<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5506 - Another ASDM stuck at 17% or Unable to load the firewall's config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/2953637#M148771</link>
    <description>&lt;P&gt;New ASA 5506 trying to get the default config up and running. When using Window 10 box I get ASDM was unable to load the firewall's config... When using Window's 7 ASDM gets stuck at 17%. Modem connected to Gig1/1, Gig1/2 connected to switch, GE MGMT connected to switch, PC's connected to switch. I can ping and ssh into 192.168.1.254. When I logged into the SFR, I never got the EULA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Card Type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FirePOWER Services Software Module&lt;BR /&gt;Model:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5506W&lt;BR /&gt;Hardware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Serial Number:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *******&lt;BR /&gt;Firmware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Software version:&amp;nbsp;&amp;nbsp; 5.4.1-211&lt;BR /&gt;MAC Address Range:&amp;nbsp; 00f2.8b8e.68ae to 00f2.8b8e.68ae&lt;BR /&gt;App. name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA FirePOWER&lt;BR /&gt;App. Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;App. Status Desc:&amp;nbsp;&amp;nbsp; Normal Operation&lt;BR /&gt;App. version:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5.4.1-211&lt;BR /&gt;Data Plane Status:&amp;nbsp; Up&lt;BR /&gt;Console session:&amp;nbsp;&amp;nbsp;&amp;nbsp; Ready&lt;BR /&gt;Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;DC addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No DC Configured&lt;BR /&gt;Mgmt IP addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.254&lt;BR /&gt;Mgmt Network mask:&amp;nbsp; 255.255.255.0&lt;BR /&gt;Mgmt Gateway:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1&lt;BR /&gt;Mgmt web ports:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&lt;BR /&gt;Mgmt TLS enabled:&amp;nbsp;&amp;nbsp; true&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;login as: admin&lt;/P&gt;
&lt;P&gt;Using keyboard-interactive authentication.&lt;BR /&gt;Password:&lt;BR /&gt;Last login: Sat Nov&amp;nbsp; 5 07:23:19 2016&lt;/P&gt;
&lt;P&gt;Copyright 2004-2015, Cisco and/or its affiliates. All rights reserved.&lt;BR /&gt;Cisco is a registered trademark of Cisco Systems, Inc.&lt;BR /&gt;All other trademarks are property of their respective owners.&lt;/P&gt;
&lt;P&gt;Cisco Linux OS v5.4.1 (build 12)&lt;BR /&gt;Cisco ASA5506W v5.4.1 (build 211)&lt;/P&gt;
&lt;P&gt;&amp;gt; (There was nothing to accept)??????&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa# show run&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: ********&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506W, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/9&lt;BR /&gt;&amp;nbsp;nameif wifi&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu wifi 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 wifi&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.2-192.168.10.254 wifi&lt;BR /&gt;dhcpd enable wifi&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:b250f2ea25211c9a706460026c6de9f9&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:29:42 GMT</pubDate>
    <dc:creator>fvandellen</dc:creator>
    <dc:date>2019-03-12T08:29:42Z</dc:date>
    <item>
      <title>ASA 5506 - Another ASDM stuck at 17% or Unable to load the firewall's config</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/2953637#M148771</link>
