<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Just checking to see if you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015916#M135506</link>
    <description>&lt;P&gt;Just checking to see if you have any further suggestions on this. Still can't quite figure out how to get access to that management interface. Thanks again for your suggestions.&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2017 15:38:45 GMT</pubDate>
    <dc:creator>alter-sol</dc:creator>
    <dc:date>2017-05-17T15:38:45Z</dc:date>
    <item>
      <title>Enable management port ASA 5525?</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015913#M135503</link>
      <description>&lt;P&gt;Sorry for such a rookie question. Kinda new at ASA's. I'm doing some basic configurations on an ASA that I'm getting remote access to. The ASA's management interface is connected to a 10.10.10.0/24 network and I'm coming in on a VPN connection with 10.10.20.0/24 address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've configured the interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.10&amp;nbsp; 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm confused on the routing piece to allow traffic from vpn subnet to the management interface. I'm sure it's something really simple.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015913#M135503</guid>
      <dc:creator>alter-sol</dc:creator>
      <dc:date>2019-03-12T09:22:33Z</dc:date>
    </item>
    <item>
      <title>http 10.10.20.0 255.255.255.0</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015914#M135504</link>
      <description>&lt;P&gt;http 10.10.20.0 255.255.255.0 management&lt;/P&gt;
&lt;P&gt;ssh 10.10.20.0 255.255.255.0 management&lt;/P&gt;
&lt;P&gt;telnet 10.10.20.0 255.255.255.0 management&lt;/P&gt;
&lt;P&gt;management-access management&lt;/P&gt;
&lt;P&gt;You also need to allow traffic in ACL that is used for VPN to define interested traffic on both end.&lt;/P&gt;
&lt;P&gt;Can you post the VPN config so that I can assist you to do changes in ACL.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 14:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015914#M135504</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-05-16T14:22:16Z</dc:date>
    </item>
    <item>
      <title>Thanks for the assistance!</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015915#M135505</link>
      <description>&lt;P&gt;Thanks for the assistance!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The vpn configuration is on another firewall giving me access to the 10.10.10.0 network. &amp;nbsp;When I do an ipconfig/all from laptop with the vpn running my vpn virtual adaptor gives me an address on the 10.10.20.0 network I'm assuming a route needs to be created for this to work.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 17:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015915#M135505</guid>
      <dc:creator>alter-sol</dc:creator>
      <dc:date>2017-05-16T17:20:39Z</dc:date>
    </item>
    <item>
      <title>Just checking to see if you</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015916#M135506</link>
      <description>&lt;P&gt;Just checking to see if you have any further suggestions on this. Still can't quite figure out how to get access to that management interface. Thanks again for your suggestions.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 15:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015916#M135506</guid>
      <dc:creator>alter-sol</dc:creator>
      <dc:date>2017-05-17T15:38:45Z</dc:date>
    </item>
    <item>
      <title>It is most likely lack of a</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015917#M135507</link>
      <description>&lt;P&gt;It is most likely lack of a route on the ASA whose management interface you are trying to access. In most versions of ASA software (anything prior to 9.6) there is only a single routing table. If you have devices trying to access the management interface from anywhere not directly connected, the ASA will use that global routing table to determine the correct egress interface. It does not allow traffic to ingress on management and egress via a different interface.&lt;/P&gt;
&lt;P&gt;Can you share the "show route" output from your ASA whose management interface you are trying to access?&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 02:30:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015917#M135507</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-18T02:30:34Z</dc:date>
    </item>
    <item>
      <title>Gateway of last resort is not</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015918#M135508</link>
      <description>&lt;DIV&gt;Gateway of last resort is not set&lt;/DIV&gt;
&lt;DIV&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; 10.10.10.0 255.255.255.0 is directly connected, management&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.10 255.255.255.255 is directly connected, management&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 May 2017 12:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015918#M135508</guid>
      <dc:creator>alter-sol</dc:creator>
      <dc:date>2017-05-18T12:21:22Z</dc:date>
    </item>
    <item>
      <title>The ASA would need a route to</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015919#M135509</link>
      <description>&lt;P&gt;The ASA would need a route to the 10.10.20.0 subnet where your VPN client's traffic originates from. If there's no other reason that ASA needs to reach that subnet it is fine to just add one thus:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;route management 10.10.20.0 255.255.255.0 &amp;lt;gateway address&amp;gt;&lt;/PRE&gt;
&lt;P&gt;If there are other reasons (besides management) why traffic through that ASA may need to reach that subnet then you need a more advanced solution that we can discuss if that is the case.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 15:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015919#M135509</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-18T15:26:03Z</dc:date>
    </item>
    <item>
      <title>I actually tried this already</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015920#M135510</link>
      <description>&lt;P&gt;I actually tried this already and it didn't work. I'm assuming what they are telling is the gateway of the non-production environment is incorrect because I never been able to web to the interface with that route in place.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 17:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015920#M135510</guid>
      <dc:creator>alter-sol</dc:creator>
      <dc:date>2017-05-18T17:26:02Z</dc:date>
    </item>
    <item>
      <title>If you cannot get the routing</title>
      <link>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015921#M135511</link>
      <description>&lt;P&gt;If you cannot get the routing for the managemnt interface fixed, you will either have to&lt;/P&gt;
&lt;P&gt;1. use another interface for management or&lt;/P&gt;
&lt;P&gt;2. run ASA 9.5(1) or later with the ability to use a separate management routing table. Reference:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-config/route-overview.html#reference_F02E984EE51F49F5B979DE3ED9239EEE&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 04:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-management-port-asa-5525/m-p/3015921#M135511</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-19T04:04:56Z</dc:date>
    </item>
  </channel>
</rss>

