<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 401 forbidden on ASDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373161#M857045</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issue "sh asp table socket" and make sure it is listening on port 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not just issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;no http server en&lt;/P&gt;&lt;P&gt;http server en&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then issue "sh asp table socket" and see if it is listening again and then launch asdm again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also issue "sh ver" and make sure an appropriate asdm image matching the OS is loaded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Mar 2010 21:30:37 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-03-22T21:30:37Z</dc:date>
    <item>
      <title>401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373160#M857043</link>
      <description>&lt;P&gt;I can get to the untrusted certificate on https....coming from my address 192.168.133.205..but i get denied&lt;/P&gt;&lt;P&gt;am i being denied by access list?..I dont see how since intital SSL begins..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;these are the log from the ASA---10.11.24.11 is the ip of one of the contexts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.124&lt;BR /&gt; vlan 124&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.11.24.11 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar 22 2010 16:05:34: %ASA-6-725001: Starting SSL handshake with client Inside:1&lt;BR /&gt;92.168.133.205/24368 for TLSv1 session.&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-6-725003: SSL client Inside:192.168.133.205/24368 req&lt;BR /&gt;uest to resume previous session.&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-6-725002: Device completed SSL handshake with client&lt;BR /&gt;Inside:192.168.133.205/24368&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-6-725007: SSL session with client Inside:192.168.133.&lt;BR /&gt;205/24368 terminated.&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-6-302014: Teardown TCP connection 336585 for Inside:1&lt;BR /&gt;92.168.133.205/24368 to identity:10.11.24.11/443 duration 0:00:00 bytes 504 TCP&lt;BR /&gt;Reset-O&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-6-106015: Deny TCP (no connection) from 192.168.133.2&lt;BR /&gt;05/24368 to 10.11.24.11/443 flags FIN ACK&amp;nbsp; on interface Inside&lt;BR /&gt;Mar 22 2010 16:05:34: %ASA-7-710005: TCP request discarded from 192.168.133.205/&lt;BR /&gt;24368 to Inside:10.11.24.11/443&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373160#M857043</guid>
      <dc:creator>nygenxny123</dc:creator>
      <dc:date>2019-03-11T17:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373161#M857045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issue "sh asp table socket" and make sure it is listening on port 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not just issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;no http server en&lt;/P&gt;&lt;P&gt;http server en&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then issue "sh asp table socket" and see if it is listening again and then launch asdm again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also issue "sh ver" and make sure an appropriate asdm image matching the OS is loaded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Mar 2010 21:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373161#M857045</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-03-22T21:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373162#M857047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm ok..tried the above..same results..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(2)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00aec0af&amp;nbsp; 10.1.1.15:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;BR /&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00aee5ef&amp;nbsp; 10.11.24.11:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar 23 2010 09:31:49: %ASA-6-725001: Starting SSL handshake with client Inside:&lt;BR /&gt;92.168.133.205/27880 for TLSv1 session.&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-6-725003: SSL client Inside:192.168.133.205/27880 re&lt;BR /&gt;uest to resume previous session.&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-6-725002: Device completed SSL handshake with client&lt;BR /&gt;Inside:192.168.133.205/27880&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-6-725007: SSL session with client Inside:192.168.133&lt;BR /&gt;205/27880 terminated.&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-6-302014: Teardown TCP connection 361546 for Inside:&lt;BR /&gt;92.168.133.205/27880 to identity:10.11.24.11/443 duration 0:00:00 bytes 504 TCP&lt;BR /&gt;Reset-O&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-6-106015: Deny TCP (no connection) from 192.168.133.&lt;BR /&gt;05/27880 to 10.11.24.11/443 flags FIN ACK&amp;nbsp; on interface Inside&lt;BR /&gt;Mar 23 2010 09:31:49: %ASA-7-710005: TCP request discarded from 192.168.133.205&lt;BR /&gt;27880 to Inside:10.11.24.11/443&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-302013: Built inbound TCP connection 361547 for In&lt;BR /&gt;ide:192.168.133.205/27881 (192.168.133.205/27881) to identity:10.11.24.11/443 (&lt;BR /&gt;0.11.24.11/443)&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-725001: Starting SSL handshake with client Inside:&lt;BR /&gt;92.168.133.205/27881 for TLSv1 session.&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-725003: SSL client Inside:192.168.133.205/27881 re&lt;BR /&gt;uest to resume previous session.&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-725002: Device completed SSL handshake with client&lt;BR /&gt;Inside:192.168.133.205/27881&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-725007: SSL session with client Inside:192.168.133&lt;BR /&gt;205/27881 terminated.&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-302014: Teardown TCP connection 361547 for Inside:&lt;BR /&gt;92.168.133.205/27881 to identity:10.11.24.11/443 duration 0:00:00 bytes 504 TCP&lt;BR /&gt;Reset-O&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-6-106015: Deny TCP (no connection) from 192.168.133.&lt;BR /&gt;05/27881 to 10.11.24.11/443 flags FIN ACK&amp;nbsp; on interface Inside&lt;BR /&gt;Mar 23 2010 09:31:50: %ASA-7-710005: TCP request discarded from 192.168.133.205&lt;BR /&gt;27881 to Inside:10.11.24.11/443&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Mar 2010 14:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373162#M857047</guid>
      <dc:creator>nygenxny123</dc:creator>
