<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot access ASDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576984#M610053</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying to my post.&amp;nbsp;&amp;nbsp; I tried the other recommendation but didn't work.&amp;nbsp; Here is the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point localtrust inside&lt;BR /&gt;ssl trust-point localtrust outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh run aaa&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Oct 2010 20:57:29 GMT</pubDate>
    <dc:creator>HMidkiff</dc:creator>
    <dc:date>2010-10-01T20:57:29Z</dc:date>
    <item>
      <title>Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576981#M610050</link>
      <description>&lt;P&gt;I have an ASA5505.&amp;nbsp; I was in on ASDM and working fine.&amp;nbsp; I added a new user and seem to locked myself out of ASDM.&amp;nbsp; Not with I try to access it I get&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Identification required. Please select certificate to be used for authentication"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The list of certificates is blank.&amp;nbsp; I tried to regenerate a key from the CLI but it was unsuccessful.&amp;nbsp; I can't get in on ASDM.&amp;nbsp; Does anyone know how to get by this?&amp;nbsp; Maybe I generated the key wrong... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576981#M610050</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2019-03-11T18:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576982#M610051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you just generate the keys again it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ca zeroize rsa&lt;/P&gt;&lt;P&gt;ca generate rsa key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try again....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the problem persists check you have the following in the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http x.x.x.x mask inside --&amp;gt; x.x.x.x should be the IP were you're coming from.&lt;/P&gt;&lt;P&gt;username test password test123 priv 15&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Oct 2010 20:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576982#M610051</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-10-01T20:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576983#M610052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Harrison,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check the output of 'show run all ssl' and 'show run aaa' and post the results here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Oct 2010 20:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576983#M610052</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-01T20:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576984#M610053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying to my post.&amp;nbsp;&amp;nbsp; I tried the other recommendation but didn't work.&amp;nbsp; Here is the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh run all ssl&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point localtrust inside&lt;BR /&gt;ssl trust-point localtrust outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh run aaa&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Oct 2010 20:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576984#M610053</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-01T20:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576985#M610054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, you do have other users able to access ASDM or nobody can access ASDM anymore?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do a ''sh asp table socket'' and make sure the ASA is listening on port 443 for HTTPS:&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh asp table socket &lt;BR /&gt;Protocol&amp;nbsp; Socket&amp;nbsp;&amp;nbsp;&amp;nbsp; Local Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Foreign Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&lt;BR /&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00009b1f&amp;nbsp; 192.168.102.3:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;Also ''sh run http'' should be allowing all the IPs where you initiate the ASDM connection to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you're using LOCAL authentication for HTTP, you should have a valid username (witgh privilege 15) on the local database on the ASA ''sh run username''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Oct 2010 22:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576985#M610054</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-10-01T22:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576986#M610055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying to my post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't get access to the ASA right now.&amp;nbsp; I think the issue is ASDM does not have a certificate to serve out when someone connects.&amp;nbsp; Do you know of a way from the CLI to regenerate the certificate for ASDM?&amp;nbsp; When I Google this I find a lot of stuff but they want you to generate the certificate from inside the ASDM.&amp;nbsp; Right now I can't get there....