Unable to use HTTPS Managment “API” on Cisco ASA 9.12Cisco ASA ACL helphttps url filtering on Cisco ASA 5520Unable to save ASA configSSD status on Cisco ASAASA unable to pass ICMP and RDP through internal interfacesASA / WCCP issue with https service group 70Unable to properly configure ASA 5512 with WAN IPUnable to reach public IPs of servers behind ASA 5512Oxidized Unable to Pull Cisco ASA ConfigCisco ASA rekeying

Apt - strange requests to d16r8ew072anqo.cloudfront.net:80

Where's this lookout in Nova Scotia?

Does pair production happen even when the photon is around a neutron?

How to cut a climbing rope?

Does the monk's Martial Arts feature replace the damage die type, the die number, or both?

Melodic minor Major 9 chords

Why did Theresa May offer a vote on a second Brexit referendum?

How to deal with a colleague who is being aggressive?

Efficient Algorithm for the boundary of a set of tiles

Why does Mjolnir fall down in Age of Ultron but not in Endgame?

Did 20% of US soldiers in Vietnam use heroin, 95% of whom quit afterwards?

Why are GND pads often only connected by four traces?

How can I tell if I'm being too picky as a referee?

Parallel fifths in the orchestra

Why didn't Thanos use the Time Stone to stop the Avengers' plan?

How to politely tell someone they did not hit "reply to all" in an email?

Why did the person in charge of a principality not just declare themself king?

Compaq Portable vs IBM 5155 Portable PC

Pirate democracy at its finest

What is the function of the corrugations on a section of the Space Shuttle's external tank?

Is Jon Snow the last of his House?

Website returning plaintext password

Have 1.5% of all nuclear reactors ever built melted down?

Did this character show any indication of wanting to rule before S8E6?



Unable to use HTTPS Managment “API” on Cisco ASA 9.12


Cisco ASA ACL helphttps url filtering on Cisco ASA 5520Unable to save ASA configSSD status on Cisco ASAASA unable to pass ICMP and RDP through internal interfacesASA / WCCP issue with https service group 70Unable to properly configure ASA 5512 with WAN IPUnable to reach public IPs of servers behind ASA 5512Oxidized Unable to Pull Cisco ASA ConfigCisco ASA rekeying













2















After upgrading a Cisco ASA to code version 9.12(1)3, I am unable to reach the HTTPS management interface, which we use for many automation tools.



Example curl that is functional in prior code (9.8 or 9.10):



curl -k -u mah_user https://10.10.10.1/admin/exec/show+version


Now, instead of the output of that command, we are receiving a 400 Bad Request error.



What changed?










share|improve this question


























    2















    After upgrading a Cisco ASA to code version 9.12(1)3, I am unable to reach the HTTPS management interface, which we use for many automation tools.



    Example curl that is functional in prior code (9.8 or 9.10):



    curl -k -u mah_user https://10.10.10.1/admin/exec/show+version


    Now, instead of the output of that command, we are receiving a 400 Bad Request error.



    What changed?










    share|improve this question
























      2












      2








      2








      After upgrading a Cisco ASA to code version 9.12(1)3, I am unable to reach the HTTPS management interface, which we use for many automation tools.



      Example curl that is functional in prior code (9.8 or 9.10):



      curl -k -u mah_user https://10.10.10.1/admin/exec/show+version


      Now, instead of the output of that command, we are receiving a 400 Bad Request error.



      What changed?










      share|improve this question














      After upgrading a Cisco ASA to code version 9.12(1)3, I am unable to reach the HTTPS management interface, which we use for many automation tools.



      Example curl that is functional in prior code (9.8 or 9.10):



      curl -k -u mah_user https://10.10.10.1/admin/exec/show+version


      Now, instead of the output of that command, we are receiving a 400 Bad Request error.



      What changed?







      cisco cisco-asa api






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked 9 hours ago









      Brett LykinsBrett Lykins

      7,46352964




      7,46352964




















          1 Answer
          1






          active

          oldest

          votes


















          3














          As of ASA code 9.12, you must provide a user-agent header with your HTTP requests to the ASA management interface.



