Introduction
This document describes the basic information need to be collected while working with Cisco Secure Access Support Team
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
- Cisco Secure Access
- Cisco Secure Client
- Packet Captures through Wireshark and tcpdump
Components Used
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Background Information
While working on Cisco Secure Access, you can run into issues where you need to contact Cisco Support Team, or would like to perform basic investigation for the issue and try to go through the logs and islote the problem. This article go over on how to gather the basic troubleshooting logs related to Secure Access. note that not all the steps apply to every scenario.
Locate The Secure Access Organization ID
In order for Cisco Engineer to locate your account, provide your organization ID which can be found in the URL once you are logged in to the Secure Access Dashboard.
Steps to locate Organization ID:
1. Login to sse.cisco.com
2. If you have multiple organizations switch to the right one.
3. The organization ID can be found in the URL in this pattern: https://dashboard.sse.cisco.com/org/{7_digit_org_id}/overview
Cisco Secure Client Diagnostic and Reporting Tool (DART)
Cisco Secure Client Diagnostic and Reporting Tool (DART) is a tool that is installed with Secure Client package, helps to collect important information about the user endpoint.
Example of information collected by DART bundle:
- ZTNA Logs
- Secure Client Logs and Profile Information
- System Information
- Other Secure Client Add-ons or Plugins logs that are installed on
Instructions to collect DART:
Step 1. Launch DART.
1. For a Windows computer, launch the Cisco Secure Client.
2. For a Linux computer, choose Applications > Internet > Cisco DART
or /opt/cisco/anyconnect/dart/dartui.
3. For a Mac computer, choose Applications > Cisco > Cisco DART
.
Step 2. Click the Statistics tab and then click Details.
Step 3. Choose Default or Custom bundle creation.
Tip: The default name for the bundle is DARTBundle.zip, and it is saved to the local desktop.
Note: If you chose Default, DART starts creating the bundle. If you chose Custom, continue the wizard prompts to specify logs, preference files, diagnostic information, and any other customizations
HTTP Archive (HAR) Captures
HAR can be collected from different browsers. it provides multiple information that includes:
1. Decrypted version of the HTTPS requests.
2. Internal information about error messages, request details, and headers.
3. Timing and delay information
4. Other miscellaneous information about browser based requests.
To Collect HAR Captures please use the steps described in this source: https://toolbox.googleapps.com/apps/har_analyzer/
Note: You need to refresh your browser session in order to collect the right data
Packet Captures
Packet captures is useful in a scenario where a performance issue or a packet loss is detected, or total outage for network. The most common tools to collect captures are wireshark
and tcpdump
. Or a built-in capability to collect pcap files format within the device itself, like a Cisco Firewall or router.
To collect usful packet captures on an endpoint, please make sure to include:
1. Loopback interface to capture traffic sent through Secure Client add-ons.
2. All other interfaces involved in packet path.
3. Apply minimal filters, or no filters at all to make sure all data is collected.
Note: When captures are collected on a network Device, make sure you filter on source and destination of traffic, and limit the captures to related ports and services only, to avoid any performance caused by this activity.
Policy Debug Output
Policy debug output is a diagnostic output sent through the user browser when being protected by Secure Access. which includes critical information about the deloyment.
1. Organization ID
2. Deployment type
3. Connected proxy
4. Public and Private IP address
5. Other information related to the source of the traffic.
To run the policy test results, please login to this link from a protected endpoint: https://policy.test.sse.cisco.com/
Please make sure you trust the Secure Access Root Certificate if a certificate error message is presented in your browser.
To Download Secure Access Root Certificate:
Navigate to Secure Access Dashboard > Secure > Settings > Certificate > (Internet Destinations tab)
Upload Results To Cisco Support Service Request
You can upload files to Support case through these steps:
Step 1. Log in to SCM.
Step 2. In order to view and edit the case, click the case number or case title in the list. The Case Summary page opens.
Step 3. Click Add Files in order to choose a file and upload it as an attachment to the case. The system displays the SCM File Uploader tool.
Step 4. In the Choose Files to Upload dialog box, drag the files that you want to upload or click inside to browse your local machine for files to upload.
Step 5. Add a description and specify a category for all files, or individually.
Related Information