This document describes how to collect detailed ZTA troubleshooting logs and when to enable step by step.
As organizations increasingly adopt Zero Trust Architecture (ZTA) to secure users, devices, and applications, troubleshooting connectivity and policy enforcement issues have become more complex. Unlike traditional perimeter-based models, ZTA relies on multiple real-time decisions across identity, device posture, network context, and cloud-based policy engines. When issues arise, high-level logs are often insufficient to pinpoint the root cause.
Collecting detailed ZTA level tracing plays a critical role in gaining deep visibility into client behavior, policy evaluation, traffic interception, and cloud service interactions. These traces enable engineers to move beyond symptom based troubleshooting and analyze the exact sequence of events leading to access failures, performance degradation, or unexpected policy outcomes.
These pre-checks help the TAC team identify the issue more efficiently. Providing this information to the engineers assists them in resolving your problem as quickly as possible:
What is the issue, and how many users are affected?
Which OS and versions are impacted?
Is the issue consistent or intermittent? If intermittent, is it user-specific or widespread?
Did the issue start after a change, or has it been present since deployment?
Are there any known triggers?
Is there a workaround available?
DART bundle
Wireshark capture (all interfaces, including loopback)
Error messages observed
Timestamps of the issue
CSC ZTA module status screenshot
Username of the affected user
The next sections explain how to enable and collect each of these logs in detail.
Create a file named logconfig.json with these details below:
{ "global": "DBG_TRACE" }
Warning: Be sure your file is saved with the name logconfig.json.
After creating the file, place it in the appropriate location based on the operating system:
Windows: C:\ProgramData\Cisco\Cisco Secure Client\ZTA
macOS:/opt/cisco/secureclient/zta


Note: Once you have created the specified file, you must restart the Zero Trust Access Agent service (Please check step Restarting ZTA service ). If restarting the service is not possible, please restart the computer.
On Windows PCs, after enabling trace-level logging, you must manually increase the ZTA log file size.
Event Viewer.Applications and Services Logs.Cisco Secure Client – Zero Trust Access and select Properties.Maximum log size (KB), set the value to 204800 (equivalent to 200 MB).To finalize click Apply and then OK.
Windows + R to open the Run Search write services.msc and press enter.Cisco Secure Client - Zero trust Access Agent and click Restart. Once its done, verify the CSC ZTA module status to confirm it is active.
Note: If ZTA service cannot be restarted due to lack of administrative access, a full system reboot is your next option.
Stop Service.
sudo "/opt/cisco/secureclient/zta/bin/Cisco Secure Client - Zero Trust Access.app/Contents/MacOS/Cisco Secure Client - Zero Trust Access" uninstall
Start Service.
open -a "/opt/cisco/secureclient/zta/bin/Cisco Secure Client - Zero Trust Access.app"
Note: If commands cannot be executed or the ZTA service cannot be restarted due to lack of administrative access, a full system reboot is your next option.
Open a CMD with admin privileges and run the next command:
"%ProgramFiles(x86)%\Cisco\Cisco Secure Client\acsocktool.exe" -sdf 0x400080152
DebugViewas administratorand enable the next menu options:Capture Kernel.Enable Verbose Kernel Output.Clock Time.Show Milliseconds.

Restart the client service via admin prompt:
net stop csc_vpnagent && net start csc_vpnagent
net stop csc_vpnagent && net start csc_vpnagentdoes not work, restart Cisco Secure Clientservice from services.msc.
Start Wireshark Capture.
Select all the interfaces, and start the packet capture.

KDF LogsandWireshark Capturethen follow the steps to capture DART Bundle.Cisco Secure Client Diagnostics & Reporting Tool (DART)with administrator privileges.
Custom.
System Information Extensiveand Network Connectivity Test.
"%ProgramFiles(x86)%\Cisco\Cisco Secure Client\acsocktool.exe" -cdf
Note: Collect all the logs: KDF Logs, Wireshark Capture and DART Bundle to the TAC Case.
#Enable ZTNA Logs
New-Item -Path "C:\ProgramData\Cisco\Cisco Secure Client\ZTA\logconfig.json" -ItemType "file" -Value '{"global" : "DBG_TRACE"}'
Limit-EventLog -LogName "Cisco Secure Client - Zero Trust Access" -MaximumSize 2240000KB
& "C:\Program Files (x86)\Cisco\Cisco Secure Client\acsocktool.exe" -sdf 0x400080152
Restart-Service csc_vpnagent
Restart-Service csc_zta_agent
#Disable ZTNA Logs
Remove-Item -Path "C:\ProgramData\Cisco\Cisco Secure Client\ZTA\logconfig.json"
Limit-EventLog -LogName "Cisco Secure Client - Zero Trust Access" -MaximumSize 6400KB
& "C:\Program Files (x86)\Cisco\Cisco Secure Client\acsocktool.exe" -cdf 0x400080152
Restart-Service csc_vpnagent
Restart-Service csc_zta_agent
Open terminal and follow the next command chain to enable KDF Logging on MacOS:
Stop Service.sudo "/opt/cisco/secureclient/bin/Cisco Secure Client - AnyConnect VPN Service.app/Contents/MacOS/Cisco Secure Client - AnyConnect VPN Service" uninstall
Enable Flag.echo debug=0x400080152 | sudo tee /opt/cisco/secureclient/kdf/acsock.cfg
Start Service.open -a "/opt/cisco/secureclient/bin/Cisco Secure Client - AnyConnect VPN Service.app"
Start Wireshark Capture.
Select all the interfaces, and start the packet capture.

KDF LogsandWireshark Capturethen follow the steps to capture DART Bundle.Cisco Secure Client - DART.
Include Legacy - Cisco AnyConnect Secure Mobility Client Logs.Include System Logs.Run.
Note: Collect all the logs: KDF Logs, Wireshark Capture and DART Bundle to the TAC Case.
| Revision | Publish Date | Comments |
|---|---|---|
2.0 |
30-Mar-2026
|
Updated Alt Text, and Formatting. |
1.0 |
31-Dec-2025
|
Initial Release |