<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5510 cannot access management interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408926#M306791</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't believe that I cannot have a PC on the INSIDE interface access the MANAGEMENT interface through Asdm.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have the same interface command on for same security levels. I will try adding a route again.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Dec 2013 12:40:24 GMT</pubDate>
    <dc:creator>hmongstrong</dc:creator>
    <dc:date>2013-12-24T12:40:24Z</dc:date>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408919#M306784</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;&lt;STRONG&gt;It should be simple, but I cannot get it.&amp;nbsp; I want a device on 10.50.3.0 to access ASA management interface at 10.50.0.1.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ___ encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.10.10.70 S2_server description S2 web server&lt;BR /&gt;name 8.8.8.8 GOOGLE_DNS description Google's DNS server&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address ___&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.5&lt;BR /&gt;vlan 5&lt;BR /&gt;nameif DOMAIN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.99&lt;BR /&gt;vlan 99&lt;BR /&gt;nameif HP_MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.6.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.100&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif WIRED&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.101&lt;BR /&gt;vlan 101&lt;BR /&gt;nameif WIRELESS&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.3.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2.1&lt;BR /&gt;vlan 1&lt;BR /&gt;nameif S2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;nameif temp&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;passwd ___ encrypted&lt;BR /&gt;boot system disk0:/asa802-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail warnings&lt;BR /&gt;logging class auth mail debugging &lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu temp 1500&lt;BR /&gt;mtu S2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu WIRELESS 1500&lt;BR /&gt;mtu DOMAIN 1500&lt;BR /&gt;mtu WIRED 1500&lt;BR /&gt;mtu HP_MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;icmp permit any S2&lt;BR /&gt;icmp permit any WIRELESS&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (temp) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (S2) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;nat (WIRELESS) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DOMAIN) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (WIRED) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DOMAIN,WIRELESS) 10.50.5.0 10.50.5.0 netmask 255.255.255.0 &lt;BR /&gt;static (WIRELESS,S2) 10.50.3.0 10.50.3.0 netmask 255.255.255.0 &lt;BR /&gt;static (DOMAIN,S2) 10.50.5.0 10.50.5.0 netmask 255.255.255.0 &lt;BR /&gt;static (HP_MGMT,WIRELESS) 10.50.6.0 10.50.6.0 netmask 255.255.255.0 &lt;BR /&gt;static (S2,WIRELESS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (S2,DOMAIN) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (WIRED,WIRELESS) 10.50.2.0 10.50.2.0 netmask 255.255.255.0 &lt;BR /&gt;static (WIRELESS,DOMAIN) 10.50.3.0 10.50.3.0 netmask 255.255.255.0 &lt;BR /&gt;static (WIRELESS,HP_MGMT) 10.50.3.0 10.50.3.0 netmask 255.255.255.0 &lt;BR /&gt;static (WIRELESS,WIRED) 10.50.3.0 10.50.3.0 netmask 255.255.255.0 &lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ___&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.50.3.0 255.255.255.0 WIRELESS&lt;BR /&gt;http 10.50.0.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 management&lt;BR /&gt;telnet 10.50.3.0 255.255.255.0 WIRELESS&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 10&lt;BR /&gt;management-access temp&lt;BR /&gt;dhcpd dns 10.50.5.3 12.127.17.71&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.1.50-10.50.1.254 temp&lt;BR /&gt;dhcpd enable temp&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.2.50-10.10.2.254 S2&lt;BR /&gt;dhcpd enable S2&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.0.2-10.50.0.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.3.50-10.50.3.254 WIRELESS&lt;BR /&gt;dhcpd enable WIRELESS&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.5.50-10.50.5.254 DOMAIN&lt;BR /&gt;dhcpd enable DOMAIN&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.2.50-10.50.2.254 WIRED&lt;BR /&gt;dhcpd enable WIRED&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;username admin password ___ encrypted privilege 15&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:___&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408919#M306784</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2019-03-12T03:21:11Z</dc:date>
    </item>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408920#M306785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Bee,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you say it should be hehe but there is something you are missing here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On any ASA platform traffic to any distant or far end interface will be denied or not allowed no matter what (This as a security model desing).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is a far end interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you sit on a PC on the inside interface.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You will be able to contact the inside interface IP add of the ASA &lt;/LI&gt;&lt;LI&gt;You will be able to contact hosts on other interfaces (if the policy allows it)&lt;/LI&gt;&lt;LI&gt;You will NOT be able to contact any other interface of the ASA but the directly connected to you.&lt;/LI&gt;&lt;LI&gt;So no access to outside interface IP, Management or any other.&lt;/LI&gt;&lt;LI&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 19:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408920#M306785</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-23T19:15:44Z</dc:date>
    </item>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408921#M306786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Okay, so what are my options in accessing the management interface without actually being plugged into it directly - as I do now and it's annoying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 19:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408921#M306786</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2013-12-23T19:25:11Z</dc:date>