      <description>&lt;P&gt;New ASA 5506 trying to get the default config up and running. When using Window 10 box I get ASDM was unable to load the firewall's config... When using Window's 7 ASDM gets stuck at 17%. Modem connected to Gig1/1, Gig1/2 connected to switch, GE MGMT connected to switch, PC's connected to switch. I can ping and ssh into 192.168.1.254. When I logged into the SFR, I never got the EULA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Card Type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FirePOWER Services Software Module&lt;BR /&gt;Model:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA5506W&lt;BR /&gt;Hardware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Serial Number:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *******&lt;BR /&gt;Firmware version:&amp;nbsp;&amp;nbsp; N/A&lt;BR /&gt;Software version:&amp;nbsp;&amp;nbsp; 5.4.1-211&lt;BR /&gt;MAC Address Range:&amp;nbsp; 00f2.8b8e.68ae to 00f2.8b8e.68ae&lt;BR /&gt;App. name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA FirePOWER&lt;BR /&gt;App. Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;App. Status Desc:&amp;nbsp;&amp;nbsp; Normal Operation&lt;BR /&gt;App. version:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5.4.1-211&lt;BR /&gt;Data Plane Status:&amp;nbsp; Up&lt;BR /&gt;Console session:&amp;nbsp;&amp;nbsp;&amp;nbsp; Ready&lt;BR /&gt;Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;BR /&gt;DC addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No DC Configured&lt;BR /&gt;Mgmt IP addr:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.254&lt;BR /&gt;Mgmt Network mask:&amp;nbsp; 255.255.255.0&lt;BR /&gt;Mgmt Gateway:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1&lt;BR /&gt;Mgmt web ports:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&lt;BR /&gt;Mgmt TLS enabled:&amp;nbsp;&amp;nbsp; true&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;login as: admin&lt;/P&gt;
&lt;P&gt;Using keyboard-interactive authentication.&lt;BR /&gt;Password:&lt;BR /&gt;Last login: Sat Nov&amp;nbsp; 5 07:23:19 2016&lt;/P&gt;
&lt;P&gt;Copyright 2004-2015, Cisco and/or its affiliates. All rights reserved.&lt;BR /&gt;Cisco is a registered trademark of Cisco Systems, Inc.&lt;BR /&gt;All other trademarks are property of their respective owners.&lt;/P&gt;
&lt;P&gt;Cisco Linux OS v5.4.1 (build 12)&lt;BR /&gt;Cisco ASA5506W v5.4.1 (build 211)&lt;/P&gt;
&lt;P&gt;&amp;gt; (There was nothing to accept)??????&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa# show run&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: ********&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506W, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/9&lt;BR /&gt;&amp;nbsp;nameif wifi&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu wifi 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 wifi&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.2-192.168.10.254 wifi&lt;BR /&gt;dhcpd enable wifi&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:b250f2ea25211c9a706460026c6de9f9&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/2953637#M148771</guid>
      <dc:creator>fvandellen</dc:creator>
      <dc:date>2019-03-12T08:29:42Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/2953638#M148772</link>
      <description>&lt;H5&gt;Hello,&lt;/H5&gt;
&lt;H5&gt;This is likely related to defect &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuw54048/?referring_site=bugquickviewredir"&gt;CSCuw54048&lt;/A&gt;&lt;/H5&gt;
&lt;H5&gt;You can either access the ASDM from a host running windows 7 and upgrade the module to version 6.1.0 or downgrade to Java 8u51 or prior on your Windows 10 host.&lt;/H5&gt;
&lt;H5&gt;HTH&lt;/H5&gt;
&lt;H5&gt;Pablo&lt;/H5&gt;</description>
      <pubDate>Sun, 06 Nov 2016 22:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/2953638#M148772</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2016-11-06T22:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 - Another ASDM stuck at 17% or Unable to load the firewall's config</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/3792593#M148773</link>
      <description>&lt;P&gt;Was there a solution to this issue as I am experiencing the same symptoms on a 5516-X&lt;/P&gt;
&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.10(1) &lt;BR /&gt;Firepower Extensible Operating System Version 2.4(1.103)&lt;BR /&gt;Device Manager Version 7.10(1)&lt;/P&gt;
