02-18-2020 04:48 AM - edited 02-21-2020 09:55 AM
Dear Team,
I have new cisco firepower 2120 asa and i can acess https and asdm via default management port and IP address(192.168.45.1)
I have set inside interface address with address 10.x.x.x and allow https/asdm but cannot access via this interface, could you please hep me to solve this issue?
Thank you very much.
02-18-2020 02:19 PM
02-18-2020 05:30 PM - edited 02-18-2020 06:16 PM
02-19-2020 01:25 AM
Ok.
If you look at the error in the browser it indicates "Cannot communicate securely with peer: no common algorithms" - have a look at this to resolve. I am not sure why you can connect with the mgmt interface though.
02-21-2020 01:35 AM
Dear RJI,
yes, i have tried to add asa inside address to allow list in firefox, IE, and chrome and configure tls as your guide but problem still same.
i also tried to configure ssl vpn and when i access to outside interface --> the problem seem that same as inside interface, please see my attached image. do i need to configure ssl/certificate on my ASA?
thank you very much
02-21-2020 01:51 AM
02-21-2020 02:14 AM
02-23-2020 06:52 PM
I have found this topic but not sure it will solve my issue or not.
i'm waiting local vendor to support get license because Cisco website inform that my device SN was not existing.
https://community.cisco.com/t5/network-security/dont-enable-asdm/td-p/3031164
03-23-2020 11:53 PM
My problem has solved after enable 3DES license. Thank you all for your support.
02-23-2020 07:35 PM
@hinhnm you have:
http 192.168.1.0 255.255.255.0 inside
...but all your inside routes are for 10.164.x.x. subnets. Thus the ASA won't use the proper interface to return incoming traffic from 192.169.1.0/24 that arrives on the inside interface.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide