr FirePOWER Services Software Module ASA5516 JAD20xxxxxx&lt;/P&gt;&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;1 00a2.ee92.e794 to 00a2.ee92.e79c 1.1 1.1.15 9.12(4)2&lt;BR /&gt;sfr 00a2.ee92.e793 to 00a2.ee92.e793 N/A N/A 5.4.1-211&lt;/P&gt;&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;sfr ASA FirePOWER Up 5.4.1-211&lt;/P&gt;&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;1 Up Sys Not Applicable&lt;BR /&gt;sfr Up Up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.12(4)2&lt;BR /&gt;SSP Operating System Version 2.6(1.198)&lt;BR /&gt;Device Manager Version 7.14(1)&lt;/P&gt;&lt;P&gt;Compiled on Tue 14-Jul-20 23:25 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa9-12-4-2-lfbff-k8.SPA"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;HSP1 up 7 mins 24 secs&lt;/P&gt;&lt;P&gt;Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;Internal ATA Compact Flash, 8000MB&lt;BR /&gt;BIOS Flash M25P64 @ 0xfed01000, 16384KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt;Number of accelerators: 1&lt;/P&gt;&lt;P&gt;1: Ext: GigabitEthernet1/1 : address is 00a2.ee92.e795, irq 255&lt;BR /&gt;2: Ext: GigabitEthernet1/2 : address is 00a2.ee92.e796, irq 255&lt;BR /&gt;3: Ext: GigabitEthernet1/3 : address is 00a2.ee92.e797, irq 255&lt;BR /&gt;4: Ext: GigabitEthernet1/4 : address is 00a2.ee92.e798, irq 255&lt;BR /&gt;5: Ext: GigabitEthernet1/5 : address is 00a2.ee92.e799, irq 255&lt;BR /&gt;6: Ext: GigabitEthernet1/6 : address is 00a2.ee92.e79a, irq 255&lt;BR /&gt;7: Ext: GigabitEthernet1/7 : address is 00a2.ee92.e79b, irq 255&lt;BR /&gt;8: Ext: GigabitEthernet1/8 : address is 00a2.ee92.e79c, irq 255&lt;BR /&gt;9: Int: Internal-Data1/1 : address is 00a2.ee92.e794, irq 255&lt;BR /&gt;10: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 0&lt;BR /&gt;11: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 0&lt;BR /&gt;12: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 0&lt;BR /&gt;13: Ext: Management1/1 : address is 00a2.ee92.e794, irq 0&lt;BR /&gt;14: Int: Internal-Data1/4 : address is 0000.0100.0001, irq 0&lt;BR /&gt;The Running Activation Key feature: 500 AnyConnect Premium sessions exceed the limit on the platform, reduced to 300 AnyConnect Premium sessions.&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 150 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 2 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 300 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 300 perpetual&lt;BR /&gt;Total VPN Peers : 300 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 1000 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;BR /&gt;Cluster Members : 2 perpetual&lt;BR /&gt;VPN Load Balancing : Enabled perpetual&lt;/P&gt;&lt;P&gt;Serial Number: JAD20xxxxxx&lt;BR /&gt;Running Permanent Activation Key: 0xxxxxx 0xxxxxx 0xxxxxx 0xxxxxx 0xxxxxx&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;FPGA UPGRADE Version : 3.0&lt;BR /&gt;FPGA GOLDEN Version : 3.0&lt;BR /&gt;ROMMON Version : 1.1.15&lt;BR /&gt;Image type : Release&lt;BR /&gt;Key Version : A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Sep 2020 08:36:40 GMT</pubDate>
    <dc:creator>eddie.schenk</dc:creator>
    <dc:date>2020-09-06T08:36:40Z</dc:date>
    <item>
      <title>ASDM was unable to load the firewall's configuration with Firepower Module running</title>
      <link>https://community.cisco.com/t5/network-security/asdm-was-unable-to-load-the-firewall-s-configuration-with/m-p/4146810#M1073617</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have been having issues getting ASDM to load with the configuration when the Firepower module is running, I have tried updated my Java to the latest, I am already running the latest ASA and ASDM versions on my 5516-X device (screen dump below) I have updated the FirePower to the version shown below but I can't find a later version to upgrade to, I have seem some discussion on 6.x but I can't find anthing later. I have trawled this site looking for a nugget that may help and all have failed so far. If I use the ASDM before the sfr module starts then I can load it ok, once the sfr module is running it always fails to get the FW config, I have even tried running it under Windows 7 with the same results. This really looks like a bug but one I can't find a fix for, is this certificate related (I am used the self signed ones but I have added it to my trusted cert store on Windows 10) or something more spurious?