<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So you've run through the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554240#M928274</link>
    <description>&lt;P&gt;So you've run through the initial module setup and assigned the CX module's address and mask and gateway?&lt;/P&gt;&lt;P&gt;Can you confirm (by sessioning into the CX module from the ASA cli) that you can ping the gateway and further downstream addresses?&lt;/P&gt;</description>
    <pubDate>Mon, 16 Feb 2015 16:44:47 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-02-16T16:44:47Z</dc:date>
    <item>
      <title>ASA-CX management</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554229#M928261</link>
      <description>&lt;P&gt;I have a cluster of ASA 5515-X with CX, AVC and WEB Security.&lt;/P&gt;&lt;P&gt;A couple of questions:&lt;/P&gt;&lt;P&gt;1. how can I install the licenses, or: where can I do "Upload License File"&lt;/P&gt;&lt;P&gt;2. to manage CX and WEB/security, do I need PRSM ?&lt;/P&gt;&lt;P&gt;if YES, is PRSM a separate license that I can buy ?&lt;/P&gt;&lt;P&gt;if NO, how can I access to the CX and WEB/security console ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank's&lt;/P&gt;&lt;P&gt;Claudio&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554229#M928261</guid>
      <dc:creator>battanc</dc:creator>
      <dc:date>2020-02-21T13:13:48Z</dc:date>
    </item>
    <item>
      <title>To manage the NGFW services</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554230#M928263</link>
      <description>&lt;P&gt;To manage the NGFW services on the CX module (AVC, WSE and optionally IPS) you use the PRSM software. It comes in two "flavors":&lt;/P&gt;&lt;P&gt;1 - "on-box" or single device mode. This is the built-in PRSM that is included at no cost with every CX.&lt;/P&gt;&lt;P&gt;2 - "off-box" or multiple device mode. This is a licensed paid product that is delivered as a VM (ova file) that you need to install on a WMware ESX server that you provide. It is licensed per number of managed CX modules (an HA pair counts as one managed device). This mode allows you to create and manage common objects and policies across many CX instances, look at enterprise-wide events, etc. using a single management interface.&lt;/P&gt;&lt;P&gt;The license file is uploaded via PRSM in either mode. There is a console interface that has some very rudimentary features (initial setup, pull tech-support files, etc.). 99% of what you do with CX is via PRSM.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 19:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554230#M928263</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-07-03T19:26:30Z</dc:date>
    </item>
    <item>
      <title>Thank's Marvin.Let me stay on</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554231#M928264</link>
      <description>&lt;P&gt;Thank's Marvin.&lt;/P&gt;&lt;P&gt;Let me stay on the first solution, which is the right one for me in this situation.&amp;nbsp;&lt;BR /&gt;But sorry for my stupidity: I can not understand how to access.&amp;nbsp;&lt;BR /&gt;You talk about "built-in": is it something link ASDM, already on the ASA, that downloads the software to my PC?&amp;nbsp;&lt;BR /&gt;If so, how do I access to it ?&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Claudio&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 06:32:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554231#M928264</guid>
      <dc:creator>battanc</dc:creator>
      <dc:date>2014-07-04T06:32:04Z</dc:date>
    </item>
    <item>
      <title>Yes - that's what I mean by</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554232#M928265</link>
      <description>&lt;P&gt;Yes - that's what I mean by built-in. It is even more integral than ASDM in that it is not an optional way to configure the CX-based services but it is instead mandatory.&lt;/P&gt;
&lt;P&gt;PRSM runs via a web server that is accessible via its unique CX-dedicated management IP address on the ASA once you have run through the initial setup (via ASDM or cli method) making it accessible. The steps for doing so are outlined in the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/cx/cx_qsg.html"&gt;CX Module Quick Start Guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Note the final step in that guide directs you:&lt;/P&gt;
&lt;P class="pB1_Body1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin: 1px 0em 6px; line-height: normal;"&gt;This section describes how to launch PRSM to configure the ASA CX module application. For details on using PRSM to configure your ASA CX security policy, see the following ASA CX documentation roadmap:&lt;SPAN class="cXRef_Color" style="color: blue;"&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asacx/roadmap/asacxprsmroadmap.html" style="color: rgb(51, 102, 204);"&gt;http://www.cisco.com/en/US/docs/security/asacx/roadmap/asacxprsmroadmap.html.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="Note1B" style="margin: 0px 0em -10px -0.25in; text-indent: -0.5em; color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;IMG alt="" src="http://www.cisco.com/c/dam/en/us/td/i/templates/note.gif" /&gt;&lt;/DIV&gt;
&lt;HR class="Cautn1table" style="margin-left: 0in; margin-right: 0em; margin-top: 5px; text-align: right; border-right-width: 1px; border-left-width: 1px; border-right-style: solid; border-left-style: solid; border-color: grey; color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal; background-color: rgb(170, 170, 170);" /&gt;&lt;P&gt;&lt;A name="wp49533" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pN1_Note1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin: 3px 0em 3px 0in; text-indent: -0.3in; line-height: normal;"&gt;&lt;B&gt;Note&amp;nbsp;&lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="1" /&gt;If you do not configure any policies on the ASA CX, all traffic redirected to the ASA CX will be allowed by default, and you can view the various reports in the ASA CX web interface to analyze the traffic.&lt;/P&gt;
&lt;HR class="Cautn1table" style="margin-left: 0in; margin-right: 0em; margin-top: 5px; text-align: right; border-right-width: 1px; border-left-width: 1px; border-right-style: solid; border-left-style: solid; border-color: grey; color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal; background-color: rgb(170, 170, 170);" /&gt;&lt;P&gt;&lt;A name="wp49534" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin: 1px 0em 6px; line-height: normal;"&gt;You can launch PRSM from your web browser, or you can launch it from ASDM.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp49535" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pBu1_Bullet1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin-right: 0em; margin-bottom: 7px; margin-left: 0.25in; text-indent: -0.25in; line-height: normal;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;Launch PRSM from a web browser by enter the following URL:&lt;/P&gt;
&lt;P&gt;&lt;A name="wp49536" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="pEx2_Example2" style="color: rgb(0, 0, 0); font-family: 'Courier New', Courier, mono; font-size: 8px; margin: -0.55em 0em 0em 0.25in; line-height: normal;"&gt;
&lt;PRE style="font-size: 10px;"&gt;
https://&lt;EM class="cEmphasis"&gt;ASA_CX_management_IP
&lt;/EM&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp49537" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp49540" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB2_Body2" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin: 1px 0em 6px 0.25in; line-height: normal;"&gt;Where the ASA CX management IP address is the one you set in the&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/cx/cx_qsg.html#wp50244" style="color: rgb(51, 102, 204);"&gt;"Configuring Basic ASA CX Settings at the ASA CX CLI" section&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp49542" style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pBu1_Bullet1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 11px; margin-right: 0em; margin-bottom: 7px; margin-left: 0.25in; text-indent: -0.25in; line-height: normal;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;Launch PRSM from ASDM by choosing&amp;nbsp;&lt;B class="cBold"&gt;Home &amp;gt; ASA CX Status&lt;/B&gt;, and clicking the&lt;B class="cBold"&gt;&amp;nbsp;Connect to the ASA CX application&amp;nbsp;&lt;/B&gt;link.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 15:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554232#M928265</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-07-04T15:12:06Z</dc:date>
    </item>
    <item>
      <title>OK, now it's much clearer.</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554233#M928266</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;OK, now it's much clearer.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;But a few more questions:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;1. PRSM is only accessible from one interface (inside OR outside, OR ...), unlike ASDM&amp;nbsp;which is available on all interfaces ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;2. I have to manage both from internal and external networks - how can I do it ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;3. from the outside, can I use the same IP of ASDM, on a different port (ASDM has already moved on port 10XXX because port 443 is used for NATting an internal host) ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Best regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Claudio&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2014 08:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554233#M928266</guid>
      <dc:creator>battanc</dc:creator>
      <dc:date>2014-07-07T08:02:39Z</dc:date>
    </item>
    <item>
      <title>PRSM must be addressed</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554234#M928267</link>
      <description>&lt;P&gt;PRSM must be addressed ultimately via it's configured management address and on https (tcp/443).&lt;/P&gt;&lt;P&gt;If your firewall or some other intervening network device performs static NAT or PAT on that, it is OK as long as the packets reach PRSM via the ASA physical M0/0 interface which PRSM asserts its own configuration onto (either in addition to the ASA configuration of that interface or by itself).&lt;/P&gt;&lt;P&gt;Yes it is very unlike ADSM in this way as ASDM can be configured to be accessible via any reachable interface of the ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2014 23:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554234#M928267</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-07-07T23:56:31Z</dc:date>
