<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I had a weak encryption!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793344#M172921</link>
    <description>&lt;P&gt;I had a weak encryption!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ciscoasa# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ssl encryption des-sha1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Enter the command: &lt;STRONG&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/STRONG&gt; in config mode.&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That ASDM troubleshooting doc was really helpful, thank you!!!&lt;/P&gt;</description>
    <pubDate>Mon, 01 Feb 2016 13:21:04 GMT</pubDate>
    <dc:creator>PiEich</dc:creator>
    <dc:date>2016-02-01T13:21:04Z</dc:date>
    <item>
      <title>ASDM Failover wizard error "ASDM is temporarily unable to contact the firewall"</title>
      <link>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793342#M172917</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have an ASA5540 perfectly running on ASA 9.1(4) and want to set up HA with another 5540.&lt;/P&gt;
&lt;P&gt;When I use the ASDM High Availability and Scalability Wizard, I provide the new peer IP address and right away get this error: "ASDM is temporarily unable to contact the firewall".&lt;/P&gt;
&lt;P&gt;I tried to open ASDM from the same management PC where I access the ASDM on the current working ASA (let's call it FW1) and it does not work with none of the 3 browsers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Both FWs are directly connected on Gi0/3. I access the new box with the IP address 192.168.0.3, it is also pingable from FW1.&lt;/P&gt;
&lt;P&gt;Below, the configuration on the new box. Any clues?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa914-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm-buffer-size 300&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption des-sha1&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:455cc44cf01874284573ffa423037838&lt;BR /&gt;: end&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793342#M172917</guid>
      <dc:creator>PiEich</dc:creator>
      <dc:date>2019-03-12T07:13:10Z</dc:date>
    </item>
    <item>
      <title>As soon as you have the</title>
      <link>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793343#M172919</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As soon as you have the failover configuration on the primary unit and the failover configuration on the secondary unit and enable failover on both units they will detect each other and automatically the primary unit will sync the config to the secondary unit. Just make sure the failover interface is up.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also check do show run all ssl and check if you have aes-128 configured.You may refer this &lt;A href="https://supportforums.cisco.com/document/57701/asdm-access-troubleshooting#WebVPN_conflict"&gt;ASDM support document&lt;/A&gt;&amp;nbsp;for ASDM issues.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Syed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jan 2016 15:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793343#M172919</guid>
      <dc:creator>Syed Taukir</dc:creator>
      <dc:date>2016-01-30T15:29:04Z</dc:date>
    </item>
    <item>
      <title>I had a weak encryption!!</title>
      <link>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793344#M172921</link>
      <description>&lt;P&gt;I had a weak encryption!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ciscoasa# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ssl encryption des-sha1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Enter the command: &lt;STRONG&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/STRONG&gt; in config mode.&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That ASDM troubleshooting doc was really helpful, thank you!!!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 13:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-failover-wizard-error-quot-asdm-is-temporarily-unable-to/m-p/2793344#M172921</guid>
      <dc:creator>PiEich</dc:creator>
      <dc:date>2016-02-01T13:21:04Z</dc:date>
    </item>
  </channel>
</rss>

