cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1307
Views
0
Helpful
4
Replies

Unable to configure ASDM with ASA firewall.

Team,

I am struggling while configuring ASDM with my cisco firepower 2130 firewall it is on ASA mod.

 

My firewall is on 10.1.2.0 subnet and I am setting in the subnet which is 10.1.57.0 right now I am unable to access my firewall which IP addresses are 10.1.2.1 due to security restrictions.

 

I just want to enable ASDM service and also want to access it via a 10.1.57.0 subnet.

 

Right now the firewall is as ASA mode(CLI) its hard for me to manage it via command line. 

 

Please guide how can I do this. An image is also attached to this post.

 

I run the below commands for your reference but it's not work

 

To enable ASDM:

http 10.1.57.0 255.255.255.0 inlinemgmta        (Name of interface Port-channel1.2)

 

access-list outside.in extended permit tcp host 10.1.2.1 host 10.1.57.101 eq http

 

Note: The HTTP server is already enabled.

4 Replies 4

Issue the command show run http. Do you see the command http enable listed there?

Are you able to ping 10.1.2.1? If not make sure that routing is in place.  Keep in mind that you can only administer the ASA on an ingress interface, that is only the interface where the management traffic is entering.  You cannot access the ASA on a different interface than the one the administrative traffic is entering.

--
Please remember to select a correct answer and rate helpful posts

Hi,

output of the show run command:

http 0.0.0.0 0.0.0.0 outside

http 10.1.1.0 255.255.255.0 oob

 

Forget about everything. Giving you the below scenario for your understanding.

 

I am setting in the subnet 10.1.2.x and IP address of my ASA firewall are 10.1.2.1

and I am able to directly connect via (telnet/ping) with my Cisco Firepower firewall which is acting as ASA mod.

 

now please tell me how can I able to configure ASDM I want to enable ASDM so that i can be able to access it via GUI.

 

  http 10.1.2.0 255.255.255.0 inside

Images

You need to add the command http 10.1.2.0 255.255.255.0 <interface> where interface is the interface that 10.1.2.0/24 is reachable from.  If that is the inside interface then http 10.1.2.0 255.255.255.0 inside is the command you need.

 

--
Please remember to select a correct answer and rate helpful posts
Review Cisco Networking for a $25 gift card