cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
29767
Views
4
Helpful
1
Replies

Cisco ASA 5505 - cannot connect to ASDM

brycekmartin
Level 1
Level 1

I have recently inherited a few networking responsibilities in an SMB network.  Nothing overly complicated. Here's my issue, there is an ASA 5505 used for VPN and in the near future a DMZ.  I can connect via the console but I'd rather use ASDM.  The problem is that I can't get it to connect.  VLAN 1 (Inside) has an address of 192.168.200.254.  This is in ethernet 0/0.  I have a laptop plugged into ethernet 0/4 and the laptop has an address on the same x.x.200 VLAN.  I can ping the VLAN1 address, but I can't use http://192.168.200.254/admin to get to ASDM. 

Any thoughts on how I can do this?  What I should check?  Can the internal webserver that hosts the ASDM be turned off?

Thanks for any help.  If you need any more information just let me know.  This is my first real network wrangle so bear with me on this. 

Thanks

Bryce

1 Accepted Solution

Accepted Solutions

p.mcgowan
Level 3
Level 3

you will need to configure the subnet you have configured on e0/4 as a management subnet in CLI before you can access ASDM from this subnet.

lets say you have called e0/4 DMZ and have allocated 10.10.200.0/24

enter the following config;

http server enable

http 10.10.200.0 255.255.255.0 DMZ

this will allow http access from 10.10.200.0/25 via interface DMZ

the following doc is a good reference;

http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html#wp1047288

Please rate is useful

View solution in original post

1 Reply 1

p.mcgowan
Level 3
Level 3

you will need to configure the subnet you have configured on e0/4 as a management subnet in CLI before you can access ASDM from this subnet.

lets say you have called e0/4 DMZ and have allocated 10.10.200.0/24

enter the following config;

http server enable

http 10.10.200.0 255.255.255.0 DMZ

this will allow http access from 10.10.200.0/25 via interface DMZ

the following doc is a good reference;

http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_management.html#wp1047288

Please rate is useful

Review Cisco Networking for a $25 gift card