Cisco ASA Troubleshooting Commands - Itsecworks
Cisco ASA Troubleshooting Commands - Itsecworks
RSS Subscribe:
RSS feed
itsecworks
It is all about security and co I have already met
22
i
42 Votes
With my requirements for any networking layer 3 security device I collected the basic commands that you have to know or you will not
be able to manage your device.
5.1 Sniffertrace
5.2 Test traffic through the firewall
5.3 Test tcp traffic from the firewall
Configure logging
Viewing the logs
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 1/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
To see the actual software version, operational mode, HA, etc and the system time:
Number of accelerators: 1
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 2/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Total UC Proxy Sessions : 2 perpetual
Active None
dmz5: Failed
inside: Failed
====Configuration State===
Sync Done
====Communication State===
Mac set
To see what the firewall has seen so far, the traffic mix conserning the enabled inspections:
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 3/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
myfirewall/pri/act(config)# sh service-policy
Global policy:
Service-policy: global_policy
Class-map: inspection_default
myfirewall/pri/act(config)#
myfirewall/pri/act(config)#
myfirewall/pri/act(config)# sh memory
------------- ------------------
...
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 4/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
myfirewall/pri/act# show processes internals
1 0 0.025 block_diag
1 0 0.012 CF OIR
1 0 0.001 lina_int
64 63 0.104 aaa_shim_thread
...
myfirewall/pri/act(config)# sh perfmon
N/A 100.00%
to get the High Availability state info with show failover command:
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 5/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
descriptor Show failover interface descriptors. Two numbers are shown for
the show output from both units and verify that the numbers
match.
| Output modifiers
Failover On
Interface Policy 1
slot 1: empty
slot 1: empty
up time 0 0 0 0
RPC services 0 0 0 0
Xlate_Timeout 0 0 0 0
IPv6 ND tbl 0 0 0 0
VPN IKEv1 SA 0 0 0 0
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 6/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
VPN IKEv1 P2 0 0 0 0
VPN IKEv2 SA 0 0 0 0
VPN IKEv2 P2 0 0 0 0
SIP Session 0 0 0 0
User-Identity 5 0 1 0
CTS SGTNAME 0 0 0 0
CTS PAC 0 0 0 0
TrustSec-SXP 0 0 0 0
IPv6 Route 0 0 0 0
Recv Q: 0 88 2453116
Xmit Q: 0 29 381560801
My IP Address : 192.168.92.109
==========================================================================
==========================================================================
Active Drain Active Applying Config HELLO not heard from mate
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 7/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Active Applying Config Active Config Applied HELLO not heard from mate
==========================================================================
Active None
dmz5: Failed
inside: Failed
====Configuration State===
Sync Done
====Communication State===
Mac set
tx:384585696
rx:29127977
failover
failover interface-policy 1
With class-map you can set the maximum session for a specific traffic or generally with any:
The values from the session table of the firewall (the max against the used if configured):
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 8/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
from-the-box
server
| Output modifiers
WORD Enter any number of the following conn states using ',' as separator:
TCP dmz5 192.168.38.250:4634 inside 172.24.1.2:54320, idle 0:02:29, bytes 12905, flags UIOB
TCP dmz5 192.168.38.250:4633 inside 172.24.1.2:135, idle 0:02:29, bytes 684, flags UIOB
TCP dmz6 192.168.47.8:80 dmz5 192.168.37.227:55335, idle 0:00:00, bytes 1618307080, flags UIOB
TCP dmz6 192.168.47.10:80 dmz5 192.168.37.227:65521, idle 0:00:00, bytes 61797243, flags UIOB
TCP dmz6 192.168.47.11:80 dmz5 192.168.37.227:55339, idle 0:00:00, bytes 3811666664, flags UIOB
TCP dmz5 192.168.36.251:80 inside 172.31.229.68:62940, idle 0:00:00, bytes 335503, flags UIO
TCP dmz5 192.168.36.251:80 inside 172.24.162.217:57429, idle 0:00:00, bytes 474510, flags UIO
TCP dmz5 192.168.38.250:23757 inside 172.24.3.38:1165, idle 0:00:00, bytes 59747307, flags UIO
TCP dmz5 192.168.38.250:3389 inside 192.168.252.66:4042, idle 0:00:48, bytes 337870, flags UIO
TCP dmz5 192.168.38.250:23757 inside 172.24.3.40:63433, idle 0:00:00, bytes 93168991, flags UIO
You can filter to the session that you looking for (example):
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 9/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 10/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
dmz5:
dmz6:
inside:
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 11/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Show the running config only for the interfaces with ip address:
interface GigabitEthernet0/0.14
vlan 14
nameif dmz5
security-level 0
interface GigabitEthernet0/0.65
vlan 65
nameif dmz6
security-level 0
interface GigabitEthernet0/1.100
vlan 100
nameif inside
security-level 100
myfirewall2/pri/act# sh ip
System IP Addresses:
Current IP Addresses:
myfirewall2/pri/act# sh nameif
Port-channel1.1001 dmz1 0
Check the MAC and the state of the interfaces. The name of the interface in the example below is internal.
