This document describes how to access the Cisco Adaptive Security Device Manager (ASDM) and the WebVPN portal when they are both enabled on the same interface of the Cisco 5500 Series Adaptive Security Appliance (ASA).
Cisco recommends that you have knowledge of these topics:
The information in this document is based on the Cisco 5500 Series ASA.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Refer to Cisco Technical Tips Conventions for more information on document conventions.
In ASA versions earlier than Version 8.0(2), ASDM and WebVPN cannot be enabled on the same interface of the ASA, as both listen on the same port (443) by default. In Versions 8.0(2) and later, the ASA supports both clientless Secure Sockets Layer (SSL) VPN (WebVPN) sessions and ASDM administrative sessions simultaneously on Port 443 of the outside interface. However, when both services are enabled together, the default URL for a particular interface on the ASA always defaults to the WebVPN service. For example, consider this ASA configuration data:
rtpvpnoutbound6# show run ip
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 10.150.172.46 255.255.252.0
!
interface Vlan3
nameif dmz
security-level 50
ip address dhcp
!
interface Vlan5
nameif test
security-level 0
ip address 1.1.1.1 255.255.255.255 pppoe setroute
!
rtpvpnoutbound6# show run web
webvpn
enable outside
enable dmz
anyconnect image disk0:/anyconnect-win-3.1.06078-k9.pkg 1
anyconnect image disk0:/anyconnect-macosx-i386-3.1.06079-k9.pkg 2
anyconnect enable
tunnel-group-list enable
tunnel-group-preference group-url
rtpvpnoutbound6# show run http
http server enable
http 192.168.1.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 dmz
http 0.0.0.0 0.0.0.0 outside
rtpvpnoutbound6# show run tun
tunnel-group DefaultWEBVPNGroup general-attributes
address-pool ap_fw-policy
authentication-server-group ldap2
tunnel-group DefaultWEBVPNGroup webvpn-attributes
group-url https://rtpvpnoutbound6.cisco.com/admin enable
without-csd
In order to resolve this issue, you can either use the appropriate URL in order to access the respective service or change the port on which the services are accessed.
In the example configuration data provided in the Problem section, the outside interface of the ASA can be reached by HTTPS via these two URLs:
https://<ip-address> <=> https://10.150.172.46
https://<domain-name> <=> https://rtpvpnoutbound6.cisco.com
However, if you attempt to access these URLs while WebVPN service is enabled, the ASA redirects you to the WebVPN portal:
https://rtpvpnoutbound6.cisco.com/+CSCOE+/logon.html
In order to access ASDM, you can use this URL:
https://rtpvpnoutbound6.cisco.com/admin
This section describes how to change the port for both the ASDM and WebVPN services.
Complete these steps in order to change the port for the ASDM service:
ASA(config)#http server enable <1-65535>Here is an example:
configure mode commands/options:
<1-65535> The management server's SSL listening port. TCP port 443 is the
default.
ASA(config)#http server enable 65000
https://interface_ip_address:<customized port number>Here is an example:
https://192.168.1.1:65000
Complete these steps in order to change the port for the WebVPN service:
ASA(config)#webvpn
ASA(config-webvpn)#enable outside
ASA(config-webvpn)#port <1-65535>
webvpn mode commands/options:
<1-65535> The WebVPN server's SSL listening port. TCP port 443 is the
default.
ASA(config)#webvpn
ASA(config-webvpn)#enable outside
ASA(config-webvpn)#port 65010
https://interface_ip_address:<customized port number>Here is an example:
https://192.168.1.1:65010
Revision | Publish Date | Comments |
---|---|---|
1.0 |
23-Mar-2015 |
Initial Release |