cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
30748
Views
36
Helpful
8
Replies

FTD CLI SSH Debugging

alex_aasen
Level 1
Level 1

Hi,

 

I am trying to get some debugging done on my FTD via SSH, but it does not seem to work. Does FTD support debugging if done via SSH and issued under#system support diagnostic-cli || or do you have to use a console cable to see debug output?

 

Using #debug webvpn anyconnect 1 ||does not give me any output even though I connect with anyconnect. I do not want to use level 255 because of this bug: https://quickview.cloudapps.cisco.com/quickview/bug/CSCvk37890

 

Br

Alex

1 Accepted Solution

Accepted Solutions

Marvin Rhoads
Hall of Fame
Hall of Fame

You have to first change the Platform settings to enable logging. That will get the debug output to appear on your ssh session. you can debug without conditional logging at all the various levels (1-255).

 

If you want save that output in your log buffer, choose the "debug logging buffered" equivalent in the FMC GUI. If you don't do that, the debug output will appear only on your current session in real time. If you do that you should set the buffer size above the default 4096 bytes. Otherwise the buffer only holds a couple dozen messages.

 

You can also set the VPN logging to go to FMC (at whatever severity level).

 

Deploy those changes and then run your debugs.

 

FTD Syslog setup 2.PNG

 

FTD Syslog setup.PNG

 

Here you can see the result before and after:

 

firepower# show logging 
Syslog logging: disabled
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: disabled
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
firepower# 
firepower# 
firepower# show logging        
Syslog logging: enabled
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: level notifications, 51 messages logged
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
<snip>

 

View solution in original post

8 Replies 8

Marvin Rhoads
Hall of Fame
Hall of Fame

You have to first change the Platform settings to enable logging. That will get the debug output to appear on your ssh session. you can debug without conditional logging at all the various levels (1-255).

 

If you want save that output in your log buffer, choose the "debug logging buffered" equivalent in the FMC GUI. If you don't do that, the debug output will appear only on your current session in real time. If you do that you should set the buffer size above the default 4096 bytes. Otherwise the buffer only holds a couple dozen messages.

 

You can also set the VPN logging to go to FMC (at whatever severity level).

 

Deploy those changes and then run your debugs.

 

FTD Syslog setup 2.PNG

 

FTD Syslog setup.PNG

 

Here you can see the result before and after:

 

firepower# show logging 
Syslog logging: disabled
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: disabled
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
firepower# 
firepower# 
firepower# show logging        
Syslog logging: enabled
    Facility: 20
    Timestamp logging: disabled
    Hide Username logging: enabled
    Standby logging: disabled
    Debug-trace logging: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: level notifications, 51 messages logged
    Trap logging: disabled
    Permit-hostdown logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
    FMC logging: list MANAGER_VPN_EVENT_LIST, 99 messages logged
<snip>

 

Hi,

I have the same problem.

I did as you pointed out step by step,

But I don't see real time syslog message on ssh session of ftd.

What swich on yet ?

 

 

Did you check on your syslog server (using wireshark or similar packet capture) for incoming packets from the FTD devices? 

Hi,



I don't use syslog server



I was want to see this message on ssh session in console.

@Milkhail the whole thread was about syslog monitoring.

To enable console logging choose that option in the platform settings. Deploy the change. Then log into your FTD appliance and drop from clish into the LINA module via the command "system support diagnostic-cli". Switch to enable mode.

At that point you should be seeing syslog messages as they occur being scrolled onto your console session.

