cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2013
Views
5
Helpful
4
Replies

Unable to access ASDM

JAYESH RAMAIYA
Level 1
Level 1

Hi

I have recently upgraded our firewall to 8.4 on our firewall and cannot now access our firewall with through the ASDM. I can ping our firewall via the cmd prompt, and also access it via terraterm. I have cleared the Java cash thoruogh windows control panel but am not able to access the ASDM. I am running ASDM v 1.5, do I need to also upgrade this?

Regards

Jay 

2 Accepted Solutions

Accepted Solutions

Hi Jayesh,

I do not see any ASDM image loaded on your ASA, first you need to download the ASDM image 6.4.7 from here:

http://www.cisco.com/cisco/psn/software/release.html?mdfid=279916854&flowid=4373&softwareid=280775065

You CCO ID needs to have download rights for it.

And then follow this doc:

http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/mgaccess.html#wp1047288

This is how you load the image:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml

The command that you have:

asdm image disk0:/asa843-k8.bin   is wrong

It should be

asdm image disk0:/asdm-647.bin

Hope that helps.

Thanks,

Varun

Thanks,
Varun Rao

View solution in original post

Hi Jayesh,

You would need to used the ASDM 6.4(7) with ASA 8.4(3). Here is a link to the compatibility table:

http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html

Once you have loaded this to the ASA, you would need to change the 'asdm image' command to point to the the ASDM image:

asdm image disk0:/asdm-647.bin

Thanks,

Shilpa

View solution in original post

4 Replies 4

varrao
Level 10
Level 10

Hi Jayesh,

Few basic questions:

What is the software version of  ASDM?

Can you please provide the following outputs:

show run http

show run asdm

show version

This would clarify further.

Thanks,

Varun

Thanks,
Varun Rao

ciscoasa#

ciscoasa# show run

: Saved

:

ASA Version 8.4(3)

!

hostname ciscoasa

domain-name default.domain.invalid

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address dhcp setroute

!

boot system disk0:/asa843-k8.bin

ftp mode passive

dns server-group DefaultDNS

domain-name default.domain.invalid

object network obj-192.168.1.0

subnet 192.168.1.0 255.255.255.0

object network obj-192.172.16.0

subnet 192.172.16.0 255.255.255.0

object network obj_any

subnet 0.0.0.0 0.0.0.0

access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.172.16.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.172.16.0 255.255.255.0

pager lines 24

logging asdm informational

mtu inside 1500

mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asa843-k8.bin

no asdm history enable

arp timeout 14400

nat (inside,any) source static obj-192.168.1.0 obj-192.168.1.0 destination static obj-192.172.16.0 obj-192.172.16.0 no-proxy-arp

!

object network obj_any

nat (inside,outside) dynamic interface

timeout xlate 3:00:00

timeout pat-xlate 0:00:30

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

user-identity default-domain LOCAL

http server enable

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto map outside_map 1 match address outside_1_cryptomap

crypto map outside_map 1 set peer 10.0.0.1

crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA

crypto map outside_map interface outside

no crypto isakmp nat-traversal

crypto ikev1 enable outside

crypto ikev1 policy 10

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd auto_config outside

!

dhcpd address 192.168.1.2-192.168.1.254 inside

dhcpd enable inside

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

tunnel-group 10.0.0.1 type ipsec-l2l

tunnel-group 10.0.0.1 ipsec-attributes

ikev1 pre-shared-key *****

!

