I have a problem with a Windows Server 2003, Java 7 Update 67 and ASDM 7.9(2). When i start the IDM a "Certifikation Error" appears.
ASDM will start up using Java Web Start. For ASDM 7.3(1) and later, you will be prompted to follow the wizard to create a self-signed certficate. For earlier ASDM versions, follow the manual instructions to create a self-signed certificate.Would you like to continue with self-signed cert enrollment?
When i click "yes" a get an error. "Application coulnd't start". Only with the ASA 5506 can I got this error. 4 other ASA 5505 work this way.
gw# sh run http http server enable 65443 http ***-INSIDE 255.255.255.0 inside http *** 255.255.255.0 outside http ***-INSIDE 255.255.255.0 inside http ***-INSIDE 255.255.255.0 inside http ***-INSIDE 255.255.255.0 inside gw# sh run aaa aaa authentication ssh console LOCAL aaa authentication enable console LOCAL aaa authentication http console LOCAL aaa authentication login-history
It seems that the combination Windows Server 2003, the Java Version and the ASA5506 is a problem. I tested it with Win10 and 8 with new the latest Java Version their is no problem. We cant update this Win Server 2003 and java. The Installation closing without an error.
I am guessing it is an SSL issue and settings that your old Java is trying to use.
If you check the logs when trying to connect it will tell you which TLS version you are using, and it might give you an idea on why it is failing. From there try adding in ciphers for that version of TLS and see if there is one that will work with your setup.
Additionally, you might want to try creating a self signed cert for the ASA and adding it to the trusted sites for Java. Hopefully this helps.
I don't have a similar setup to test on but it is usually the ciphers when dealing with old java and new ASDM or the other way around.
The OSPF Type-2 LSA is one of the misunderstanding LSA among all the popular LSAs in OSPF , most people learns that this kind of LSA (Type-2) is generated by DR the Designated Router in a broadcast segment, for example when two or more than two routers ar...
Table of Contents
RADIUS has been the de-facto protocol for Remote Access Authentication for decades. RADIUS/UDP as defined by RFC 2865 has traditionally used MD5 for authentication and integrity. Unfortunately, successful attacks ...
Since 2008, the ASR 1000 platforms have dramatically changed the WAN edge router’s capabilities. With its very own QuantumFlow Processor (QFP) innovation, the data plane was powered to offer advanced scalable services along with high performance. Fast for...
Traditionally Cisco has used several different methods for storing passwords and keys in IOS. The older methods are Type 5 (MD5 hash) & Type7 (Vigenere obfuscation). We enabled Type 7 encryption with the CLI service password-encryption...
AI spoofing detection is a feature in AI Endpoint Analytics released in Cisco DNA Center v18.104.22.168, that identifies endp...