Log Into The Asdm - Cisco Firepower 1010 Getting Started Manual

Hide thumbs Also See for Firepower 1010:
Table of Contents

Advertisement

Log Into the ASDM

Executing command: exit
Executing command: http server enable
Executing command: http 10.1.1.0 255.255.255.0 management
Executing command: dhcpd address 10.1.1.152-10.1.1.254 management
Executing command: dhcpd enable management
Executing command: logging asdm informational
Factory-default configuration is completed
ciscoasa(config)#
Step 3
Save the default configuration to flash memory.
write memory
Log Into the ASDM
Launch the ASDM so you can configure the ASA.
The ASA includes 3DES capability by default for management access only, so you can connect to the Smart
Software Manager and also use ASDM immediately. You can also use SSH and SCP if you later configure
SSH access on the ASA. Other features that require strong encryption (such as VPN) must have Strong
Encryption enabled, which requires you to first register to the Smart Software Manager.
Note
Before you begin
• See the
Procedure
Step 1
Enter the following URL in your browser.
• https://192.168.1.1—Inside interface IP address.You can connect to the inside address on any inside
• https://192.168.45.1—Management interface IP address.
Note
The Cisco ASDM web page appears. You may see browser security warnings because the ASA does not have
a certificate installed; you can safely ignore these warnings and visit the web page.
Cisco Firepower 1010 Getting Started Guide
178
If you attempt to configure any features that can use strong encryption before you register—even if you only
configure weak encryption—then your HTTPS connection will be dropped on that interface, and you cannot
reconnect. The exception to this rule is if you are connected to a management-only interface, such as
Management 1/1. SSH is not affected. If you lose your HTTPS connection, you can connect to the console
port to reconfigure the ASA, connect to a management-only interface, or connect to an interface not configured
for a strong encryption feature.
ASDM release notes
switch port (Ethernet1/2 through 1/8).
Be sure to specify https://, and not http:// or just the IP address (which defaults to HTTP); the ASA
does not automatically forward an HTTP request to HTTPS.
on Cisco.com for the requirements to run ASDM.
ASA Deployment with ASDM

Advertisement

Table of Contents
loading

Table of Contents