<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD CLI SSH Debugging in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3715236#M1014461</link>
    <description>&lt;P&gt;You can do this from FMC&amp;nbsp;in &amp;nbsp;the platform settings but I would recommend to send debug logs to external syslog from the device.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="logging.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19361i2B560FC4445EBFC9/image-size/large?v=v2&amp;amp;px=999" role="button" title="logging.jpg" alt="logging.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;br, Mikael&lt;/P&gt;</description>
    <pubDate>Fri, 28 Sep 2018 18:29:56 GMT</pubDate>
    <dc:creator>mikael.lahtela</dc:creator>
    <dc:date>2018-09-28T18:29:56Z</dc:date>
    <item>
      <title>FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3711562#M1014145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to get some debugging done on my FTD via SSH, but it does not seem to work. Does FTD support debugging if done via SSH and issued under#system support diagnostic-cli || or do you have to use a console cable to see debug output?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using #debug webvpn anyconnect 1 ||does not give me any output even though I connect with anyconnect. I do not want to use level 255 because of this bug:&amp;nbsp;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvk37890" target="_blank"&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCvk37890&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Br&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3711562#M1014145</guid>
      <dc:creator>alex_aasen</dc:creator>
      <dc:date>2020-02-21T16:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3711717#M1014459</link>
      <description>&lt;P&gt;You have to first change the Platform settings to enable logging. That will get the debug output to appear on your ssh session. you can debug without conditional logging at all the various levels (1-255).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want save that output in your log buffer, choose the "debug logging buffered" equivalent in the FMC GUI. If you don't do that, the debug output will appear only on your current session in real time. If you do that you should set the buffer size above the default 4096 bytes. Otherwise the buffer only holds a couple dozen messages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also set the VPN logging to go to FMC (at whatever severity level).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deploy those changes and then run your debugs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD Syslog setup 2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19103i8B08B0661D129544/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD Syslog setup 2.PNG" alt="FTD Syslog setup 2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD Syslog setup.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19100iA0A7BB12B1E18DCB/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD Syslog setup.PNG" alt="FTD Syslog setup.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here you can see the result before and after:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;firepower# show logging 
&lt;FONT color="#FF0000"&gt;Syslog logging: disabled&lt;/FONT&gt;
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
&lt;FONT color="#FF0000"&gt;    Buffer logging: disabled&lt;/FONT&gt;
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
firepower# 
firepower# 
firepower# show logging        
&lt;FONT color="#FF0000"&gt;Syslog logging: enabled&lt;/FONT&gt;
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
&lt;FONT color="#FF0000"&gt;    Buffer logging: level notifications, 51 messages logged&lt;/FONT&gt;
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
&amp;lt;snip&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Sep 2018 14:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3711717#M1014459</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-23T14:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3715236#M1014461</link>
      <description>&lt;P&gt;You can do this from FMC&amp;nbsp;in &amp;nbsp;the platform settings but I would recommend to send debug logs to external syslog from the device.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="logging.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19361i2B560FC4445EBFC9/image-size/large?v=v2&amp;amp;px=999" role="button" title="logging.jpg" alt="logging.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;br, Mikael&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 18:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3715236#M1014461</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2018-09-28T18:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887065#M1014463</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have the same problem.&lt;/P&gt;&lt;P&gt;I did as you pointed out step by step,&lt;/P&gt;&lt;P&gt;But I don't see real time syslog message on ssh session of ftd.&lt;/P&gt;&lt;P&gt;What&amp;nbsp;swich on yet&amp;nbsp;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 13:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887065#M1014463</guid>
      <dc:creator>Milkhail</dc:creator>
      <dc:date>2019-07-09T13:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887117#M1014464</link>
      <description>&lt;P&gt;Did you check on your syslog server (using wireshark or similar packet capture) for incoming packets from the FTD devices?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 14:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887117#M1014464</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-09T14:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887437#M1014465</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I don't use syslog server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I was want to see this message on ssh session in console.&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Jul 2019 03:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887437#M1014465</guid>
      <dc:creator>Milkhail</dc:creator>
      <dc:date>2019-07-10T03:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887709#M1014466</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/494826"&gt;@Milkhail&lt;/a&gt;&amp;nbsp;the whole thread was about syslog monitoring.&lt;/P&gt;
&lt;P&gt;To enable console logging choose that option in the platform settings. Deploy the change. Then log into your FTD appliance and drop from clish into the LINA module via the command "system support diagnostic-cli". Switch to enable mode.&lt;/P&gt;
&lt;P&gt;At that point you should be seeing syslog messages as they occur being scrolled onto your console session.&lt;/P&gt;
&lt;P&gt;Example from my FTDv:&lt;/P&gt;
&lt;PRE&gt;&amp;gt; show running-config | include logg
logging enable
logging timestamp
logging list MANAGER_VPN_EVENT_LIST level informational class auth
logging list MANAGER_VPN_EVENT_LIST level informational class vpn
logging list MANAGER_VPN_EVENT_LIST level informational class vpnc
logging list MANAGER_VPN_EVENT_LIST level informational class vpnfo
logging list MANAGER_VPN_EVENT_LIST level informational class vpnlb
logging list MANAGER_VPN_EVENT_LIST level informational class webfo
logging list MANAGER_VPN_EVENT_LIST level informational class webvpn
logging list MANAGER_VPN_EVENT_LIST level informational class ca
logging list MANAGER_VPN_EVENT_LIST level informational class svc
logging list MANAGER_VPN_EVENT_LIST level informational class ssl
logging list MANAGER_VPN_EVENT_LIST level informational class dap
logging list MANAGER_VPN_EVENT_LIST level informational class ipaa
logging buffer-size 100000
&lt;STRONG&gt;logging console debugging&lt;/STRONG&gt;
logging FMC MANAGER_VPN_EVENT_LIST
logging device-id hostname
logging host Inside-Lab 172.31.1.5
logging flash-minimum-free 1024
logging flash-maximum-allocation 3076
no logging message 106015
no logging message 313001
no logging message 313008
no logging message 106023
no logging message 710003
no logging message 106100
no logging message 302015
no logging message 302014
no logging message 302013
no logging message 302018
no logging message 302017
no logging message 302016
no logging message 302021
no logging message 302020
&amp;gt; &lt;STRONG&gt;system support diagnostic-cli&lt;/STRONG&gt;
Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.