&lt;P&gt;Tried downgrading to 8u51 but still the same on a debug last entry states HTTP: file not found: flash:/dap.xml&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug http enabled at level 1.&lt;BR /&gt;fw01# HTTP: processing ASDM request [/admin/login_banner] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [-1][0]&lt;BR /&gt;HTTP: client certificate required = 0&lt;BR /&gt;HTTP: processing ASDM request [/admin/version.prop] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [-1][0]&lt;BR /&gt;HTTP: client certificate required = 0&lt;BR /&gt;ewaURLHookVCARedirect&lt;BR /&gt;ewaURLHookHTTPRedirect: url = /+webvpn+/index.html&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;webvpnhook: got '/+webvpn+' or '/+webvpn+/': Sending back "/+webvpn+/index.html"&lt;BR /&gt;ewaURLHookVCARedirect&lt;BR /&gt;ewaURLHookHTTPRedirect: url = /+webvpn+/index.html&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;webvpnhook: got '/+webvpn+' or '/+webvpn+/': Sending back "/+webvpn+/index.html"&lt;BR /&gt;ewaURLHookVCARedirect&lt;BR /&gt;ewaURLHookHTTPRedirect: url = /+webvpn+/index.html&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;webvpnhook: got '/+webvpn+' or '/+webvpn+/': Sending back "/+webvpn+/index.html"&lt;BR /&gt;ewaURLHookVCARedirect&lt;BR /&gt;ewaURLHookHTTPRedirect: url = /+webvpn+/index.html&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;webvpnhook: got '/+webvpn+' or '/+webvpn+/': Sending back "/+webvpn+/index.html"&lt;BR /&gt;HTTP: net_handle-&amp;gt;standalone_client [1]&lt;BR /&gt;HTTP: start admin session&lt;BR /&gt;HTTP: Standalone authentication OK&lt;BR /&gt;HTTP: Idle timeout: 20&lt;BR /&gt;HTTP: Session timeout: 0&lt;BR /&gt;HTTP: Authentication server group: CP-ISE&lt;BR /&gt;HTTP: authorization server CP-ISE&lt;BR /&gt;HTTP: service-type attribute: 2&lt;BR /&gt;HTTP: privilege attribute: 15&lt;BR /&gt;HTTP: session 5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB&lt;BR /&gt;HTTP: create new admin session A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB&lt;BR /&gt;HTTP: processing ASDM request [/admin/version.prop] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/version.prop' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: sending file: version.prop, length: 109, response header options 0000001e&lt;BR /&gt;HTTP: processing ASDM request [/admin/pdm.sgz] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/pdm.sgz' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: sending file: pdm.sgz, length: 32020290, response header options 0000001e&lt;BR /&gt;HTTP: processing ASDM request [/admin/asdm_banner] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/asdm_banner' from host 192.168.10.2&lt;BR /&gt;HTTP: authentication not required&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+version/show+curpriv/perfmon+interval+10/show+asdm+sessions/show+firewall/show+mode/changeto+system/show+admin-context] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+version/show+curpriv/perfmon+interval+10/show+asdm+sessions/show+firewall/show+mode/changeto+system/show+admin-context' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+module] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+module' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+cluster+interface-mode] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+cluster+interface-mode' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+cluster+info] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+cluster+info' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+run+cluster+%7C+grep+vpn-mode] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+run+cluster+%7C+grep+vpn-mode' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/session+sfr+do+get-eula-status] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/session+sfr+do+get-eula-status' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+module+sfr+details] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+module+sfr+details' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/session+sfr+do+get-onbox-status] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/session