How check VPN tunnel status in Cisco ASA?
...
Please try to use the following commands.
- show vpn-sessiondb l2l.
- show vpn-sessiondb ra-ikev1-ipsec.
- show vpn-sessiondb summary.
- show vpn-sessiondb license-summary.
- and try other forms of the connection with "show vpn-sessiondb ?"
In the navigation pane, under Site-to-Site VPN Connections, choose Site-to-Site VPN Connections. Select your VPN connection. Choose the Tunnel Details view. Review the Status of your VPN tunnel.
Run the command "show crypto ipsec sa" and check first of all you have IPSec SAs formed and then check the encaps|decaps counters are increasing. If you have both then the traffic is going over the VPN tunnel.
- Check security policy and routing.
- Check for any devices upstream that perform port-and-address-translations. ...
- Apply debug packet filters, captures or logs, if necessary, to isolate the issue where the traffic is getting dropped.
This command “Show vpn-sessiondb anyconnect” command you can find both the username and the index number (established by the order of the client images) in the output of the “show vpn-sessiondb anyconnect” command.
- Identify the top talkers in the network from dashboard. ...
- Generate reports for Cisco ASA device. ...
- Identify malicious traffic with advanced security analytics module. ...
- Set real-time alerts and get notified via email or SMS.
- In the administration interface, go to Interfaces.
- Click Add > VPN Tunnel.
- Type a name of the new tunnel.
- Set the tunnel as active and type the hostname of the remote endpoint. ...
- Select Type: IPsec.
- Select Preshared key and type the key.
How To Create a Secure Tunnel Between Two RV130W Routers
- Log in to the Cisco router with administrative credentials.
- Type the following command at the router's command prompt: show control-plane host open-ports.
- Press the “Enter” key. ...
- View the data in the fourth column labeled “Services.” Each open TCP connection is listed.
In computer networking and telecommunications, route flapping occurs when a router alternately advertises a destination network via one route then another, or as unavailable and then available again, in quick sequence.
How you will verify if any traffic is getting dropped by ASA for any reason?
In order to view the ASP drop statistics you can run the command “sh asp drop”. This will give you an overview view of the type of drops being encountered.
There should not be any overhead on the ASA, also you can use the packet capture utility on the ASA to see if the traffic is indeed being blocked. If you need to allow traffic through the firewall then it would be best to post a seperate discussion in the Firewalling forum.

Security level 0: This is the lowest security level there is on the ASA and by default it is assigned to the “outside” interface. Since there is no lower security level this means that traffic from the outside is unable to reach any of our interfaces unless we permit it within an access-list.
Common reasons for VPN tunnel inactivity or instability on a customer gateway device include: Problems with Internet Protocol Security (IPsec) dead peer detection (DPD) monitoring. Idle timeouts due to low traffic on a VPN tunnel or vendor-specific customer gateway device configuration issues.
- > show vpn flow.
- id name state monitor local-ip peer-ip tunnel-i/f.
- ------------------------------------------------------------------------------------
- 1 tunnel-to-remote active up 10.66.24.94 10.66.24.95 tunnel.2.