cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
443
Views
0
Helpful
4
Replies

Beginner to config ASA-5515-X , please help ^^

Raymond Kwok
Level 1
Level 1

Hi,
I have a new ASA 5515-x.

Have a PC connected to the management port. I have network access to it, can tftp up files and ping the firewall.

When I try to access it by https://192.168.1.1 or https://192.168.1.1 I get "webpage could not be found".

PC config:

Win7 ie11 and Chrome 39.0.2171.99

Java is using latest ver.

 

It's a standard basic configuration with the following:

int m0/0

ip add 192.168.1.1 255.255.255.0

nameif raymond

no shut

 

asdm image disk0:/asdm-713.bin

http server enable

http 192.168.1.0 255.255.255.0 raymond

 

ssl en aes128 3des

 

wr m

 

Does anyone have any idea or suggestion what to do, how to troubleshoot it would be much appreciated.

 

ASA version 9.1(2) , ADM version 7.13

thanks~~~~~~~~~~

4 Replies 4

Marvin Rhoads
Hall of Fame
Hall of Fame

Have you verified the ASDM image is on disk0?

Also check that you a a valid RSA key ("sh cry key mypubkey rsa") and at least the self-signed certificate.

What does "show ssl" tell you?

Dear Marvin

 

thank you for your reply

The problem was fixed , when i downgrade the java to j6u45 , but cisco original disc provide java 7..............and the requirement said need 7 or above..............

 

but i have any other question............

my inside cannot though outside to connect internet............

i am following the step by cisco....

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112998-asa-1-int-00.html

 

thanks~~~!!

can u post your firewall config and network diagram?

Dear Jeevak

 

I still not yet promo to replace my existing FW

I just setup to my existing network to test

following me environment

 

ASA Version 9.1(2)
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface GigabitEthernet0/0
 nameif outside
 security-level 0
 ip address 192.168.0.101 255.255.255.0
!
interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address 192.168.3.254 255.255.255.0
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 management-only
 nameif management
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
object network inside_to_outside
 subnet 0.0.0.0 0.0.0.0
pager lines 24
logging asdm informational
mtu management 1500
mtu outside 1500
mtu inside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source dynamic inside_to_outside interface
route outside 0.0.0.0 0.0.0.0 192.168.0.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
dhcpd address 192.168.3.2-192.168.3.100 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home reporting anonymous prompt 2
Cryptochecksum:899dbe1df4ea6be0f89cba3137fa3b70
: end
 

 

thanks ~~~~!!!

Review Cisco Networking for a $25 gift card