+sfr+do+get-onbox-status' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/session+sfr+do+gen-sso-token] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/session+sfr+do+gen-sso-token' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+version] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+version' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+curpriv] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+curpriv' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+vpn-sessiondb+license-summary] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+vpn-sessiondb+license-summary' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+run+aaa+authorization] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+run+aaa+authorization' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/show+running-config+%7C+grep+%5E%28logging+enable%7Clogging+asdm%7Chostname%7Cdomain-name%29/show+running-config++%7C+grep+%5Ename+/show+running-config+route/show+running-config+interface/show+running-config+track/show+running-config+sla+monitor/show+running-config+threat-detection/show+running-config+dynamic-filter/show+running-config+hpm] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/show+running-config+%7C+grep+%5E%28logging+enable%7Clogging+asdm%7Chostname%7Cdomain-name%29/show+running-config++%7C+grep+%5Ename+/show+running-config+route/show+running-config+interface/show+running-config+track/show+running-config+sla+monitor/show+running-config+threat-detection/show+running-config+dynamic-filter/show+running-config+hpm' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/dir+flash%3A%2Fdap.xml] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/dir+flash%3A%2Fdap.xml' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/exec/export+dap+configuration+stdout] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/exec/export+dap+configuration+stdout' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: processing ASDM request [/admin/flash/dap.xml] with cookie-based authentication (aware_webvpn_conf.re2c:450)&lt;BR /&gt;HTTP: check admin session. Cookie index [2][97ae0160]&lt;BR /&gt;HTTP: Admin session cookie [A5A02DD@20480@444E@315E69A58F891A194BD86259AE39A4344DE0B0BB]&lt;BR /&gt;HTTP: Admin session idle-timeout reset&lt;BR /&gt;HTTP: admin session verified =&amp;nbsp; [1]&lt;BR /&gt;HTTP: username = [carlos.fandango], privilege = [15]&lt;BR /&gt;HTTP: processing GET URL '/admin/flash/dap.xml' from host 192.168.10.2&lt;BR /&gt;HTTP: user already authenticated, bypass authentication&lt;BR /&gt;HTTP: file not found: flash:/dap.xml&lt;/P&gt;
&lt;P&gt;fw01#&lt;/P&gt;
&lt;P&gt;ASDM Java Console&lt;BR /&gt;-----------------&lt;/P&gt;
&lt;P&gt;Using JRE version 1.8.0_51 Java HotSpot(TM) Client VM&lt;BR /&gt;User home directory = C:\Users\CFandango&lt;BR /&gt;----------------------------------------------------&lt;BR /&gt;c:&amp;nbsp;&amp;nbsp; clear console window&lt;BR /&gt;f:&amp;nbsp;&amp;nbsp; finalize objects on finalization queue&lt;BR /&gt;g:&amp;nbsp;&amp;nbsp; garbage collect&lt;BR /&gt;h:&amp;nbsp;&amp;nbsp; display this help message&lt;BR /&gt;m:&amp;nbsp;&amp;nbsp; print memory usage&lt;BR /&gt;q:&amp;nbsp;&amp;nbsp; hide console&lt;BR /&gt;s:&amp;nbsp;&amp;nbsp; dump system properties&lt;BR /&gt;----------------------------------------------------&lt;BR /&gt;Application Logging Started at Thu Jan 31 23:21:58 GMT 2019&lt;BR /&gt;---------------------------------------------&lt;BR /&gt;Local Launcher Version = 1.8.0&lt;BR /&gt;Local Launcher Version Display = 1.8(0)&lt;BR /&gt;OK button clicked&lt;BR /&gt;Trying for ASDM Version file; url = &lt;A href="https://x.x.x.x:4434/admin/" target="_blank"&gt;https://x.x.x.x:4434/admin/&lt;/A&gt;&lt;BR /&gt;Server Version = 7.10(1)&lt;BR /&gt;Server Launcher Version = 1.8.0, size = 774656 bytes&lt;BR /&gt;Launcher version checking is successful.&lt;BR /&gt;invoking SGZ Loader..