vftd-new# Jul 10 2019 12:50:04 vftd-new : %FTD-7-111009: User 'enable_15' executed cmd: show logging queue
Jul 10 2019 12:50:20 vftd-new : %FTD-6-305012: Teardown dynamic UDP translation from Inside-Lab:172.31.1.10/123 to Outside-Home:192.168.0.204/123 duration 1:06:29
Jul 10 2019 12:50:23 vftd-new : %FTD-7-609002: Teardown local-host Outside-Home:52.21.117.50 duration 0:00:32
Jul 10 2019 12:50:24 vftd-new : %FTD-6-305012: Teardown dynamic TCP translation from Inside-Lab:172.31.1.10/47102 to Outside-Home:192.168.0.204/47102 duration 0:00:33
Jul 10 2019 12:50:36 vftd-new : %FTD-7-609001: Built local-host identity:fe80::1
Jul 10 2019 12:50:36 vftd-new : %FTD-7-609001: Built local-host Inside-Lab:ff02::1
Jul 10 2019 12:50:38 vftd-new : %FTD-7-609002: Teardown local-host identity:fe80::1 duration 0:00:02
Jul 10 2019 12:50:38 vftd-new : %FTD-7-609002: Teardown local-host Inside-Lab:ff02::1 duration 0:00:02
Jul 10 2019 12:50:51 vftd-new : %FTD-6-305011: Built dynamic TCP translation from Inside-Lab:172.31.1.10/47132 to Outside-Home:192.168.0.204/47132
Jul 10 2019 12:50:51 vftd-new : %FTD-7-609001: Built local-host Outside-Home:52.21.117&lt;/PRE&gt;</description>
      <pubDate>Wed, 10 Jul 2019 12:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/3887709#M1014466</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-10T12:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/4019409#M1014467</link>
      <description>&lt;P&gt;1. On FMC enable logging for FTD (Device-&amp;gt;Platform Settings-&amp;gt;New Policy or edit existing for Threat Defence)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD-enable-logging.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66021i1E8146823F03DC87/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD-enable-logging.jpg" alt="FTD-enable-logging.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Now on FTD cli after apply policy you will see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show logging&lt;BR /&gt;&lt;STRONG&gt;Syslog logging: enabled&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;2. Enable ssh logging on FMC.&amp;nbsp; Add rule for ssh logging on FTD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FTD-ssh logging.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66023i1C54CDC34A4FE6C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="FTD-ssh logging.jpg" alt="FTD-ssh logging.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After apply policy to FTD you will see monitor logging enabled:&lt;/P&gt;&lt;P&gt;&amp;gt; show logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;Facility: 20&lt;BR /&gt;Timestamp logging: disabled&lt;BR /&gt;Hide Username logging: enabled&lt;BR /&gt;Standby logging: disabled&lt;BR /&gt;Debug-trace logging: disabled&lt;BR /&gt;Console logging: disabled&lt;BR /&gt;&lt;STRONG&gt;Monitor logging: level debugging, 18296 messages logged&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Enter Lina&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; system support diagnostic-cli&lt;/STRONG&gt;&lt;BR /&gt;Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;testvpn&amp;gt; &lt;STRONG&gt;en&lt;/STRONG&gt;&lt;BR /&gt;Password:&lt;BR /&gt;testvpn#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Debug your case&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;testvpn# debug crypto ikev1 1&lt;BR /&gt;testvpn# clear crypto ikev1 sa&lt;BR /&gt;testvpn# Jan 28 11:25:00 [IKEv1]Group = *.*.*.*, IP =*.*.*.*, Session is being torn down. Reason: Administrator Reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think that is clear how to do it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 11:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/4019409#M1014467</guid>
      <dc:creator>marinogr</dc:creator>
      <dc:date>2020-01-28T11:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/4702022#M1094184</link>
      <description>&lt;P&gt;No, the whole thing was the OP wanted to get the Debug in his CLI.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 15:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/4702022#M1094184</guid>
      <dc:creator>spencercook</dc:creator>
      <dc:date>2022-10-12T15:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/5256645#M1119323</link>
      <description>&lt;P&gt;This was incredibly helpful. Thank you!!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/5256645#M1119323</guid>
      <dc:creator>laurahood</dc:creator>
      <dc:date>2025-02-04T17:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD CLI SSH Debugging</title>
      <link>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/5256985#M1119340</link>
      <description>&lt;P&gt;You're welcome &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1819871"&gt;@laurahood&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 03:42:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-cli-ssh-debugging/m-p/5256985#M1119340</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-02-05T03:42:16Z</dc:date>
    </item>
  </channel>
</rss>

