Monitor and Troubleshoot Service Access Policies

Monitor Active Remote Access VPN Sessions in Remote Access VPN Dashboard

Choose Overview > Dashboards > Remote Access VPN.

Monitor Denied Remote Access VPN Sessions

Monitor the denied remote access VPN sessions at Devices > Troubleshoot > Troubleshooting Logs. To view the denied remote access VPN sessions, you must configure the syslog settings in the threat defense:

  1. Choose Devices > Platform Settings and create or edit a threat defense policy.

  2. In the left pane, click Syslog.

  3. Click the Logging Setup tab.

  4. Check the Enable Logging check box.

  5. Click the VPN Logs radio button.

  6. From the Logging Level drop-down list, choose 6 - informational.

  7. Click Save.

Note

You cannot view the denied remote access VPN sessions if the All Logs option is configured with a Logging Level between 0 and 2.

Verify Service Access Policies

From the threat defense device CLI, run the following commands:

  • show running-config service-access: Displays the user-defined service access policies.

    firepower#show running-config service-access
       service-access deny geolocation OBJGRP_Asia1
       service-access permit interface outside ra-ssl-client geolocation OBJGRP_India
       service-access deny ra-ikev2 geolocation any
    
  • show service-access: Displays details of the user-defined service access policies.

    firepower# show service-access
    1 outside         : ra-ikev2 ra-ssl-client (permit) hits = 8288
      Last hit time   : 10:58:10.038 IST Tue Jul 16 2024
      object-group    : FMC_INTERNAL_XXY
    2 any             : ra-ikev2 ra-ssl-client (deny) hits = 123
      Last hit time   : 11:23:12.032 IST Tue Jul 17 2024
      object-group    : any
    
    
    firepower# show service-access detail
    1 outside         : ra-ikev2 ra-ssl-client (permit) hits = 8288
      Last hit time   : 10:58:10.038 IST Tue Jul 16 2024
      object-group    : FMC_INTERNAL_XXY
      geolocation     : Egypt(818) Jordan(400)
                        Iran (Islamic Republic of)(364)
                        Saudi Arabia(682) 
  • show geodb: Displays details of the geolocation table.

    show geodb{ ipv4| ipv6| counters| context}[ location country_name| lookup ip_address][ detail]

    • show geodb{ ipv4| ipv6} : Displays the total number of IPv4 or IPv6 address mappings.

      firepower# show geodb ipv4
       Geolocation Table - IPv4
       Total number of mappings available: 532507
       Last geolocation data read time:  17:02:13.000 IST Thu Jul 18 2024 
       Running geolocation update version: 2024-02-15-019
      
      
    • show geodb{ ipv4| ipv6} location country_name detail : Displays the details of the IPv4 or IPv6 address mappings.

      firepower# show geodb ipv4 location Antarctica detail
      Geolocation Table - IPv4
      id=0x00007fff82c284e0, geo_id=10, hits=0
              range_lower=77.70.176.176, range_upper=77.70.176.183
      id=0x00007fff82cca360, geo_id:10, hits=0
           range_lower=79.110.169.69, range_upper=79.110.169.69      
      Total number of mappings available: 28
      
      
    • show geodb counters : Displays the details of active, permitted, and denied sessions.

      firepower# show geodb counters
      current   – ongoing sessions
      permitted – cumulative permitted sessions
      denied    – cumulative denied sessions
      Location                current          permitted      denied 
      Egypt                     0                   0             5
      India                     45                  1345         45
      
      
    • show geodb{ ipv4| ipv6lookup ip_address : Displays the geolocation of a specific IPv4 or IPv6 address.

      firepower# show geodb ipv4 lookup 223.223.128.24
      Geolocation of 223.223.128.24 is "India" (356) with id=0x000015114d0aa330 
      Matching network range: 223.223.128.0 - 223.223.159.255
      

Troubleshoot Service Access Policies

  • Syslogs

    Enable remote access VPN service access syslogs:

    1. Choose Devices > Platform Settings.

    2. Create or edit a platform settings policy.

    3. In the left pane, click Syslog.

    4. Click the Logging Setup tab and check the Enable Logging check box.

    5. Click the Syslog Settings tab and enable the syslogs for service access syslog 751031 and 716166.

  • Commands

    • Use the show running-config service-access, and show service-access commands to view details of user-defined service access policies.

    • Use the show geodb command to view details of the geolocation table.

    • Use the debug geolocation <debug-level> command to capture debug logs related to geolocation. The debug levels can be 1 (Error), 2 (Warning), 3 and 4 (Info), 5 (Debug), or 255 (Debug all).

    • Use the clear geodb counters command to clear the geolocation table counters such as the hit counts of the service access policies. However, you cannot clear the actual permitted and denied counters for locations using this command; you can clear these counters only after you reboot the device.