– Interface name
– MAC
– Link state
– Speed
– Duplex
– MTU
– Packet
and Byte counters
– Errors
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 12/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
IP address unassigned
0 L2 decode drops
VLAN identifier 14
Description: dmz5
VLAN identifier 65
Description: dmz6
...
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 13/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
With the show route you can see the actual routing table from the firewall with the statis and the dynamic routes and the directly
connected networks.
Are you looking for a specific route in a big database? No problem use the show route with more details:
The most significant part for vpn is the time on the devices. The check the time use the following command:
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 14/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
nominal freq is 99.9984 Hz, actual freq is 99.9968 Hz, precision is 2**6
All tunnels:
If there is no SA that means the tunnel is down and does not work. To see if the tunnel is up we need to check if any SA exist.
To see if the tunnel is up you can use the “show crypto isakmp sa” or “show crypto ipsec sa” command.
Tunnel state is up
– encrypted
traffic (source and destination)
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 15/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
– traffic counters for encrypted traffic
– SPI for encrypt and decrypt
– Encryption method
Crypto map tag: firmen, seq num: 22, local addr: 5.5.5.5
current_peer: 3.3.3.3
#pkts not compressed: 26, #pkts comp failed: 0, #pkts decomp failed: 0
IV size: 16 bytes
0x00000000 0x000003FF
IV size: 16 bytes
0x00000000 0x00000001
To see if the encryption and decryption of the packages works use 2 or more times the show cry ipsec sa command and compare the
values. On the second and third outputs the counter should show larger number.
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 16/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Connection : 9.9.9.9
Duration : 12h:15m:49s
Connection : 3.3.3.3
Duration : 0h:07m:01s
Connection : 25.25.25.25
Duration : 12h:36m:51s
Connection : dyn-vpn-tunnel
Duration : 1h:13m:52s
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 17/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
IKEv1 SAs:
Active SA: 4
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
SA Lifetimes for inbound and outbound esp sa-s /phase2/ for site to site (lifetime in seconds)
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 18/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
interface: outside
Crypto map tag: tunnel, seq num: 20, local addr: 46.46.46.46
access-list tun-acl1 extended permit ip host 10.10.10.11 192.168.1.48 255.255.255.240 time-range End-D
local ident (addr/mask/prot/port): (10.10.10.11/255.255.255.255/0/0)
current_peer: 13.13.13.13
#pkts not compressed: 38097, #pkts comp failed: 0, #pkts decomp failed: 0
IV size: 16 bytes
0xFFFFFFFF 0xFFFFFFFF
IV size: 16 bytes
0x00000000 0x00000001
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 19/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Duration : 9d 3h:37m:37s
Inactivity : 0h:00m:00s
Duration : 1d 4h:45m:42s
Duration : 1d 3h:44m:57s
Inactivity : 0h:00m:00s
Duration : 6h:44m:02s
Inactivity : 0h:00m:00s
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 20/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
5.1 sniffertrace
The basic command is “capture”, after that you have to define the interface* (or the keyword any):
raise the packet-lenght to a higher value, if you need the payload from the packets!
myfirewall2/pri/act# capture capturename packet-length 1600 match tcp host 2.2.2.2 any eq 443
myfirewall2/pri/act#
myfirewall2/pri/act# sh cap
!!!!
myfirewall2/pri/act#
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config: access-group inside in interface inside access-list inside extended permit ip any 10.4.1.0 255.255.2
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 21/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
The buffer size is limited and if the buffer is full the old logs will be overwritten.