    </item>
    <item>
      <title>Re:5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408922#M306787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) rate all of my helpful posts (that's basically a thanks. Remember I am doing this for free)&lt;BR /&gt;2) access the asa asdm or the asa via ssh/telnet from using the inside ip address (if being on an inside host)&lt;BR /&gt;&lt;BR /&gt;Bottom line acces the ads via the ip address u are directly connected to&lt;BR /&gt;That's the only way&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 19:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408922#M306787</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-23T19:30:01Z</dc:date>
    </item>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408923#M306788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since your PC is not on the same subnet as the ASA's management interface, you need a route in the ASA telling it how to get to your PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route management 10.50.3.0 255.255.255.0 10.50.0.x [your default gateway for that network]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem as Julio stated is that when someone in the 10.50.3.0 network goes out to the internet, the return traffic will be via the management interface because of the routing table. This will allow you to manage the ASA, but access &lt;EM&gt;through &lt;/EM&gt;the ASA (ie internet traffic) will be blocked. The workaround is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Put the management interface of the ASA in the 10.50.3.0 network&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;2) Enable the management protocols (ASDM/SSH) on the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Dec 2013 20:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408923#M306788</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2013-12-23T20:44:43Z</dc:date>
    </item>
    <item>
      <title>Re:5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408924#M306789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;BR /&gt;You are using security level 100 on more then 1 interface so u need run&lt;BR /&gt;#same-security-traffic permit inter-interface&lt;BR /&gt;This command use to enable traffic between same security level interface.&lt;BR /&gt;Both are in different network so make routing between both network.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 06:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408924#M306789</guid>
      <dc:creator>LALIT MEHTA</dc:creator>
      <dc:date>2013-12-24T06:01:42Z</dc:date>
    </item>
    <item>
      <title>Re:5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408925#M306790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello people,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are not following the right direction or maybe the customer did not explain the issue well but here is what he is saying:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 19px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;It should be simple, but I cannot get it.&amp;nbsp; I want a device on 10.50.3.0 to access ASA management interface at 10.50.0.1.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So no matter what you do, what you configure, You cannot access a far-end interface as I already stated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 06:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408925#M306790</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-24T06:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408926#M306791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't believe that I cannot have a PC on the INSIDE interface access the MANAGEMENT interface through Asdm.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have the same interface command on for same security levels. I will try adding a route again.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 12:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408926#M306791</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2013-12-24T12:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408927#M306792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my config already has this, so it should work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http server enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http 10.50.3.0 255.255.255.0 WIRELESS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http 10.50.0.0 255.255.255.0 management&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;telnet 0.0.0.0 0.0.0.0 management&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;telnet 10.50.3.0 255.255.255.0 WIRELESS&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried adding a route but it already said route exists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot telnet to 10.50.0.1 from 10.50.3.0 subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 13:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408927#M306792</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2013-12-24T13:06:29Z</dc:date>
    </item>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408928#M306793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the 10.50.3.0 you should telnet to the ASA interface IP address on the 10.50.0.0/24 subnet bud.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 17:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408928#M306793</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-24T17:13:43Z</dc:date>
    </item>
    <item>
      <title>5510 cannot access management interface</title>
      <link>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408929#M306794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Bee,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's just how it works sr.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Dec 2013 17:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-cannot-access-management-interface/m-p/2408929#M306794</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-12-24T17:14:05Z</dc:date>
    </item>
  </channel>
</rss>