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mod Card Type Model Serial No.&lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt;1 ASA 5516-X with FirePOWER services, 8GE, AC, ASA5516 JAD20xxxxxx&lt;BR /&gt;sfr FirePOWER Services Software Module ASA5516 JAD20xxxxxx&lt;/P&gt;&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;1 00a2.ee92.e794 to 00a2.ee92.e79c 1.1 1.1.15 9.12(4)2&lt;BR /&gt;sfr 00a2.ee92.e793 to 00a2.ee92.e793 N/A N/A 5.4.1-211&lt;/P&gt;&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;sfr ASA FirePOWER Up 5.4.1-211&lt;/P&gt;&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;1 Up Sys Not Applicable&lt;BR /&gt;sfr Up Up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.12(4)2&lt;BR /&gt;SSP Operating System Version 2.6(1.198)&lt;BR /&gt;Device Manager Version 7.14(1)&lt;/P&gt;&lt;P&gt;Compiled on Tue 14-Jul-20 23:25 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa9-12-4-2-lfbff-k8.SPA"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;HSP1 up 7 mins 24 secs&lt;/P&gt;&lt;P&gt;Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;Internal ATA Compact Flash, 8000MB&lt;BR /&gt;BIOS Flash M25P64 @ 0xfed01000, 16384KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt;Number of accelerators: 1&lt;/P&gt;&lt;P&gt;1: Ext: GigabitEthernet1/1 : address is 00a2.ee92.e795, irq 255&lt;BR /&gt;2: Ext: GigabitEthernet1/2 : address is 00a2.ee92.e796, irq 255&lt;BR /&gt;3: Ext: GigabitEthernet1/3 : address is 00a2.ee92.e797, irq 255&lt;BR /&gt;4: Ext: GigabitEthernet1/4 : address is 00a2.ee92.e798, irq 255&lt;BR /&gt;5: Ext: GigabitEthernet1/5 : address is 00a2.ee92.e799, irq 255&lt;BR /&gt;6: Ext: GigabitEthernet1/6 : address is 00a2.ee92.e79a, irq 255&lt;BR /&gt;7: Ext: GigabitEthernet1/7 : address is 00a2.ee92.e79b, irq 255&lt;BR /&gt;8: Ext: GigabitEthernet1/8 : address is 00a2.ee92.e79c, irq 255&lt;BR /&gt;9: Int: Internal-Data1/1 : address is 00a2.ee92.e794, irq 255&lt;BR /&gt;10: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 0&lt;BR /&gt;11: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 0&lt;BR /&gt;12: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 0&lt;BR /&gt;13: Ext: Management1/1 : address is 00a2.ee92.e794, irq 0&lt;BR /&gt;14: Int: Internal-Data1/4 : address is 0000.0100.0001, irq 0&lt;BR /&gt;The Running Activation Key feature: 500 AnyConnect Premium sessions exceed the limit on the platform, reduced to 300 AnyConnect Premium sessions.&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 150 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 2 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 300 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 300 perpetual&lt;BR /&gt;Total VPN Peers : 300 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 1000 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;BR /&gt;Cluster Members : 2 perpetual&lt;BR /&gt;VPN Load Balancing : Enabled perpetual&lt;/P&gt;&lt;P&gt;Serial Number: JAD20xxxxxx&lt;BR /&gt;Running Permanent Activation Key: 0xxxxxx 0xxxxxx 0xxxxxx 0xxxxxx 0xxxxxx&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;FPGA UPGRADE Version : 3.0&lt;BR /&gt;FPGA GOLDEN Version : 3.0&lt;BR /&gt;ROMMON Version : 1.1.15&lt;BR /&gt;Image type : Release&lt;BR /&gt;Key Version : A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 08:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-was-unable-to-load-the-firewall-s-configuration-with/m-p/4146810#M1073617</guid>
      <dc:creator>eddie.schenk</dc:creator>
      <dc:date>2020-09-06T08:36:40Z</dc:date>
    </item>
  </channel>
</rss>

