Verify and Monitor SD-WAN Remote Access
On the Cisco IOS XE Catalyst SD-WAN device hosting the SD-WAN RA headend, use the following commands to verify that the remote access headend is configured and functioning.
Verification requires at least one remote user to be connected.
Client Connections in SD-WAN RA IPsec Mode
Use the show crypto session command and view the details in the “Interface: Virtual-Access” blocks in the command output. Each of these blocks corresponds to a connected client, and shows the IP address of the client and the details of the connection.
Device# show crypto session
…
Interface: Virtual-Access1
Profile: IKEV2_PROFILE
Session status: UP-ACTIVE
Peer: 10.0.12.40 port 500
Session ID: 2
IKEv2 SA: local 10.0.31.31/500 remote 10.0.12.40/500 Active
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0
Active SAs: 2, origin: crypto map
IKEv2 Sessions in SD-WAN RA IPsec Mode
Use the show crypto ikev2 sa detailed command to view the details of the IKEv2 session. For each connected client, the command output includes a block similar to the one in the following example. In the output, verify that the status is READY.
Device# show crypto ikev2 sa detailed
IPv4 Crypto IKEv2 SA
Tunnel-id Local Remote fvrf/ivrf Status
3 10.100.0.1/500 10.200.0.1/500 none/10 READY
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:19, Auth sign: RSA, Auth verify: RSA
Life/Active Time: 86400/82405 sec
CE id: 0, Session-id: 3
Status Description: Negotiation done
Local spi: 0123456789ABCDEF Remote spi: ABCDEF0123456789
Local id: example1@example.com
Remote id: example2@example.com
Local req msg id: 0 Remote req msg id: 50
Local next msg id: 0 Remote next msg id: 50
Local req queued: 0 Remote req queued: 50
Local window: 5 Remote window: 5
DPD configured for 0 seconds, retry 0
Fragmentation not configured.
Dynamic Route Update: enabled
Extended Authentication not configured.
NAT-T is not detected
Cisco Trust Security SGT is disabled
Assigned host addr: 192.168.100.1
Initiator of SA : No
Client Connections in SD-WAN RA SSL (TLS) mode
Use the show crypto ssl session command to view the details of the clients connected.
Device# show crypto ssl session
SSL profile name: sslvpn_sdra_profile
Client_Login_Name Client_IP_Address No_of_Connections Created Last_Used
myssl 170.1.1.100 1 11:29:49 11:29:49
Device# show crypto ssl session user myssl
Interface : Virtual-Access1
Session Type : Full Tunnel
Client User-Agent : AnyConnect Windows 4.9.06037
Username : myssl Num Connection : 1
Public IP : 170.1.1.100
Profile : sslvpn_sdra_profile
Policy : sdra_sslvpn_policy
Last-Used : 11:29:59 Created : 23:35:52.695 UTC Sun Jul 16 2023
Tunnel IP : 172.16.224.6 Netmask : 0.0.0.0
Rx IP Packets : 0 Tx IP Packets : 0
Route Information
Use the show ip route vrf vrf command to view route information. Specify the VRF assigned to a client. The command output shows information regarding the routes used in the VRF. Lines containing "Virtual-Access1" or similar indicate that a client is connected.
Device# show ip route vrf 10
Routing Table: 10
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, m - OMP
n - NAT, Ni - NAT inside, No - NAT outside, Nd - NAT DIA
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
H - NHRP, G - NHRP registered, g - NHRP registration summary
o - ODR, P - periodic downloaded static route, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
& - replicated local route overrides by connected
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks
C 10.1.1.0/24 is directly connected, Loopback2
L 10.1.1.2/32 is directly connected, Loopback2
S 10.1.1.21/32 is directly connected, Virtual-Access1
10.100.0.0/8 is variably subnetted, 4 subnets, 2 masks
m 10.100.7.0/24 [251/0] via 172.16.255.70, 2d23h, Sdwan-system-intf
m 10.100.17.0/24 [251/0] via 172.16.255.30, 02:29:17, Sdwan-system-intf
C 10.100.27.0/24 is directly connected, GigabitEthernet5
L 10.100.27.1/32 is directly connected, GigabitEthernet5