Avatar of Eric_Price
Flag for United States of America

asked on 

Why cant I connect to my new Cisco ASA5510 with ASDM?

I received two new Cisco ASA 5510s yesterday to replace aging WAN equipment at our facilities. They both have the exact same problem.

Following the directions I  connected the ASA and my laptop to a switch with known good patch cables and assigned my laptop a address. When I tried to launch the ASDM though, regardless of whether I use the java version or the version it installed the first time I connected, it ultimately tells me it cant read the configuration from the equipment, and to check my connection.

I followed some advice on here, and used the good old CLI to manually set the interface names and addresses. To keep from having a conflict with the IP address I need to use on the LAN port I had to disable the DHCP pool and assign a different class C to the management port.

Despite doing that, I still can not connect and use the ASDM software. Is there something in my config thats preventing this from working?The sh run config is below.

From a command prompt I can ping my IP and the IP of the management interface.
From a console into the ASA I can ping all the IP addresses (WAN, LAN, Management, laptop) successfully.

sh run
: Saved
ASA Version 7.0(8) 
hostname ciscoasa
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface Ethernet0/0
 nameif WAN
 security-level 0
 ip address 65.168.xx.xx 
interface Ethernet0/1
 nameif LAN
 security-level 100
 ip address 
interface Ethernet0/2
 no nameif
 no security-level
<--- More --->
 no ip address
interface Ethernet0/3
 no nameif
 no security-level
 no ip address
interface Management0/0
 nameif management
 security-level 100
 ip address 
ftp mode passive
pager lines 24
logging asdm informational
mtu WAN 1500
mtu LAN 1500
mtu management 1500
no failover
asdm image disk0:/asdm-508.bin
no asdm history enable
arp timeout 14400
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 50
class-map inspection_default
 match default-inspection-traffic
policy-map global_policy
 class inspection_default
  inspect dns maximum-length 512 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
  inspect sip 
  inspect netbios 
  inspect tftp 
service-policy global_policy global
: end

Open in new window

Hardware FirewallsCisco

Avatar of undefined
Last Comment

8/22/2022 - Mon