      <dc:date>2010-03-23T14:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373163#M857049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this is an old message, I was hoping you were able to share if you fixed this issue as I think I am seeing the same problem and I am unable to find any information on the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 10:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373163#M857049</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2011-04-04T10:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373164#M857050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kindly follow the Troubleshooting method, mentioned in this link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-15016"&gt;https://supportforums.cisco.com/docs/DOC-15016&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I feel that the connection is being terminated since ASDM image is missing in flash, or not mentioned in config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please try accessing it with &lt;STRONG&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&lt;IP address=""&gt;/admin&lt;/IP&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&lt;IP address=""&gt;/&lt;CONTEXT-NAME&gt;&lt;/CONTEXT-NAME&gt;&lt;/IP&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: Please mark the question resolved if it has been answered. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 11:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373164#M857050</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-04T11:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373165#M857052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the link, I have tried accessing the context with the name at the end of the http string to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not to sure what the issue is here as I am able to access the ASA context from the outside interface always but get this error on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apr 01 2011 10:59:28: %ASA-7-609001: Built local-host identity:192.168.1.1&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-6-302013: Built inbound TCP connection 31132166 for INSIDE:192.168.1.16/49765 (192.168.1.16/49765) to identity:192.168.1.1/443 (192.168.1.1/443)&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725010: Device supports the following 4 cipher(s).&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[1] : RC4-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[2] : AES128-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[3] : AES256-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[4] : DES-CBC3-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725008: SSL client INSIDE:192.168.1.16/49765 proposes the following 11 cipher(s).&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[1] : DHE-DSS-AES256-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[2] : AES256-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[3] : DHE-RSA-AES256-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[4] : DHE-RSA-AES128-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[5] : DHE-DSS-AES128-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[6] : RC4-MD5&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[7] : RC4-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[8] : AES128-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[9] : EDH-RSA-DES-CBC3-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[10] : EDH-DSS-DES-CBC3-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725011: Cipher[11] : DES-CBC3-SHA&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725012: Device chooses cipher : RC4-SHA for the SSL session with client INSIDE:192.168.1.16/49765&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-725014: SSL lib error. Function: SSL3_READ_BYTES Reason: sslv3 alert bad certificate&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-710005: TCP request discarded from 192.168.1.16/49765 to INSIDE:192.168.1.1/443&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-6-302014: Teardown TCP connection 31132166 for INSIDE:192.168.1.16/49765 to identity:192.168.1.1/443 duration 0:00:00 bytes 524 TCP Reset by appliance&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-609002: Teardown local-host identity:192.168.1.1 duration 0:00:00&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-6-106015: Deny TCP (no connection) from 192.168.1.16/49765 to 192.168.1.1/443 flags RST&amp;nbsp; on interface INSIDE&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-710005: TCP request discarded from 192.168.1.16/49765 to INSIDE:192.168.1.1/443&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-6-106015: Deny TCP (no connection) from 192.168.1.16/49765 to 192.168.1.1/443 flags RST&amp;nbsp; on interface INSIDE&lt;BR /&gt;Apr 01 2011 10:59:28: %ASA-7-710005: TCP request discarded from 192.168.1.16/49765 to INSIDE:192.168.1.1/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also not to sure about the certificate error as SSH always works and so does the ASDM on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regrads MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 21:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373165#M857052</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2011-04-05T21:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: 401 forbidden on ASDM</title>
      <link>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373166#M857054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi MJ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did some research on the error message you are getting, and I would like to suggest trying the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. enable lower SSL versions on the browser as well.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. try doing "no http server enable" followed by "http server enable 10000" and try accessing it using: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip_address:10000"&gt;https://ip_address:10000&lt;/A&gt;&lt;SPAN&gt; and see if it works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You can use any port other than 443. I randomly chose 10000.&lt;/P&gt;&lt;P&gt;3. if the ASA is in high availability, could you check if ASDM access to the standby unit works fine?&lt;/P&gt;&lt;P&gt;4. very last resort: reboot the current active device and check if this resolves the issue. (it might become standby if failover is present. make it active again.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the inside interface shared among multiple contexts? If so does the interface have unique mac addresses in the various contexts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 22:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/401-forbidden-on-asdm/m-p/1373166#M857054</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-05T22:38:40Z</dc:date>
    </item>
  </channel>
</rss>