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 00:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576986#M610055</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-02T00:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576987#M610056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have accessto the CLI, please run a "debug http 255" when trying to access the ASDM and past the outputs here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 01:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576987#M610056</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-02T01:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576988#M610057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please paste the running config of the ASA ? Also what is the version of ASDM you are running ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Namit&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 06:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576988#M610057</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-02T06:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576989#M610058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the output of the debug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# debug http 225&lt;BR /&gt;debug http enabled at level 225.&lt;BR /&gt;ASA(config)# HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;BR /&gt;HTTP: processing ASDM request [/admin/version.prop] with cookie-based authentication (aware_webvpn_conf.re2c:422)&lt;BR /&gt;HTTP: check admin session. Cookie index [-1][0]&lt;BR /&gt;HTTP: client certificate required = 1&lt;BR /&gt;HTTP: enforce client certificate for the next request&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: processing ASDM request [/idm/idm.jnlp/] with cookie-based authentication (aware_webvpn_conf.re2c:422)&lt;BR /&gt;HTTP: check admin session. Cookie index [-1][0]&lt;BR /&gt;HTTP: client certificate required = 1&lt;BR /&gt;HTTP: enforce client certificate for the next request&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: ASDM request detected [ASDM/] for [/+webvpn+/index.html]&lt;BR /&gt;ewsStringSearch: no buffer&lt;BR /&gt;Close 0&lt;BR /&gt;HTTP: Periodic admin session check&amp;nbsp; (idle-timeout = 1800, session-timeout = 0)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 17:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576989#M610058</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-02T17:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576990#M610059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the "show run" I X'ed out the sensitive stuff.&amp;nbsp;&amp;nbsp; I think the issue is with the certificate for the ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name avispl.com&lt;BR /&gt;enable password XXXXXXXX&lt;BR /&gt;passwd XXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.200.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address XXXXXXXX 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name avispl.com&lt;BR /&gt;object-group network CORP_VPN_NETWORKS&lt;BR /&gt; network-object 192.168.2.0 255.255.255.0&lt;BR /&gt; network-object 192.168.28.0 255.255.255.0&lt;BR /&gt; network-object 192.168.21.0 255.255.255.0&lt;BR /&gt; network-object 10.9.30.0 255.255.255.0&lt;BR /&gt; network-object 10.9.31.0 255.255.255.0&lt;BR /&gt; network-object 10.2.10.0 255.255.255.0&lt;BR /&gt;object-group network obj_any&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.200.4.0 255.255.255.0 object-group CORP_VPN_NETWORKS&lt;BR /&gt;access-list nonat extended permit ip 10.200.4.0 255.255.255.0 object-group CORP_VPN_NETWORKS&lt;BR /&gt;access-list nonat extended permit ip object-group CORP_VPN_NETWORKS 10.200.4.224 255.255.255.224&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 192.168.28.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 192.168.21.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 10.9.30.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 10.9.31.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 10.2.10.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq www&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq ftp&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq ftp-data&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq nntp&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit udp 10.200.4.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq https&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit udp 10.200.4.0 255.255.255.0 any eq 443&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq telnet&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit tcp 10.200.4.0 255.255.255.0 any eq 1194&lt;BR /&gt;access-list CORP_ACCESS_IN extended permit icmp 10.200.4.0 255.255.255.0 any&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 10.2.10.0 255.255.255.0&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 10.9.30.0 255.255.255.0&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 10.9.31.0 255.255.255.0&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 192.168.21.0 255.255.255.0&lt;BR /&gt;access-list DUBAI-VPN-ACCESS_splitTunnelAcl standard permit 192.168.28.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool DUBAI-VPN-IP-POOL 10.200.4.200-10.200.4.254 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-634.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group CORP_ACCESS_IN in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 XXXXXXXX 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server AUTH-GRP-TPADC3 protocol radius&lt;BR /&gt;aaa-server AUTH-GRP-TPADC3 (inside) host 10.2.10.5&lt;BR /&gt; timeout 5&lt;BR /&gt; key *****&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 30&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;http 10.200.4.0 255.255.255.0 inside&lt;BR /&gt;http authentication-certificate inside&lt;BR /&gt;snmp-server host inside 10.2.10.52 community *****&lt;BR /&gt;snmp-server location Dubai&lt;BR /&gt;snmp-server contact XXXXXXXX&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set strong esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer XXXXXXXX&lt;BR /&gt;crypto map outside_map 1 set transform-set strong&lt;BR /&gt;crypto map outside_map 1 set reverse-route&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint localtrust&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn DUBAI.avispl.com&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn dubai-asa.aviinc.local&lt;BR /&gt; email &lt;A href="mailto:itbilling@avispl.com"&gt;itbilling@avispl.