Example from my FTDv:

> show running-config | include logg
logging enable
logging timestamp
logging list MANAGER_VPN_EVENT_LIST level informational class auth
logging list MANAGER_VPN_EVENT_LIST level informational class vpn
logging list MANAGER_VPN_EVENT_LIST level informational class vpnc
logging list MANAGER_VPN_EVENT_LIST level informational class vpnfo
logging list MANAGER_VPN_EVENT_LIST level informational class vpnlb
logging list MANAGER_VPN_EVENT_LIST level informational class webfo
logging list MANAGER_VPN_EVENT_LIST level informational class webvpn
logging list MANAGER_VPN_EVENT_LIST level informational class ca
logging list MANAGER_VPN_EVENT_LIST level informational class svc
logging list MANAGER_VPN_EVENT_LIST level informational class ssl
logging list MANAGER_VPN_EVENT_LIST level informational class dap
logging list MANAGER_VPN_EVENT_LIST level informational class ipaa
logging buffer-size 100000
logging console debugging
logging FMC MANAGER_VPN_EVENT_LIST
logging device-id hostname
logging host Inside-Lab 172.31.1.5
logging flash-minimum-free 1024
logging flash-maximum-allocation 3076
no logging message 106015
no logging message 313001
no logging message 313008
no logging message 106023
no logging message 710003
no logging message 106100
no logging message 302015
no logging message 302014
no logging message 302013
no logging message 302018
no logging message 302017
no logging message 302016
no logging message 302021
no logging message 302020
> system support diagnostic-cli
Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.

vftd-new# Jul 10 2019 12:50:04 vftd-new : %FTD-7-111009: User 'enable_15' executed cmd: show logging queue
Jul 10 2019 12:50:20 vftd-new : %FTD-6-305012: Teardown dynamic UDP translation from Inside-Lab:172.31.1.10/123 to Outside-Home:192.168.0.204/123 duration 1:06:29
Jul 10 2019 12:50:23 vftd-new : %FTD-7-609002: Teardown local-host Outside-Home:52.21.117.50 duration 0:00:32
Jul 10 2019 12:50:24 vftd-new : %FTD-6-305012: Teardown dynamic TCP translation from Inside-Lab:172.31.1.10/47102 to Outside-Home:192.168.0.204/47102 duration 0:00:33
Jul 10 2019 12:50:36 vftd-new : %FTD-7-609001: Built local-host identity:fe80::1
Jul 10 2019 12:50:36 vftd-new : %FTD-7-609001: Built local-host Inside-Lab:ff02::1
Jul 10 2019 12:50:38 vftd-new : %FTD-7-609002: Teardown local-host identity:fe80::1 duration 0:00:02
Jul 10 2019 12:50:38 vftd-new : %FTD-7-609002: Teardown local-host Inside-Lab:ff02::1 duration 0:00:02
Jul 10 2019 12:50:51 vftd-new : %FTD-6-305011: Built dynamic TCP translation from Inside-Lab:172.31.1.10/47132 to Outside-Home:192.168.0.204/47132
Jul 10 2019 12:50:51 vftd-new : %FTD-7-609001: Built local-host Outside-Home:52.21.117

No, the whole thing was the OP wanted to get the Debug in his CLI.

mikael.lahtela
Level 4
Level 4

You can do this from FMC in  the platform settings but I would recommend to send debug logs to external syslog from the device.

logging.jpg

 

br, Mikael

1. On FMC enable logging for FTD (Device->Platform Settings->New Policy or edit existing for Threat Defence)

 

FTD-enable-logging.jpg

Now on FTD cli after apply policy you will see:

 

> show logging
Syslog logging: enabled

2. Enable ssh logging on FMC.  Add rule for ssh logging on FTD. 

 

FTD-ssh logging.jpg

 

After apply policy to FTD you will see monitor logging enabled:

> show logging
Syslog logging: enabled
Facility: 20
Timestamp logging: disabled
Hide Username logging: enabled
Standby logging: disabled
Debug-trace logging: disabled
Console logging: disabled
Monitor logging: level debugging, 18296 messages logged

 

3. Enter Lina 

> system support diagnostic-cli
Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.

testvpn> en
Password:
testvpn#

 

4. Debug your case

Example:

testvpn# debug crypto ikev1 1
testvpn# clear crypto ikev1 sa
testvpn# Jan 28 11:25:00 [IKEv1]Group = *.*.*.*, IP =*.*.*.*, Session is being torn down. Reason: Administrator Reset

 

I think that is clear how to do it :)

 

 

 

 

 

Review Cisco Networking products for a $25 gift card