1-25
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring AnyConnect VPN Client Connections
Logging Off AnyConnect VPN Sessions
Examples
The Inactivity field shows the elapsed time since an AnyConnect session lost connectivity. If the session
is active, 00:00m:00s appears in this field.
hostname# show vpn-sessiondb
Session Type: SSL VPN Client
Username : lee
Index : 1 IP Addr : 209.165.200.232
Protocol : SSL VPN Client Encryption : 3DES
Hashing : SHA1 Auth Mode : userPassword
TCP Dst Port : 443 TCP Src Port : 54230
Bytes Tx : 20178 Bytes Rx : 8662
Pkts Tx : 27 Pkts Rx : 19
Client Ver : Cisco STC 1.1.0.117
Client Type : Internet Explorer
Group : DfltGrpPolicy
Login Time : 14:32:03 UTC Wed Mar 20 2007
Duration : 0h:00m:04s
Inactivity : 0h:00m:04s
Filter Name :
hostname# vpn-sessiondb logoff
INFO: Number of sessions of type "" logged off : 1
hostname# vpn-sessiondb logoff name tester
Do you want to logoff the VPN session(s)? [confirm]
INFO: Number of sessions with name "tester" logged off : 1
Logging Off AnyConnect VPN Sessions
To log off all VPN sessions, use the vpn-sessiondb logoff command in global configuration mode:
vpn-sessiondb logoff
The following example logs off all VPN sessions:
hostname# vpn-sessiondb logoff
INFO: Number of sessions of type “” logged off : 1
You can log off individual sessions using either the name argument or the index argument:
vpn-session-db logoff name name
vpn-session-db logoff index index
The sessions that have been inactive the longest time are marked as idle (and are automatically logged
off) so that license capacity is not reached and new users can log in. If the session resumes at a later time,
it is removed from the inactive list.
show vpn-sessiondb anyconnect
Enhances the VPN session summary to show OSPFv3 session
information.
show vpn-sessiondb ratio encryption
Shows the number of tunnels and percentages for the Suite B algorithms
(such as AES-GCM-128, AES-GCM-192, AES-GCM-256,
AES-GMAC-128, and so on).
Command Purpose