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt; subject-name CN=ASA.AVISPL.COM,OU=iTAC,O="AVI-SPL, Inc.",C=US,St=Florida,L=Tampa,&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:EA=itbilling@avispl.com"&gt;EA=itbilling@avispl.com&lt;/A&gt;&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASA_TrustedRoot&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn dubai-asa.aviinc.local&lt;BR /&gt; email &lt;A href="mailto:itbilling@avispl.com"&gt;itbilling@avispl.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt; subject-name CN=asa.AVISPL.COM,OU=iTAC,O="AVI-SPL, Inc.",C=US,St=Florida,L=Tampa,&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:EA=itbilling@avispl.com"&gt;EA=itbilling@avispl.com&lt;/A&gt;&lt;BR /&gt; proxy-ldc-issuer&lt;BR /&gt; crl configure&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.200.4.100-10.200.4.150 inside&lt;BR /&gt;dhcpd dns 192.168.2.34 192.168.2.18 interface inside&lt;BR /&gt;dhcpd wins 192.168.2.34 192.168.2.18 interface inside&lt;BR /&gt;dhcpd domain aviinc.local interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point localtrust inside&lt;BR /&gt;ssl trust-point localtrust outside&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DUBAI-VPN-ACCESS internal&lt;BR /&gt;group-policy DUBAI-VPN-ACCESS attributes&lt;BR /&gt; banner value XXXXXXXX&lt;BR /&gt; wins-server value 10.2.10.5 192.168.2.34&lt;BR /&gt; dns-server value 10.2.10.5 192.168.2.34&lt;BR /&gt; vpn-tunnel-protocol IPSec svc&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value DUBAI-VPN-ACCESS_splitTunnelAcl&lt;BR /&gt; default-domain value XXXXXXXX&lt;BR /&gt;username XXXXXXXX password XXXXXXXX encrypted privilege 15&lt;BR /&gt;tunnel-group XXXXXXXX type ipsec-l2l&lt;BR /&gt;tunnel-group XXXXXXXX ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group DUBAI-VPN-ACCESS type remote-access&lt;BR /&gt;tunnel-group DUBAI-VPN-ACCESS general-attributes&lt;BR /&gt; address-pool DUBAI-VPN-IP-POOL&lt;BR /&gt; authentication-server-group AUTH-GRP-TPADC3&lt;BR /&gt; default-group-policy DUBAI-VPN-ACCESS&lt;BR /&gt;tunnel-group DUBAI-VPN-ACCESS ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:97f6d70f51ea165dfc5923697f595a94&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 17:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576990#M610059</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-02T17:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576991#M610060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you try to remove this line from the config and try asdm again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt; no http authentication-certificate inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 22:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576991#M610060</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-02T22:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576992#M610061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA seems to be requesting for a client&amp;nbsp; certificate as see from the debugs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;HTTP: client certificate required = 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove the command "&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;http authentication-certificate inside" &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;and then try accessing the ASDM&lt;/SPAN&gt;.Let me know how it goes.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Oct 2010 00:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576992#M610061</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-03T00:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576993#M610062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will try both suggestions on Monday morning.&amp;nbsp; Thanks all for you input.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Oct 2010 16:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576993#M610062</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-03T16:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access ASDM</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576994#M610063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to all who replied....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fixed the problem.&amp;nbsp; I created a user account on ASA.&amp;nbsp; Some how with all the changes the account was removed?&amp;nbsp; I added the account from the CLI and was able to get into ASDM.&amp;nbsp; Hmmmmm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again to all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harrison&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 23:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576994#M610063</guid>
      <dc:creator>HMidkiff</dc:creator>
      <dc:date>2010-10-04T23:36:32Z</dc:date>
    </item>
    <item>
      <title>I know this is an old post...</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576995#M610064</link>
      <description>&lt;P&gt;I know this is an old post.....but your comment had helped to get out from a long pending issue....thanks GBU&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2014 12:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-asdm/m-p/1576995#M610064</guid>
      <dc:creator>PND</dc:creator>
      <dc:date>2014-03-15T12:54:35Z</dc:date>
    </item>
  </channel>
</rss>

