cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1237
Views
3
Helpful
11
Replies

I can't open Http and ASDM

ishan patel
Level 1
Level 1

Hello Everyone,

 

I am not able to open http and ASDM. can someone guide me what causing the issue.

 

FYI: 

CISCOASA: 5510

ASDM file into dir (disk0:/): asdm-782.bin

ASA5510# sh asdm image
Device Manager image file, disk0:/asdm-782.bin

http server enable

http 0.0.0.0 0.0.0.0 inside

If anyone has an idea what this might cause (and fix) please let me know

 

Thanks in Advance

 

 

11 Replies 11

Hi

 take a look on the Java configurarion on your machine. Make sure you dont need to add the firewall IP address among the trusted site list.

Can you please let me know what java config? firewall IP mean ?

Your PC.  The browser to be specific

HI Flavio,

I tried everything looks on browser side. I have attached log file cisco ASA. it's look like something blocking. could you please let me know what could be issue or something else?

ishanpatel_0-1680007317472.png

I setup access-list

access-list 1 permit tcp any any

int eth 0/1 (inside interface)

access-group 1 in interface inside

PC address: 10.16.200.1/24

Inside interface: 10.16.0.200/24

 

 

 

Hi

 Well, if I understood your problem, you are not able to open the ASDM on your machine, right? 

If you are using windows machine, you need to check this config right here. Add the ASA ip address among the exceptions sites.

 To get to this config page just go to the windows search and type Java

java.JPG

Hi Flavio,

As per your suggestion, I added into JAVA but the HTTP page don't want to load.

When I checked logs on ASA: 

ishanpatel_0-1680096260798.png

Do I need to configured ACL or NAT rule? Please advise.

This is my configuration:

ASA(config)# show  running-config
: Saved
:
ASA Version 8.2(5)41
!
hostname ASA
domain-name denville1.org
enable password PVSASRJovmamnVkD encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
speed 1000
duplex full
nameif outside
security-level 0
ip address 192.168.0.25 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 10.16.0.200 255.255.0.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
ftp mode passive
dns domain-lookup outside
dns server-group DefaultDNS
domain-name denville1.org
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
pager lines 24
logging enable
logging timestamp
logging list vpn level warnings class vpdn
logging buffer-size 512000
logging console errors
logging monitor debugging
logging buffered informational
logging trap informational
logging asdm notifications
logging mail critical
logging from-address OldASA@denville.org
logging recipient-address wdavison@denville.org level errors
logging host inside 10.16.100.30
logging class auth trap informational
logging class vpn trap warnings
no logging message 106006
no logging message 419002
no logging message 106023
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool asapool 192.168.254.11-192.168.254.199 mask 255.255.255.0
ip local pool newremotepool 10.16.200.10-10.16.200.50 mask 255.255.0.0
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-7101.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface www 10.16.200.1 https netmask 255.255.255.255 tcp 1000 100 udp 100
route outside 0.0.0.0 0.0.0.0 192.168.0.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
aaa authentication serial console LOCAL
aaa authentication http console LOCAL
http server enable
http server idle-timeout 120
http server session-timeout 120
http 192.168.1.0 255.255.255.0 management
http 0.0.0.0 0.0.0.0 outside
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 outside
ssh 192.168.0.25 255.255.255.255 outside
ssh 10.16.200.1 255.255.255.255 inside
ssh timeout 15
ssh version 2
console timeout 0
dhcpd address 10.16.200.1-10.16.200.100 inside
dhcpd dns 8.8.8.8 interface inside
dhcpd enable inside
!
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
tftp-server inside 10.16.200.1 backup
webvpn
username admin password eY/fQXw7Ure8Qrz7 encrypted privilege 15
!
class-map global_policy
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
 message-length maximum client auto
 message-length maximum 512
policy-map global_policy
class inspection_default
 inspect dns preset_dns_map
 inspect ftp
 inspect h323 h225
 inspect h323 ras
 inspect rsh
 inspect rtsp
 inspect esmtp
 inspect sqlnet
 inspect skinny
 inspect sunrpc
 inspect xdmcp
 inspect sip
 inspect netbios
 inspect tftp
 inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:f7208ed84f97f1991d62a1bae33e40ad
: end

 

Hi

 Your config looks good. All the necessary config I am aware of is there, but the log you are sharing is not related to the ASDM. As you can see on the logs it is related to TLS connection .

 If you are using HTTP there is not TLS involved.  If you are using HTTPS then you need to add on your Java also

https://92.168.1.1

management-access <<- add this to inside and check again 

How to add management- access?

Could you please send me some basic steps?

 

Thanks in advance!

interface Ethernet0/1
nameif inside
security-level 100
ip address 10.16.0.200 255.255.0.0

 management- access

ishan patel
Level 1
Level 1

Hi Everyone,

I tried all config. 

HI,

 

Can anyone help me to download or share ASDM for ASA5510?

Currently I am running ASA5510 with asa 825-41-k8.bin and I have missing asdm image.

I can't download ASDM from cisco because I don't have Enterprise Agreement.

 

Can someone help me or share? I did google but no luck.

Thanks 

Review Cisco Networking for a $25 gift card