<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access to my ASDM ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329590#M311593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Newer browsers do not allow you to connect to SSL servers running weak encyption algorithms (e.g. des). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last year Cisco started turning off the strong algorithms (aes and 3des) by default on ASAs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check using the command I suggested above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Oct 2013 21:29:49 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2013-10-04T21:29:49Z</dc:date>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329587#M311583</link>
      <description>&lt;P&gt;Hi I have been using a few days the firewall ASA5505 they've completely put new, the ASA Version 8.4 (2) have been playing and the ASDM version 6.4 (9). I have the Basic Config loaded with the command "conf t" and "Facorty default-config."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I want to connect to this firewall, but this is not because he always says he unable to connect to the firewall. The IP settings I have the following: IP address 192.168.1.6 Subnet: 255.255.255.0 Gateway: 192.168.1.1. How can I connect to or what I'm doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/0&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 2&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/1&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/2&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/3&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/4&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/5&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/6&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface Ethernet 0/7&lt;/P&gt;&lt;P&gt;Executing command: switchport access vlan 1&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface vlan2&lt;/P&gt;&lt;P&gt;Executing command: nameif outside&lt;/P&gt;&lt;P&gt;INFO: Security level for "outside" set to 0 by default.&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: ip address dhcp setroute&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: interface vlan1&lt;/P&gt;&lt;P&gt;Executing command: nameif inside&lt;/P&gt;&lt;P&gt;INFO: Security level for "inside" set to 100 by default.&lt;/P&gt;&lt;P&gt;Executing command: ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;Executing command: security-level 100&lt;/P&gt;&lt;P&gt;Executing command: allow-ssc-mgmt&lt;/P&gt;&lt;P&gt;ERROR: SSC card is not available&lt;/P&gt;&lt;P&gt;Executing command: no shutdown&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: object network obj_any&lt;/P&gt;&lt;P&gt;Executing command: subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;Executing command: nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;Executing command: exit&lt;/P&gt;&lt;P&gt;Executing command: http server enable&lt;/P&gt;&lt;P&gt;Executing command: http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;Executing command: dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/P&gt;&lt;P&gt;Executing command: dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;Executing command: dhcpd enable inside&lt;/P&gt;&lt;P&gt;Executing command: logging asdm informational&lt;/P&gt;&lt;P&gt;Factory-default configuration is completed&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&amp;nbsp; wr&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Cryptochecksum: ee2b2e47 c2886bf3 b45f3afb bccbfb1e&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329587#M311583</guid>
      <dc:creator>Brainority</dc:creator>
      <dc:date>2019-03-12T02:47:11Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329588#M311587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide output of "show ssl". You may need to add strong cipher support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-24550"&gt;Reference&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 14:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329588#M311587</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-10-04T14:55:07Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329589#M311591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I have the same issue with connecting to ASDM via Windows 8.&lt;/P&gt;&lt;P&gt;I have found that I can connect with Windows XP, but my new laptop is 8 Pro and this is the second new ASA I have installed recently that will not allow me to connect to the ASDM. This one is 6.4.5.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329589#M311591</guid>
      <dc:creator>cstarr</dc:creator>
      <dc:date>2013-10-04T21:25:04Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329590#M311593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Newer browsers do not allow you to connect to SSL servers running weak encyption algorithms (e.g. des). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last year Cisco started turning off the strong algorithms (aes and 3des) by default on ASAs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check using the command I suggested above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329590#M311593</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-10-04T21:29:49Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329591#M311595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When I run that I get the following.&lt;/P&gt;&lt;P&gt;ciscoasa# show ssl&lt;/P&gt;&lt;P&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Start connections using SSLv3 and negotiate to SSLv3 or TLSv1&lt;/P&gt;&lt;P&gt;Enabled cipher order: des-sha1&lt;/P&gt;&lt;P&gt;Disabled ciphers: 3des-sha1 rc4-md5 rc4-sha1 aes128-sha1 aes256-sha1 null-sha1&lt;/P&gt;&lt;P&gt;No SSL trust-points configured&lt;/P&gt;&lt;P&gt;Certificate authentication is not enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should I change?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329591#M311595</guid>
      <dc:creator>cstarr</dc:creator>
      <dc:date>2013-10-04T21:46:52Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329592#M311596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep - note the section that says the only enabled cipher is des-sha1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fix it by:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; padding: 0px 0px 0px 30px; overflow: auto;"&gt;conf t
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ssl encryption aes128-sha1 aes256-sha1 3des-sha1
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exit
wr mem

&lt;/PRE&gt;&lt;P&gt; Then re-check ASDM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329592#M311596</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-10-04T21:50:52Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329593#M311597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks. I found it and I am now downloading the free license to enable it as it baulked when I ran that command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:52:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329593#M311597</guid>
      <dc:creator>cstarr</dc:creator>
      <dc:date>2013-10-04T21:52:25Z</dc:date>
    </item>
    <item>
      <title>Access to my ASDM ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329594#M311598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah yes, as you note the (free) 3DES-AES license needs to be active to use strong encryption.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Oct 2013 21:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-my-asdm-asa5505/m-p/2329594#M311598</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-10-04T21:54:13Z</dc:date>
    </item>
  </channel>
</rss>