To check your log settings issue the following:
logging enable
logging timestamp
logging permit-hostdown
Configure logging
logging enable
logging timestamp
172.24.2.218
logging host fw-trans
logging trap errors
Save the logs from buffer to file and after you can copy it to your tftp server.
myfirewall3/pri/act# cd syslog
myfirewall3/pri/act# dir
Directory of disk0:/syslog/
These commands should be issued multiple times to see which counter actually increases, that can lead to a problem.
Issuing the command just once has not too much sence, since we do not know since when the counters show the actual
values.
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 22/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Interface germany:
Service-policy: voice-http-map
Class-map: voice-http-map
TCP-options:
———————————————————————————————
———————————————————————————————
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 23/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
———————————————————————————————
threat-detection basic-threat
This command -IF activated- can give us really useful basic information about network flows, passing through the firewall.
Or if we have a performance problem with our internet connection, we can see who owns currently the line (whos head must
be under
the guillotine.)
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 24/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
rate-1 Enter this keyword to display top N's first rate statistics
rate-2 Enter this keyword to display top N's second rate statistics
rate-3 Enter this keyword to display top N's third rate statistics
| Output modifiers
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 25/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 26/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
08 172.31.4.41 2 1 8 2620
10 10.10.123.2 1 1 5 2048
02 172.16.28.6 1 2 0 2398
03 172.31.241.99 1 1 0 2160
06 10.16.200.27 1 0 17 1256
07 172.26.30.20 0 0 0 1004
...
For more info read my post: Migrate Cisco ASA configuration, certificates and private keys
Thats all folks!
9
0
i
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 27/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Rate This
Reply
itsecworks
5
0
i
Rate This
Yes, only for basic troubleshooting :-) the rest will be posted soon :-)
Reply
TechIE
5
0
i
Rate This
2.
akesh
6
0
i
Rate This
Good Stuff.. Can you also try to post a bit more complex troubleshooting..thank you
Reply
itsecworks
1
0
i
Rate This
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 28/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Reply
3.
Bhumika
November 3, 2014
1
0
i
Rate This
I found this document very useful. all basic commands at one place
Reply
4.
Ramesh
February 4, 2015
1
0
i
Rate This
Reply
5.
Carlos Cosmo
1
0
i
Rate This
Reply
6.
crisboullosa
May 1, 2016
0
0
i
Rate This
Reply
7.
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 29/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
Dhruv
1
0
i
Rate This
Reply
8.
Gui
0
0
i
Rate This
Reply
9.
Md Shahnawaz
May 1, 2017
0
0
i
Rate This
Reply
10.
siddiqi
January 4, 2018
0
0
i
Rate This
I want to check by show command, whether perticular source/dest ip /port already allowed/denied by an ACL…it would be good for
me to verify the rule before implementing…do you know any show command like that
Reply
11.
Sa'ad Bhai
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 30/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
March 7, 2018
0
0
i
Rate This
Reply
12.
venkatesh
0
0
i
Rate This
good Documents. any way to capture the decapsulated packets via ipsec
Reply
13.
santa barbara
March 4, 2019
0
0
i
Rate This
Hello colleagues, its great article about educationand fully defined, keep it up all the
time.
Reply
14.
Tidwongsa Wicharn
July 2, 2019
0
0
i
Rate This
Thank you so must, I’ve issue Line application can’t call if use firewall ASA. Please recomend.
Reply
itsecworks
July 3, 2019
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 31/33
8/5/2021 Cisco ASA troubleshooting commands | itsecworks
0
0
i
Rate This
Reply
15.
Vimal
July 3, 2019
1
0
i
Rate This
Helpful document
Reply
16.
Sam
0
0
i
Rate This
Reply
Blog at WordPress.com.
https://itsecworks.com/2013/09/18/cisco-asa-troubleshooting-commands/ 33/33