&lt;BR /&gt;Cache location = C:/Users/CFandango/.asdm/cache&lt;BR /&gt;2019-01-31 23:22:13,562 [ERROR] CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing:&lt;BR /&gt;0 [SGZ Loader: launchSgzApplet] ERROR com.cisco.pdm.headless.startup&amp;nbsp; - CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing:&lt;BR /&gt;CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing:&lt;BR /&gt;2019-01-31 23:22:14,063 [ERROR] CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing messenger: cl7@e021a4&lt;BR /&gt;501 [SGZ Loader: launchSgzApplet] ERROR com.cisco.pdm.headless.startup&amp;nbsp; - CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing messenger: cl7@e021a4&lt;BR /&gt;CLI-PASSTHROUGH-DEBUG Inside doInitialProcessing messenger: cl7@e021a4&lt;BR /&gt;com.jidesoft.plaf.LookAndFeelFactory not loaded.&lt;BR /&gt;Jan 31, 2019 11:22:33 PM ah a&lt;BR /&gt;INFO: Same version found on client. Continuing without downloading&lt;BR /&gt;IO Exception occurs while reading the dap file. java.io.FileNotFoundException: &lt;A href="https://x.x.x.x:4434/admin/flash/dap.xml" target="_blank"&gt;https://x.x.x.x:4434/admin/flash/dap.xml&lt;/A&gt;&lt;BR /&gt;java.lang.NullPointerException&lt;BR /&gt;&amp;nbsp;at c8r.&amp;lt;init&amp;gt;(c8r.java:31)&lt;BR /&gt;&amp;nbsp;at c8w.a(c8w.java:49)&lt;BR /&gt;&amp;nbsp;at drl.a(drl.java:147)&lt;BR /&gt;&amp;nbsp;at drz.c(drz.java:1174)&lt;BR /&gt;&amp;nbsp;at drw.a(drw.java:120)&lt;BR /&gt;&amp;nbsp;at drw.a(drw.java:81)&lt;BR /&gt;&amp;nbsp;at dry.a(dry.java:55)&lt;BR /&gt;&amp;nbsp;at dlj.a(dlj.java:1587)&lt;BR /&gt;&amp;nbsp;at brd.a(brd.java:768)&lt;BR /&gt;&amp;nbsp;at brd.run(brd.java:195)&lt;BR /&gt;Jan 31, 2019 11:23:03 PM ah a&lt;BR /&gt;INFO: isJXBrowserInstanceAlive (): JXBrowser crashed: null&lt;BR /&gt;Jan 31, 2019 11:23:03 PM ah$2 run&lt;BR /&gt;INFO: checkForDispose(): Creating new JXBrowser! &lt;BR /&gt;Checking JxBrowser license jar:file:/C:/Users/CFandango/.asdm/jxbrowser/runtime.jar!/META-INF/teamdev.licenses:&lt;BR /&gt;-- Product name: JxBrowser&lt;BR /&gt;-- Licensed version: 4.x&lt;BR /&gt;-- Licensed to: &lt;BR /&gt;-- License type: Runtime&lt;BR /&gt;-- Generation date: 06-Mar-2014&lt;BR /&gt;-- Expiration date: NEVER&lt;BR /&gt;-- License info: Not for development&lt;BR /&gt;-- Current date: 31-Jan-2019&lt;BR /&gt;JxBrowser license valid.&lt;BR /&gt;11:23:03 INFO: OS name: Windows 7&lt;BR /&gt;11:23:03 INFO: JRE version: 1.8 32-bit&lt;BR /&gt;11:23:03 INFO: JxBrowser version: 4.9.5&lt;BR /&gt;11:23:03 INFO: Starting IPC...&lt;BR /&gt;11:23:03 INFO: Starting IPC Server...&lt;BR /&gt;11:23:03 INFO: Starting IPC Process...&lt;BR /&gt;11:23:03 INFO: Start Chromium process...&lt;BR /&gt;11:23:03 INFO: Command line: C:\Users\CFandango\AppData\Local\Temp\jxbrowser-chromium-39.0.2171.52.4.9.5\jxbrowser-chromium.exe 1101 20072 --remote-debugging-port=9222 --ignore-certificate-errors &lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnHelloMessage{type=OnHelloMessage, uid=1, message='cid:0,type:Main'}, null&lt;BR /&gt;11:23:03 INFO: Channel is accepted: SocketChannel{cid=0, bid=-1, type=Main}&lt;BR /&gt;11:23:03 INFO: IPC is started.&lt;BR /&gt;11:23:03 INFO: WRITE: CreateBrowserMessage{type=CreateBrowser, uid=0, channelId=0, contextId=-1, cacheDir='C:\Users\CFandango\AppData\Local\Temp\jxbrowser-chromium-39.0.2171.52.4.9.5\data\Cache', memoryDir='', dataDir='C:\Users\CFandango\AppData\Local\Temp\jxbrowser-chromium-39.0.2171.52.4.9.5\data', currentLocale='en-gb', proxyType=-1, proxyRules='null', proxyBypassRules='null', proxyAutoConfigURL='null'}, SocketInfo{channelId=0, browserId=-1, channelType=Main}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnHelloMessage{type=OnHelloMessage, uid=2, message='cid:0,bid:0,type:Browser'}, null&lt;BR /&gt;11:23:03 INFO: Channel is accepted: SocketChannel{cid=0, bid=0, type=Browser}&lt;BR /&gt;11:23:03 INFO: Channel is connected: SocketChannel{cid=0, bid=0, type=Browser}&lt;BR /&gt;11:23:03 INFO: WRITE: SetNetworkDelegateConfigMessage{type=SetNetworkDelegateConfig, uid=1, browserContextId=-1, onBeforeURLRequestDisabled=true, onBeforeSendHeadersDisabled=true, onSendHeadersDisabled=true, onHeadersReceivedDisabled=true, onBeforeRedirectDisabled=true, onResponseStartedDisabled=true, onCompletedDisabled=true, onPACScriptErrorDisabled=false, onAuthRequiredDisabled=false}, SocketInfo{channelId=0, browserId=-1, channelType=Main}&lt;BR /&gt;11:23:03 INFO: WRITE: LoadURLMessage{type=LoadURL, uid=2, url='about:blank', frameId=-1, extraHeaders='null', postData=null}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; com.teamdev.jxbrowser.chromium.internal.ipc.message.OnRenderViewCreatedMessage@1fbf578, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnHelloMessage{type=OnHelloMessage, uid=1, message='cid:0,bid:0,type:Render'}, null&lt;BR /&gt;11:23:03 INFO: Channel is accepted: SocketChannel{cid=0, bid=0, type=Render}&lt;BR /&gt;11:23:03 INFO: Channel is connected: SocketChannel{cid=0, bid=0, type=Render}&lt;BR /&gt;11:23:03 INFO: RenderProcess has been created for channel: SocketChannel{cid=0, bid=0, type=Render}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnHandleLoadMessage{type=OnHandleLoadMessage, uid=2, url='about:blank', loadType=5, loadPpolicy=2, isBackForward=false, isRedirect=false, cancel=false}, SocketInfo{channelId=0, browserId=0, channelType=Render}&lt;BR /&gt;11:23:03 INFO: WRITE: OnHandleLoadMessage{type=OnHandleLoadMessage, uid=2, url='about:blank', loadType=5, loadPpolicy=2, isBackForward=false, isRedirect=false, cancel=false}, SocketInfo{channelId=0, browserId=0, channelType=Render}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnDidStartProvisionalLoadForFrameMessage{type=OnDidStartProvisionalLoadForFrame, uid=4, frameId=1, parentFrameId=-1, isMainFrame=true, validatedURL='about:blank', isErrorPage=false}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnDidCommitProvisionalLoadForFrameMessage{type=OnDidCommitProvisionalLoadForFrame, uid=5, frameId=1, isMainFrame=true, transitionType=1, url='about:blank'}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnStatusChangeMessage{type=OnStatusChangeMessage, uid=6, url=''}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnDocumentLoadedInFrameMessage{type=OnDocumentLoadedInFrame, uid=7, frameId=1}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: READ:&amp;nbsp; OnDidFinishLoadMessage{type=OnDidFinishLoad, uid=8, frameId=1, isMainFrame=true, validatedURL='about:blank'}, SocketInfo{channelId=0, browserId=0, channelType=Browser}&lt;BR /&gt;11:23:03 INFO: WRITE: SetNetworkDelegateConfigMessage{type=SetNetworkDelegateConfig, uid=3, browserContextId=-1, onBeforeURLRequestDisabled=false, onBeforeSendHeadersDisabled=false, onSendHeadersDisabled=false, onHeadersReceivedDisabled=false, onBeforeRedirectDisabled=false, onResponseStartedDisabled=false, onCompletedDisabled=false, onPACScriptErrorDisabled=false, onAuthRequiredDisabled=false}, SocketInfo{channelId=0, browserId=-1, channelType=Main}&lt;BR /&gt;Jan 31, 2019 11:23:03 PM ah a&lt;BR /&gt;INFO: Remote Debug Url:http://localhost:9222/devtools/devtools.html?ws=localhost:9222/devtools/page/815EF4B1-C0ED-4BD7-93BD-2C8EE7D87767&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 23:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/3792593#M148773</guid>
      <dc:creator>Steve Wood</dc:creator>
      <dc:date>2019-01-31T23:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hello,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/4039963#M1067282</link>
      <description>&lt;P&gt;I faced the same issue with an ASA-X and the following configuration :&lt;/P&gt;&lt;P&gt;- asdm 7.13.1&lt;/P&gt;&lt;P&gt;- asa 9-13.x&lt;/P&gt;&lt;P&gt;- firepower service 6.5.x&lt;/P&gt;&lt;P&gt;- Connecting from a host running Win10&lt;/P&gt;&lt;P&gt;After trial and error, I did what you recommend (downgrade the JRE to Java &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; and it works.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 08:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-another-asdm-stuck-at-17-or-unable-to-load-the-firewall/m-p/4039963#M1067282</guid>
      <dc:creator>mikael.dautrey</dc:creator>
      <dc:date>2020-03-04T08:28:40Z</dc:date>
    </item>
  </channel>
</rss>