!

prompt hostname context

call-home reporting anonymous prompt 2

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:67929009b313ed292b8e99f779ba56b3

: end

ciscoasa# show ver

ciscoasa# show version

Cisco Adaptive Security Appliance Software Version 8.4(3)

Compiled on Fri 06-Jan-12 10:24 by builders

System image file is "disk0:/asa843-k8.bin"

Config file at boot was "startup-config"

ciscoasa up 3 hours 4 mins

Hardware:   ASA5505, 512 MB RAM, CPU Geode 500 MHz

Internal ATA Compact Flash, 128MB

BIOS Flash M50FW016 @ 0xfff00000, 2048KB

Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)

                             Boot microcode        : CN1000-MC-BOOT-2.00

                             SSL/IKE microcode     : CNLite-MC-SSLm-PLUS-2.03

                             IPSec microcode       : CNlite-MC-IPSECm-MAIN-2.06

                             Number of accelerators: 1

0: Int: Internal-Data0/0    : address is 68ef.bdcc.44c5, irq 11

1: Ext: Ethernet0/0         : address is 68ef.bdcc.44bd, irq 255

2: Ext: Ethernet0/1         : address is 68ef.bdcc.44be, irq 255

3: Ext: Ethernet0/2         : address is 68ef.bdcc.44bf, irq 255

4: Ext: Ethernet0/3         : address is 68ef.bdcc.44c0, irq 255

5: Ext: Ethernet0/4         : address is 68ef.bdcc.44c1, irq 255

6: Ext: Ethernet0/5         : address is 68ef.bdcc.44c2, irq 255

7: Ext: Ethernet0/6         : address is 68ef.bdcc.44c3, irq 255

8: Ext: Ethernet0/7         : address is 68ef.bdcc.44c4, irq 255

9: Int: Internal-Data0/1    : address is 0000.0003.0002, irq 255

10: Int: Not used            : irq 255

11: Int: Not used            : irq 255

Licensed features for this platform:

Maximum Physical Interfaces       : 8              perpetual

VLANs                             : 3              DMZ Restricted

Dual ISPs                         : Disabled       perpetual

VLAN Trunk Ports                  : 0              perpetual

Inside Hosts                      : Unlimited      perpetual

Failover                          : Disabled       perpetual

VPN-DES                           : Enabled        perpetual

VPN-3DES-AES                      : Enabled        perpetual

AnyConnect Premium Peers          : 2              perpetual

AnyConnect Essentials             : Disabled       perpetual

Other VPN Peers                   : 10             perpetual

Total VPN Peers                   : 12             perpetual

Shared License                    : Disabled       perpetual

AnyConnect for Mobile             : Disabled       perpetual

AnyConnect for Cisco VPN Phone    : Disabled       perpetual

Advanced Endpoint Assessment      : Disabled       perpetual

UC Phone Proxy Sessions           : 2              perpetual

Total UC Proxy Sessions           : 2              perpetual

Botnet Traffic Filter             : Disabled       perpetual

Intercompany Media Engine         : Disabled       perpetual

This platform has a Base license.

Serial Number: JMX1418405Q

Running Permanent Activation Key: 0x7e36d748 0x1453b782 0xb8c29188 0xa630e498 0x45342ea8

Configuration register is 0x1

Configuration last modified by enable_15 at 04:06:55.239 UTC Fri Mar 30 2012

ciscoasa# show run http

http server enable

http 192.168.1.0 255.255.255.0 inside

ciscoasa#

Hi Jayesh,

I do not see any ASDM image loaded on your ASA, first you need to download the ASDM image 6.4.7 from here:

http://www.cisco.com/cisco/psn/software/release.html?mdfid=279916854&flowid=4373&softwareid=280775065

You CCO ID needs to have download rights for it.

And then follow this doc:

http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/mgaccess.html#wp1047288

This is how you load the image:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008067e9f9.shtml

The command that you have:

asdm image disk0:/asa843-k8.bin   is wrong

It should be

asdm image disk0:/asdm-647.bin

Hope that helps.

Thanks,

Varun

Thanks,
Varun Rao

Hi Jayesh,

You would need to used the ASDM 6.4(7) with ASA 8.4(3). Here is a link to the compatibility table:

http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html

Once you have loaded this to the ASA, you would need to change the 'asdm image' command to point to the the ASDM image:

asdm image disk0:/asdm-647.bin

Thanks,

Shilpa

Review Cisco Networking for a $25 gift card