    </item>
    <item>
      <title>I have management on a</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554235#M928268</link>
      <description>&lt;P&gt;I have management on a separate VLAN and I have configured management and CX on the same VLAN, on different IP (192.168.120.11 and .15).&lt;/P&gt;&lt;P&gt;Now, connected from outside via VPN (AnyConnect), I can reach the ASDM (192.168.120.11:10443) but I can't connect to PRSM (https://192.168.120.15).&lt;/P&gt;&lt;P&gt;What do I have wrong ?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2014 13:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554235#M928268</guid>
      <dc:creator>battanc</dc:creator>
      <dc:date>2014-07-08T13:28:07Z</dc:date>
    </item>
    <item>
      <title>How does your traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554236#M928269</link>
      <description>&lt;P&gt;How does your traffic flow for the ASDM on the management interface?&lt;/P&gt;&lt;P&gt;I have seen instances where it's necessary to insert a static route for the PRSM IP since the ASA otherwise tries to connect to PRSM directly since it sees the route as needing to go via the connected /24 in stead of going into your LAN and via an internal gateway to come back to the PRSM IP address. In such a case, we would add a /32 route to PRSM and that would take precedence over the shorter prefix /24.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2014 23:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554236#M928269</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-07-08T23:01:11Z</dc:date>
    </item>
    <item>
      <title>It works.I just add a static</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554237#M928270</link>
      <description>&lt;P&gt;It works.&lt;/P&gt;&lt;P&gt;I just add a static route in the INSIDE, for the &amp;lt;IP-PRSM&amp;gt; routing to the "inside default gateway".&lt;/P&gt;&lt;P&gt;I still can not ping, but I can manage PRSM via VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for the support&lt;/P&gt;&lt;P&gt;Claudio&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2014 06:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554237#M928270</guid>
      <dc:creator>battanc</dc:creator>
      <dc:date>2014-07-10T06:38:27Z</dc:date>
    </item>
    <item>
      <title>Hello Caludio,I managed to</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554238#M928271</link>
      <description>&lt;P&gt;Hello Caludio,&lt;/P&gt;&lt;P&gt;I managed to access the ASA CX management interface over VPN - both over https and icmp (ping responses). If you are interested to further resolve your issues please feel free to reply.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remi&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 02:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554238#M928271</guid>
      <dc:creator>remi-reszka</dc:creator>
      <dc:date>2014-11-05T02:56:07Z</dc:date>
    </item>
    <item>
      <title>hello marvin. can you help me</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554239#M928272</link>
      <description>&lt;P&gt;hello marvin. can you help me?&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have a problmem about asa cx management. i can access asa management interface ip address but can not access asa cx ip which is from same subnet as asa's management ip address&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 16:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554239#M928272</guid>
      <dc:creator>ciscosystemsgeorgia1</dc:creator>
      <dc:date>2015-02-16T16:40:59Z</dc:date>
    </item>
    <item>
      <title>So you've run through the</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554240#M928274</link>
      <description>&lt;P&gt;So you've run through the initial module setup and assigned the CX module's address and mask and gateway?&lt;/P&gt;&lt;P&gt;Can you confirm (by sessioning into the CX module from the ASA cli) that you can ping the gateway and further downstream addresses?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 16:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554240#M928274</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-02-16T16:44:47Z</dc:date>
    </item>
    <item>
      <title>yes i have run initial setup</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554241#M928276</link>
      <description>&lt;P&gt;yes i have run initial setup and i am pinging gateway from cx module, but i can not ping my pc. but from pc i can ping asa's management interface ip address&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 18:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554241#M928276</guid>
      <dc:creator>ciscosystemsgeorgia1</dc:creator>
      <dc:date>2015-02-16T18:06:01Z</dc:date>
    </item>
    <item>
      <title>Have you removed the nameif</title>
      <link>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554242#M928278</link>
      <description>&lt;P&gt;Have you removed the nameif from the ASA management interface (in the ASA configuration)?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 18:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cx-management/m-p/2554242#M928278</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-02-16T18:12:17Z</dc:date>
    </item>
  </channel>
</rss>

