Cisco Cisco ASA 5580 Adaptive Security Appliance Guida Alla Risoluzione Dei Problemi
ASA Connection Problems to the Cisco Adaptive
Security Device Manager
Security Device Manager
Document ID: 116403
Contributed by Ishwinder Cheema and Jay Johnston, Cisco TAC
Engineers.
Jul 31, 2013
Engineers.
Jul 31, 2013
Contents
Introduction
Prerequisites
Requirements
Components Used
Troubleshooting Methodology
ASA Configuration
ASDM Image in Flash
ASDM Image in Use
HTTP Server Restrictions
Other Possible Configuration Issues
Network Connectivity
Application Software
Run Commands with HTTPS
Related Information
Prerequisites
Requirements
Components Used
Troubleshooting Methodology
ASA Configuration
ASDM Image in Flash
ASDM Image in Use
HTTP Server Restrictions
Other Possible Configuration Issues
Network Connectivity
Application Software
Run Commands with HTTPS
Related Information
Introduction
This document provides the troubleshooting methodology necessary to examine issues faced when you
access/configure the Cisco Adaptive Security Appliance (ASA) with Cisco Adaptive Security Device
Manager (ASDM). ASDM delivers security management and monitoring services for security appliances
through a graphical management interface.
access/configure the Cisco Adaptive Security Appliance (ASA) with Cisco Adaptive Security Device
Manager (ASDM). ASDM delivers security management and monitoring services for security appliances
through a graphical management interface.
Prerequisites
Requirements
The scenarios, symptoms, and steps listed in this document are written for troubleshooting issues after the
initial configuration is set up on the ASA. For the initial configuration, refer to the Configuring ASDM
Access for Appliances section of the Cisco ASA Series General Operations ASDM Configuration Guide, 7.1.
initial configuration is set up on the ASA. For the initial configuration, refer to the Configuring ASDM
Access for Appliances section of the Cisco ASA Series General Operations ASDM Configuration Guide, 7.1.
This document uses the ASA CLI for troubleshooting, which requires Secure Shell (SSH)/Telnet/Console
access to the ASA.
access to the ASA.
Components Used
The information in this document is based on the ASDM and ASA.
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, make sure
devices used in this document started with a cleared (default) configuration. If your network is live, make sure