<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 telnet/ssh/web issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057000#M921258</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great thanks. I guess all the other ASA's I've configured have been used before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That fixed the SSH part, but not the access through ADSM or CCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ADSM says 'Not IDM' in the Java window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE asks me if it's a trusted site, asks for login ID but then says webpage cannot be found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run all ssl&lt;/P&gt;&lt;P&gt;ssl server-version any&lt;/P&gt;&lt;P&gt;ssl client-version any&lt;/P&gt;&lt;P&gt;ssl encryption aes256-sha1 aes128-sha1 3des-sha1 des-sha1 rc4-md5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run asdm&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run http&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http X.X.X.X 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.27.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Aug 2012 14:02:17 GMT</pubDate>
    <dc:creator>jasonchristophercobb</dc:creator>
    <dc:date>2012-08-24T14:02:17Z</dc:date>
    <item>
      <title>ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2056998#M921256</link>
      <description>&lt;P&gt;I'm unable to access this ASA from anywhere except console. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm no ASA expert, but I've compared it to other ASA's I've configured, and I just can't find the error of my ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is should be easy, I just need a different set of eyes looking at it now. I hope I didn't censor it too much, but I imagine if I'm able to SSH locally, that will fix all the other access issues I have. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;ASA Version 7.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname X&lt;BR /&gt;domain-name X.local&lt;BR /&gt;enable password XXXXXXXXXXXXXXXXXXX encrypted&lt;BR /&gt;passwd XXXXXXXXXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.27.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;banner motd OFFICIAL USE ONLY. Unauthorized use prohibited&lt;BR /&gt;banner motd Individuals using this computing system is subject to having all&lt;BR /&gt;banner motd of their activities on this system monitored and recorded without&lt;BR /&gt;banner motd further notice. Auditing of users may include keystroke monitoring.&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server X.X.X.12&lt;BR /&gt;name-server 4.2.2.2&lt;BR /&gt;domain-name pain.local&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service XX tcp-udp&lt;BR /&gt;port-object range 60000 64999&lt;BR /&gt;object-group network MySpace&lt;BR /&gt;network-object 67.134.143.0 255.255.255.0&lt;BR /&gt;network-object 204.16.32.0 255.255.255.0&lt;BR /&gt;network-object 216.178.32.0 255.255.224.0&lt;BR /&gt;object-group network Facebook&lt;BR /&gt;network-object 69.63.176.0 255.255.255.0&lt;BR /&gt;network-object 204.15.20.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 172.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 172.x.x.0 255.255.255.0&lt;BR /&gt;object-group network LocalLAN&lt;BR /&gt;description X Local Subnet 192.168.27.x&lt;BR /&gt;network-object 192.168.27.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 10.x.x.0 255.255.255.0&lt;BR /&gt;network-object 172.x.x.0 255.255.255.0&lt;BR /&gt;network-object 172.x.x.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object host 64.x.x.x&lt;BR /&gt;network-object host 71.x.x.x&lt;BR /&gt;network-object host 74.x.x.x&lt;BR /&gt;network-object host 99.x.x.x&lt;BR /&gt;network-object host 173.x.x.x&lt;BR /&gt;network-object 192.168.27.0 255.255.255.0&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 192.168.27.0 255.255.255.0 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list outbound extended deny ip any object-group MySpace inactive&lt;BR /&gt;access-list outbound extended deny ip any object-group Facebook inactive&lt;BR /&gt;access-list outbound extended permit icmp any any&lt;BR /&gt;access-list outbound extended permit ip any any&lt;BR /&gt;access-list extended extended permit ip object-group LocalLAN object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_3 any&lt;BR /&gt;access-list outside_cryptomap extended permit ip object-group LocalLAN object-group DM_INLINE_NETWORK_2&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list Crucial level emergencies&lt;BR /&gt;logging buffer-size 1048576&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;logging from-address &lt;A href="mailto:drowland@pinnaclepartnersmed.com" target="_blank"&gt;X@X.com&lt;/A&gt;&lt;BR /&gt;logging recipient-address &lt;A href="mailto:X@X.com" target="_blank"&gt;X@X.com&lt;/A&gt; level errors&lt;BR /&gt;logging recipient-address &lt;A href="mailto:X@X.com" target="_blank"&gt;X@X.com&lt;/A&gt; level critical&lt;BR /&gt;logging facility 23&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;logging class auth trap emergencies&lt;BR /&gt;logging class config trap warnings&lt;BR /&gt;logging class ospf trap warnings&lt;BR /&gt;logging class vpn trap alerts&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.X.X 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http x.x.x.x 255.255.255.255 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.27.0 255.255.255.0 inside&lt;BR /&gt;http redirect outside 80&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt connection tcpmss 1360&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 2 set pfs&lt;BR /&gt;crypto map outside_map 2 set peer x.x.x.x&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp policy 20&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd dns 10.x.x.x 4.2.2.2&lt;BR /&gt;dhcpd domain pain.local&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;dhcpd option 156 ascii ftpservers=10.x.x.x&lt;BR /&gt;dhcpd option 42 ip 208.66.175.36&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.27.2-192.168.27.33 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ntp authentication-key 1 md5 *&lt;BR /&gt;ntp authenticate&lt;BR /&gt;ntp server 10.x.x.x source inside&lt;BR /&gt;username XXXXXXXXX password XXXXXXXXXXXXXX encrypted privilege 15&lt;BR /&gt;tunnel-group 64.X.X.X type ipsec-l2l&lt;BR /&gt;tunnel-group 64.X.X.X ipsec-attributes&lt;BR /&gt;pre-shared-key X&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2056998#M921256</guid>
      <dc:creator>jasonchristophercobb</dc:creator>
      <dc:date>2020-02-21T12:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2056999#M921257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The relevant part to control from where you are allowed to SSH into the ASA are these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But do you have public/private keys generated?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier; "&gt;asa(config)# crypto key generate rsa general-keys modulus 2048&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 06:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2056999#M921257</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-24T06:55:45Z</dc:date>
    </item>
    <item>
      <title>ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057000#M921258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great thanks. I guess all the other ASA's I've configured have been used before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That fixed the SSH part, but not the access through ADSM or CCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ADSM says 'Not IDM' in the Java window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE asks me if it's a trusted site, asks for login ID but then says webpage cannot be found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run all ssl&lt;/P&gt;&lt;P&gt;ssl server-version any&lt;/P&gt;&lt;P&gt;ssl client-version any&lt;/P&gt;&lt;P&gt;ssl encryption aes256-sha1 aes128-sha1 3des-sha1 des-sha1 rc4-md5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run asdm&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxASA# show run http&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http X.X.X.X 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.27.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 14:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057000#M921258</guid>
      <dc:creator>jasonchristophercobb</dc:creator>
      <dc:date>2012-08-24T14:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057001#M921259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have the file asdm-621.bin in flash?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 15:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057001#M921259</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-24T15:22:05Z</dc:date>
    </item>
    <item>
      <title>ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057002#M921260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I've verified that the asdm .bin is there, many times... but I guess it helps if you make sure you are refering to the same version that is stored in flash. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's always the obvious that stumps me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 16:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057002#M921260</guid>
      <dc:creator>jasonchristophercobb</dc:creator>
      <dc:date>2012-08-24T16:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 telnet/ssh/web issue</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057003#M921261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;It's always the obvious that stumps me&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are always the hardest to find ... &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 17:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-telnet-ssh-web-issue/m-p/2057003#M921261</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-24T17:06:01Z</dc:date>
    </item>
  </channel>
</rss>