          In the ASA code version 9.12 release notes, it specifies the following:




          Allow non-browser-based HTTPS clients to access the ASA



          You can allow non-browser-based HTTPS clients to access HTTPS services on the ASA. By default, ASDM, CSM, and REST API are allowed.



          New/Modified commands: http server basic-auth-client




          What they do not explicitly spell out in this output, is that the ASA management "API" was not previously a supported way to access the ASA. It was intended to be used by the ASDM or their own REST API wrapper.



          In opening it up for "the rest of us" and making it supported behavior (which they needed to do because there is no ASA REST API java applet on the ASA code running on Firepower hardware), they added some new restrictions.



          You can either do one of the following:




          1. Add user-agent headers with a value you specify in http server basic-auth-client <my-user-agent-goes-here>



            • Example config: http server basic-auth-client mah_user_agent

            • Example curl: curl -k -u mah_user -A mah_user_agent https://10.10.10.1/admin/exec/show+version



          2. Use one of the pre-existing/supported user-agent headers:



            • Example curl: curl -k -u mah_user -A ASDM https://10.10.10.1/admin/exec/show+version


          Either one of these will work for you, although I prefer the second as it needs no config changes on the ASA to function.



          It is also worth noting, that in my testing you can also send the user-agent: ASDM header with all prior versions of ASA code as well, they just don't care what you send or set for that value.






          share|improve this answer























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "496"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f59366%2funable-to-use-https-managment-api-on-cisco-asa-9-12%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            3














            As of ASA code 9.12, you must provide a user-agent header with your HTTP requests to the ASA management interface.



            In the ASA code version 9.12 release notes, it specifies the following:




            Allow non-browser-based HTTPS clients to access the ASA



            You can allow non-browser-based HTTPS clients to access HTTPS services on the ASA. By default, ASDM, CSM, and REST API are allowed.



            New/Modified commands: http server basic-auth-client




            What they do not explicitly spell out in this output, is that the ASA management "API" was not previously a supported way to access the ASA. It was intended to be used by the ASDM or their own REST API wrapper.



            In opening it up for "the rest of us" and making it supported behavior (which they needed to do because there is no ASA REST API java applet on the ASA code running on Firepower hardware), they added some new restrictions.



            You can either do one of the following:




            1. Add user-agent headers with a value you specify in http server basic-auth-client <my-user-agent-goes-here>



              • Example config: http server basic-auth-client mah_user_agent

              • Example curl: curl -k -u mah_user -A mah_user_agent https://10.10.10.1/admin/exec/show+version



            2. Use one of the pre-existing/supported user-agent headers:



              • Example curl: curl -k -u mah_user -A ASDM https://10.10.10.1/admin/exec/show+version


            Either one of these will work for you, although I prefer the second as it needs no config changes on the ASA to function.



            It is also worth noting, that in my testing you can also send the user-agent: ASDM header with all prior versions of ASA code as well, they just don't care what you send or set for that value.






            share|improve this answer



























              3














              As of ASA code 9.12, you must provide a user-agent header with your HTTP requests to the ASA management interface.



              In the ASA code version 9.12 release notes, it specifies the following:




              Allow non-browser-based HTTPS clients to access the ASA



              You can allow non-browser-based HTTPS clients to access HTTPS services on the ASA. By default, ASDM, CSM, and REST API are allowed.



              New/Modified commands: http server basic-auth-client




              What they do not explicitly spell out in this output, is that the ASA management "API" was not previously a supported way to access the ASA. It was intended to be used by the ASDM or their own REST API wrapper.



              In opening it up for "the rest of us" and making it supported behavior (which they needed to do because there is no ASA REST API java applet on the ASA code running on Firepower hardware), they added some new restrictions.



              You can either do one of the following:




              1. Add user-agent headers with a value you specify in http server basic-auth-client <my-user-agent-goes-here>



                • Example config: http server basic-auth-client mah_user_agent

                • Example curl: curl -k -u mah_user -A mah_user_agent https://10.10.10.1/admin/exec/show+version



              2. Use one of the pre-existing/supported user-agent headers:



                • Example curl: curl -k -u mah_user -A ASDM https://10.10.10.1/admin/exec/show+version


              Either one of these will work for you, although I prefer the second as it needs no config changes on the ASA to function.



