Cisco 5505 Administration Guide - Page 95

Monitoring and Maintaining the AnyConnect Client, Viewing AnyConnect Client and SSL VPN Sessions - vlan

Page 95 highlights

9 C H A P T E R Monitoring and Maintaining the AnyConnect Client This chapter describes some common maintenance and monitoring procedures for network administrators dealing with the Cisco AnyConnect Client. You perform these procedures on the security appliance: • Viewing AnyConnect Client and SSL VPN Sessions, page 9-1 • Adjusting MTU Size Using ASDM, page 9-2 • Logging Off AnyConnect Client Sessions, page 9-3 • Updating AnyConnect Client and SSL VPN Client Images, page 9-4 Viewing AnyConnect Client and SSL VPN Sessions You can view information about active sessions using the show vpn-sessiondb command in privileged EXEC mode: show vpn-sessiondb svc The following example shows the output of the show vpn-sessiondb svc command: hostname# show vpn-sessiondb svc Session Type: SVC Username : testuser Index : 17 Assigned IP : 209.165.200.224 Public IP : 192.168.23.45 Protocol : Clientless SSL-Tunnel DTLS-Tunnel Encryption : RC4 AES128 Hashing : SHA1 Bytes Tx : 17457 Bytes Rx : 69502 Group Policy : GroupPolicy Tunnel Group : CertGroup Login Time : 15:19:57 EDT Fri May 25 2007 Duration : 0h:04m:27s NAC Result : Unknown VLAN Mapping : N/A VLAN : none To see more detailed information, including the number of AnyConnect (SSL VPN) tunnels, DTLS tunnels, and Clientless tunnels, use the command show vpn-sessiondb detail svc. OL-12950-012 Cisco AnyConnect VPN Client Administrator Guide 9-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

CHAPTER
9-1
Cisco AnyConnect VPN Client Administrator Guide
OL-12950-012
9
Monitoring and Maintaining the AnyConnect
Client
This chapter describes some common maintenance and monitoring procedures for network
administrators dealing with the Cisco AnyConnect Client. You perform these procedures on the security
appliance:
Viewing AnyConnect Client and SSL VPN Sessions, page 9-1
Adjusting MTU Size Using ASDM, page 9-2
Logging Off AnyConnect Client Sessions, page 9-3
Updating AnyConnect Client and SSL VPN Client Images, page 9-4
Viewing AnyConnect Client and SSL VPN Sessions
You can view information about active sessions using the
show
vpn-sessiondb
command in privileged
EXEC mode:
show vpn-sessiondb svc
The following example shows the output of the
show vpn-sessiondb svc
command:
hostname#
show vpn-sessiondb svc
Session Type: SVC
Username
: testuser
Index
: 17
Assigned IP
: 209.165.200.224
Public IP
: 192.168.23.45
Protocol
: Clientless SSL-Tunnel DTLS-Tunnel
Encryption
: RC4 AES128
Hashing
: SHA1
Bytes Tx
: 17457
Bytes Rx
: 69502
Group Policy : GroupPolicy
Tunnel Group : CertGroup
Login Time
: 15:19:57 EDT Fri May 25 2007
Duration
: 0h:04m:27s
NAC Result
: Unknown
VLAN Mapping : N/A
VLAN
: none
To see more detailed information, including the number of AnyConnect (SSL VPN) tunnels, DTLS
tunnels, and Clientless tunnels, use the command
show vpn-sessiondb detail svc
.