Rajkumar Kamath
asked on
access ASDM on cisco asa 5505
Good Day,
I have asa 5505 on which i would like to access asdm. when i try https://x.x.x.x , it doesnt launch asdm , however it goes and prompts me to enter username and password
i can do telnet to asa from one of the server machines which i have allowed on the asa. login to enable mode and do whatever changes required.
i have http enable
http 0.0.0.0 0.0.0.0 inside
on the asa , when i do sh run.
apart from that not sure what else to. it used to work before. appreciate assistance.
I have asa 5505 on which i would like to access asdm. when i try https://x.x.x.x , it doesnt launch asdm , however it goes and prompts me to enter username and password
i can do telnet to asa from one of the server machines which i have allowed on the asa. login to enable mode and do whatever changes required.
i have http enable
http 0.0.0.0 0.0.0.0 inside
on the asa , when i do sh run.
apart from that not sure what else to. it used to work before. appreciate assistance.
ASKER
how can i check what username its asking for. i know both login and enable password to login to asa.
thanks
thanks
you can provide the same username which you are using for telnet access.
ASKER
there is no user. all i get is prompt for passwords and thats it. last time , we had disabled no transport input all. not sure if that has got anything to do with it,tried creating a user with priv 15 level. it still doesnt login and shows invalid login .
thanks
thanks
can you run the below command in ASA and paste the output here
#sh run | i http
#sh run | i username
#sh run | i enable
#dir
#sh run | i http
#sh run | i username
#sh run | i enable
#dir
ASKER
sh run
----------
port-object eq https
access-list outside-in extended permit tcp any host 83.xxx.xx.xxx eq https
http server enable
http 0.0.0.0 0.0.0.0 inside
group-url https://83.xxx.xx.yyy/anyconnect enable\
sh enable
-------------
enable password 6R0pKvAZdKXDZYJ8 encrypted
logging enable
no asdm history enable
http server enable
crypto isakmp enable outside
crypto isakmp enable inside
crypto isakmp enable inside2
dhcpd enable inside2
enable outside
enable inside
enable inside2
svc enable
group-alias VPN enable
group-alias anyconnect enable
group-url https://83.xxx.xxxx.xxx/anyconnect enable
sh user
----------
username "user" password GdjlykRzleZgWT/i encrypted privilege 15
username "user" attributes
----------
port-object eq https
access-list outside-in extended permit tcp any host 83.xxx.xx.xxx eq https
http server enable
http 0.0.0.0 0.0.0.0 inside
group-url https://83.xxx.xx.yyy/anyconnect enable\
sh enable
-------------
enable password 6R0pKvAZdKXDZYJ8 encrypted
logging enable
no asdm history enable
http server enable
crypto isakmp enable outside
crypto isakmp enable inside
crypto isakmp enable inside2
dhcpd enable inside2
enable outside
enable inside
enable inside2
svc enable
group-alias VPN enable
group-alias anyconnect enable
group-url https://83.xxx.xxxx.xxx/anyconnect enable
sh user
----------
username "user" password GdjlykRzleZgWT/i encrypted privilege 15
username "user" attributes
all the required options are configured on the ASA. the config looks OK
while you type https://<asa inside ip>. username "user" should accept
while you type https://<asa inside ip>. username "user" should accept
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Once the password is right, you can see an option to download ASDM
checkout this url for more info
https://supportforums.cisco.com/document/102461/how-access-cisco-asa-using-asdm