Problem: Have you ever wondered how you logoff or disconnect a remote access VPN user on a Cisco ASA? Well there are two ways to do it. One is to use the GUI – Cisco’s ASDM and the other by using good old CLI.

ciscoasa# sh vpn-sessiondb index 14415 Single Session Username : user1 Index : 14415 Assigned IP : 172.16.0.104 Public IP : 12.34.56.78 Protocol : IKE IPsecOverNatT License : IPsec Encryption : DES 3DES Hashing : MD5 SHA1 Bytes Tx : 116218822 Bytes Rx : 8332463 Group Policy : dlm Tunnel Group : dlm Login Time : 08:04:53 EST Thu Feb 16 2012 show vpn-sessiondb remote. You can of course use modifiers to filter only the text you’re interested in. For example. show vpn-sessiondb remote | include (Username|Duration) This will give you the username and duration of the session. You can also get a summary of all the connections as follows. show vpn-sessiondb summary I am trying to find a way to detect/gather information about end users computers' name, public IP, SSL VPN duration. Basically pretty much everything in sh vpn-sessiondb details anyconnect , plus computer name, whether a domain or personal computer (without restrict anything at the beginning) So I can start to build new access-list and policies. Feb 28, 2018 · Symptom: WebVPN licences are displayed as in use, even with 0 vpn sessions. This is determined by looking at the show vpn-sessiondb summary command. Conditions: ASA running 8.0.3.6 or 8.0.3.9 Try to connect with Clientless webvpn or with AnyConnect bhdc1-zone1-asa02# sh vpn-sessiondb sumarry Active Session Summary Sessions: No sessions to display License Information: IPsec : 250 Configured 2) sh vpn-sessiondb l2l << (LAN-to-LAN Tunnels) 3) sh vpn-sessiondb svc << (SSL VPN / Anyconnect Clients) This will help you figure out if they are actually individual users connecting into the ASA using the AnyConnect software for example, or if there are a 171 LAN-2-LAN tunnels connecting to your ASA, it'll show you the IPs of the far ends. Tcpdump capture will provide live data for analysis but before let’s find out the source from Anyconnect. ASA/sec/stby# sh vpn-sessiondb anyconnect filter name userName. Session Type: AnyConnect. Username : userName Index : 5 Assigned IP : 10.255.4.155 Public IP : x.x.x.x Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel License

sh vpn-sessiondb remote (IPSec Remote VPN Clients) sh vpn-sessiondb l2l (L2L Tunnels) sh vpn-sessiondb svc (SSL VPN / Anyconnect Clients) sh vpn-sessiondb webvpn (Clientless sessions) sh ssh sessions (show users connected to ASA via SSH) To terminate a session. vpn-sessiondb logoff name username (where username is the name of the user you want

show vpn-sessiondb remote. You can of course use modifiers to filter only the text you’re interested in. For example. show vpn-sessiondb remote | include (Username|Duration) This will give you the username and duration of the session. You can also get a summary of all the connections as follows. show vpn-sessiondb summary I am trying to find a way to detect/gather information about end users computers' name, public IP, SSL VPN duration. Basically pretty much everything in sh vpn-sessiondb details anyconnect , plus computer name, whether a domain or personal computer (without restrict anything at the beginning) So I can start to build new access-list and policies. Feb 28, 2018 · Symptom: WebVPN licences are displayed as in use, even with 0 vpn sessions. This is determined by looking at the show vpn-sessiondb summary command. Conditions: ASA running 8.0.3.6 or 8.0.3.9 Try to connect with Clientless webvpn or with AnyConnect bhdc1-zone1-asa02# sh vpn-sessiondb sumarry Active Session Summary Sessions: No sessions to display License Information: IPsec : 250 Configured

Jun 26, 2020 · hostname# show vpn-sessiondb anyconnect Session Type: AnyConnect Username : lee Index : 1 Assigned IP : 192.168.246.1 Public IP : 10.139.1.2 Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel License : AnyConnect Premium Encryption : RC4 AES128 Hashing : SHA1 Bytes Tx : 11079 Bytes Rx : 4942 Group Policy : EngPolicy Tunnel Group : EngGroup

ciscoasa# sh vpn-sessiondb anyconnect Session Type: AnyConnect Username : engruser Index : 3 Assigned IP : 10.10.20.1 Public IP : 172.31.10.2 Protocol : AnyConnect-Parent SSL-Tunnel License : AnyConnect Premium Encryption : RC4 Hashing : none SHA1 ciscoasa# sh vpn-sessiondb index 14415 Single Session Username : user1 Index : 14415 Assigned IP : 172.16.0.104 Public IP : 12.34.56.78 Protocol : IKE IPsecOverNatT License : IPsec Encryption : DES 3DES Hashing : MD5 SHA1 Bytes Tx : 116218822 Bytes Rx : 8332463 Group Policy : dlm Tunnel Group : dlm Login Time : 08:04:53 EST Thu Feb 16 2012