              It is also worth noting, that in my testing you can also send the user-agent: ASDM header with all prior versions of ASA code as well, they just don't care what you send or set for that value.






              share|improve this answer

























                3












                3








                3







                As of ASA code 9.12, you must provide a user-agent header with your HTTP requests to the ASA management interface.



                In the ASA code version 9.12 release notes, it specifies the following:




                Allow non-browser-based HTTPS clients to access the ASA



                You can allow non-browser-based HTTPS clients to access HTTPS services on the ASA. By default, ASDM, CSM, and REST API are allowed.



                New/Modified commands: http server basic-auth-client




                What they do not explicitly spell out in this output, is that the ASA management "API" was not previously a supported way to access the ASA. It was intended to be used by the ASDM or their own REST API wrapper.



                In opening it up for "the rest of us" and making it supported behavior (which they needed to do because there is no ASA REST API java applet on the ASA code running on Firepower hardware), they added some new restrictions.



                You can either do one of the following:




                1. Add user-agent headers with a value you specify in http server basic-auth-client <my-user-agent-goes-here>



                  • Example config: http server basic-auth-client mah_user_agent

                  • Example curl: curl -k -u mah_user -A mah_user_agent https://10.10.10.1/admin/exec/show+version



                2. Use one of the pre-existing/supported user-agent headers:



                  • Example curl: curl -k -u mah_user -A ASDM https://10.10.10.1/admin/exec/show+version


                Either one of these will work for you, although I prefer the second as it needs no config changes on the ASA to function.



                It is also worth noting, that in my testing you can also send the user-agent: ASDM header with all prior versions of ASA code as well, they just don't care what you send or set for that value.






                share|improve this answer













                As of ASA code 9.12, you must provide a user-agent header with your HTTP requests to the ASA management interface.



                In the ASA code version 9.12 release notes, it specifies the following:




                Allow non-browser-based HTTPS clients to access the ASA



                You can allow non-browser-based HTTPS clients to access HTTPS services on the ASA. By default, ASDM, CSM, and REST API are allowed.



                New/Modified commands: http server basic-auth-client




                What they do not explicitly spell out in this output, is that the ASA management "API" was not previously a supported way to access the ASA. It was intended to be used by the ASDM or their own REST API wrapper.



                In opening it up for "the rest of us" and making it supported behavior (which they needed to do because there is no ASA REST API java applet on the ASA code running on Firepower hardware), they added some new restrictions.



                You can either do one of the following:




                1. Add user-agent headers with a value you specify in http server basic-auth-client <my-user-agent-goes-here>



                  • Example config: http server basic-auth-client mah_user_agent

                  • Example curl: curl -k -u mah_user -A mah_user_agent https://10.10.10.1/admin/exec/show+version



                2. Use one of the pre-existing/supported user-agent headers:



                  • Example curl: curl -k -u mah_user -A ASDM https://10.10.10.1/admin/exec/show+version


                Either one of these will work for you, although I prefer the second as it needs no config changes on the ASA to function.



                It is also worth noting, that in my testing you can also send the user-agent: ASDM header with all prior versions of ASA code as well, they just don't care what you send or set for that value.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 9 hours ago









                Brett LykinsBrett Lykins

                7,46352964




                7,46352964



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Network Engineering Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f59366%2funable-to-use-https-managment-api-on-cisco-asa-9-12%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Log på Navigationsmenu

                    Wonderful Copenhagen (sang) Eksterne henvisninger | NavigationsmenurSide på frankloesser.comWonderful Copenhagen

                    Detroit Tigers Spis treści Historia | Skład zespołu | Sukcesy | Członkowie Baseball Hall of Fame | Zastrzeżone numery | Przypisy | Menu nawigacyjneEncyclopedia of Detroit - Detroit TigersTigers Stadium, Detroit, MITigers Timeline 1900sDetroit Tigers Team History & EncyclopediaTigers Timeline 1910s1935 World Series1945 World Series1945 World Series1984 World SeriesComerica Park, Detroit, MI2006 World Series2012 World SeriesDetroit Tigers 40-Man RosterDetroit Tigers Coaching StaffTigers Hall of FamersTigers Retired Numberse