Avatar of Eric_Price
Eric_Price
Flag for United States of America

asked on 

Why cant I connect to my new Cisco ASA5510 with ASDM?

I received two new Cisco ASA 5510s yesterday to replace aging WAN equipment at our facilities. They both have the exact same problem.

Following the directions I  connected the ASA and my laptop to a switch with known good patch cables and assigned my laptop a 192.168.1.2 address. When I tried to launch the ASDM though, regardless of whether I use the java version or the version it installed the first time I connected, it ultimately tells me it cant read the configuration from the equipment, and to check my connection.

I followed some advice on here, and used the good old CLI to manually set the interface names and addresses. To keep from having a conflict with the IP address I need to use on the LAN port I had to disable the DHCP pool and assign a different class C to the management port.

Despite doing that, I still can not connect and use the ASDM software. Is there something in my config thats preventing this from working?The sh run config is below.

Diagnostically...
From a command prompt I can ping my IP and the IP of the management interface.
From a console into the ASA I can ping all the IP addresses (WAN, LAN, Management, laptop) successfully.


sh run
 
: Saved
 
:
 
ASA Version 7.0(8) 
 
!
 
hostname ciscoasa
 
domain-name default.domain.invalid
 
enable password 8Ry2YjIyt7RRXU24 encrypted
 
passwd 2KFQnbNIdI.2KYOU encrypted
 
names
 
dns-guard
 
!
 
interface Ethernet0/0
 
 nameif WAN
 
 security-level 0
 
 ip address 65.168.xx.xx 255.255.255.192 
 
!
 
interface Ethernet0/1
 
 nameif LAN
 
 security-level 100
 
 ip address 192.168.1.254 255.255.255.0 
 
!
 
interface Ethernet0/2
 
 shutdown
 
 no nameif
 
 no security-level
 
<--- More --->
              
 no ip address
 
!
 
interface Ethernet0/3
 
 shutdown
 
 no nameif
 
 no security-level
 
 no ip address
 
!
 
interface Management0/0
 
 nameif management
 
 security-level 100
 
 ip address 192.168.3.1 255.255.255.0 
 
 management-only
 
!
 
ftp mode passive
 
pager lines 24
 
logging asdm informational
 
mtu WAN 1500
 
mtu LAN 1500
 
mtu management 1500
 
no failover
 
asdm image disk0:/asdm-508.bin
 
no asdm history enable
 
arp timeout 14400
 
timeout xlate 3:00:00
 
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
 
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
 
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
 
timeout uauth 0:05:00 absolute
 
http server enable
 
http 192.168.3.0 255.255.255.0 management
 
no snmp-server location
 
no snmp-server contact
 
snmp-server enable traps snmp authentication linkup linkdown coldstart
 
crypto ipsec security-association lifetime seconds 28800
 
crypto ipsec security-association lifetime kilobytes 4608000
 
telnet timeout 5
 
ssh timeout 5
 
console timeout 0
 
dhcpd lease 3600
 
dhcpd ping_timeout 50
 
!
 
class-map inspection_default
 
 match default-inspection-traffic
 
!
 
!
 
policy-map global_policy
 
 class inspection_default
 
  inspect dns maximum-length 512 
 
  inspect ftp 
 
  inspect h323 h225 
 
  inspect h323 ras 
 
  inspect rsh 
 
  inspect rtsp 
 
  inspect esmtp 
 
  inspect sqlnet 
 
  inspect skinny 
 
  inspect sunrpc 
 
  inspect xdmcp 
 
  inspect sip 
 
  inspect netbios 
 
  inspect tftp 
 
!
 
service-policy global_policy global
 
Cryptochecksum:cc45cb827f2a7654860a3f302aa90e71
 
: end
 
 
ciscoasa(config)#

Open in new window

Hardware FirewallsCisco

Avatar of undefined
Last Comment
jaymealbrecht

8/22/2022 - Mon