03-30-2012 05:34 AM - edited 03-11-2019 03:49 PM
Hi
I have recently upgraded our firewall to 8.4 on our firewall and cannot now access our firewall with through the ASDM. I can ping our firewall via the cmd prompt, and also access it via terraterm. I have cleared the Java cash thoruogh windows control panel but am not able to access the ASDM. I am running ASDM v 1.5, do I need to also upgrade this?
Regards
Jay
Solved! Go to Solution.
03-30-2012 07:27 AM
Hi Jayesh,
I do not see any ASDM image loaded on your ASA, first you need to download the ASDM image 6.4.7 from here:
You CCO ID needs to have download rights for it.
And then follow this doc:
http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/mgaccess.html#wp1047288
This is how you load the image:
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml
The command that you have:
asdm image disk0:/asa843-k8.bin is wrong
It should be
asdm image disk0:/asdm-647.bin
Hope that helps.
Thanks,
Varun
04-01-2012 08:10 PM
Hi Jayesh,
You would need to used the ASDM 6.4(7) with ASA 8.4(3). Here is a link to the compatibility table:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
Once you have loaded this to the ASA, you would need to change the 'asdm image' command to point to the the ASDM image:
asdm image disk0:/asdm-647.bin
Thanks,
Shilpa
03-30-2012 05:37 AM
Hi Jayesh,
Few basic questions:
What is the software version of ASDM?
Can you please provide the following outputs:
show run http
show run asdm
show version
This would clarify further.
Thanks,
Varun
03-30-2012 07:19 AM
ciscoasa#
ciscoasa# show run
: Saved
:
ASA Version 8.4(3)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
boot system disk0:/asa843-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
object network obj-192.168.1.0
subnet 192.168.1.0 255.255.255.0
object network obj-192.172.16.0
subnet 192.172.16.0 255.255.255.0
object network obj_any
subnet 0.0.0.0 0.0.0.0
access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.172.16.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.172.16.0 255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asa843-k8.bin
no asdm history enable
arp timeout 14400
nat (inside,any) source static obj-192.168.1.0 obj-192.168.1.0 destination static obj-192.172.16.0 obj-192.172.16.0 no-proxy-arp
!
object network obj_any
nat (inside,outside) dynamic interface
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set peer 10.0.0.1
crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA
crypto map outside_map interface outside
no crypto isakmp nat-traversal
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.1.2-192.168.1.254 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
tunnel-group 10.0.0.1 type ipsec-l2l
tunnel-group 10.0.0.1 ipsec-attributes
ikev1 pre-shared-key *****
!
!
prompt hostname context
call-home reporting anonymous prompt 2
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:67929009b313ed292b8e99f779ba56b3
: end
ciscoasa# show ver
ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 8.4(3)
Compiled on Fri 06-Jan-12 10:24 by builders
System image file is "disk0:/asa843-k8.bin"
Config file at boot was "startup-config"
ciscoasa up 3 hours 4 mins
Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz
Internal ATA Compact Flash, 128MB
BIOS Flash M50FW016 @ 0xfff00000, 2048KB
Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)
Boot microcode : CN1000-MC-BOOT-2.00
SSL/IKE microcode : CNLite-MC-SSLm-PLUS-2.03
IPSec microcode : CNlite-MC-IPSECm-MAIN-2.06
Number of accelerators: 1
0: Int: Internal-Data0/0 : address is 68ef.bdcc.44c5, irq 11
1: Ext: Ethernet0/0 : address is 68ef.bdcc.44bd, irq 255
2: Ext: Ethernet0/1 : address is 68ef.bdcc.44be, irq 255
3: Ext: Ethernet0/2 : address is 68ef.bdcc.44bf, irq 255
4: Ext: Ethernet0/3 : address is 68ef.bdcc.44c0, irq 255
5: Ext: Ethernet0/4 : address is 68ef.bdcc.44c1, irq 255
6: Ext: Ethernet0/5 : address is 68ef.bdcc.44c2, irq 255
7: Ext: Ethernet0/6 : address is 68ef.bdcc.44c3, irq 255
8: Ext: Ethernet0/7 : address is 68ef.bdcc.44c4, irq 255
9: Int: Internal-Data0/1 : address is 0000.0003.0002, irq 255
10: Int: Not used : irq 255
11: Int: Not used : irq 255
Licensed features for this platform:
Maximum Physical Interfaces : 8 perpetual
VLANs : 3 DMZ Restricted
Dual ISPs : Disabled perpetual
VLAN Trunk Ports : 0 perpetual
Inside Hosts : Unlimited perpetual
Failover : Disabled perpetual
VPN-DES : Enabled perpetual
VPN-3DES-AES : Enabled perpetual
AnyConnect Premium Peers : 2 perpetual
AnyConnect Essentials : Disabled perpetual
Other VPN Peers : 10 perpetual
Total VPN Peers : 12 perpetual
Shared License : Disabled perpetual
AnyConnect for Mobile : Disabled perpetual
AnyConnect for Cisco VPN Phone : Disabled perpetual
Advanced Endpoint Assessment : Disabled perpetual
UC Phone Proxy Sessions : 2 perpetual
Total UC Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Intercompany Media Engine : Disabled perpetual
This platform has a Base license.
Serial Number: JMX1418405Q
Running Permanent Activation Key: 0x7e36d748 0x1453b782 0xb8c29188 0xa630e498 0x45342ea8
Configuration register is 0x1
Configuration last modified by enable_15 at 04:06:55.239 UTC Fri Mar 30 2012
ciscoasa# show run http
http server enable
http 192.168.1.0 255.255.255.0 inside
ciscoasa#
03-30-2012 07:27 AM
Hi Jayesh,
I do not see any ASDM image loaded on your ASA, first you need to download the ASDM image 6.4.7 from here:
You CCO ID needs to have download rights for it.
And then follow this doc:
http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/mgaccess.html#wp1047288
This is how you load the image:
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml
The command that you have:
asdm image disk0:/asa843-k8.bin is wrong
It should be
asdm image disk0:/asdm-647.bin
Hope that helps.
Thanks,
Varun
04-01-2012 08:10 PM
Hi Jayesh,
You would need to used the ASDM 6.4(7) with ASA 8.4(3). Here is a link to the compatibility table:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
Once you have loaded this to the ASA, you would need to change the 'asdm image' command to point to the the ASDM image:
asdm image disk0:/asdm-647.bin
Thanks,
Shilpa
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide