- 
    null
 
- show running-config
 - show saml metadata
 - show scansafe server
 - show scansafe statistics
 - show sctp
 - show service-policy
 - show shared license
 - show shun
 - show sip
 - show skinny
 - show sla monitor configuration
 - show sla monitor operational-state
 - show snmp-server engineid
 - show snmp-server group
 - show snmp-server host
 - show snmp-server statistics
 - show snmp-server user
 - show software authenticity development
 - show software authenticity file
 - show software authenticity keys
 - show software authenticity running
 - show ssh sessions
 - show ssl
 - show startup-config
 - show sunrpc-server active
 - show switch mac-address-table
 - show switch vlan
 - show sw-reset-button
 
show running-config through show sw-reset-button Commands 
    
    
 
    
 
 show running-config
To display the configuration that is currently running on the ASA, use the show running-config command in privileged EXEC mode.
show running-config [ all ] [ command ]
 
    
        
     Syntax Description
 
   Displays the entire operating configuration, including defaults.  |  
      |
Displays the configuration associated with a specific command. For available commands, see the CLI help using show running-config ?.  |  
      
 
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
The output from this command will also display syslog servers configured with IPv6 addresses.  |  
      |
 
    
        
     Usage Guidelines
 
   The show running-config command displays the active configuration in memory (including saved configuration changes) on the ASA.
To display the saved configuration in flash memory on the ASA, use the show configuration command.
The show running-config command output displays encrypted, masked, or clear text passwords when password encryption is either enabled or disabled.
 
   Note
 ASDM commands appear in the configuration after you use it to connect to or configure the ASA.
The default for error-recovery disable changed to disabled in ASA release 9.3. For that reason, you may notice that the show running-config command now shows error-recovery disable in the CLI when WebVPN error recovery is at the default value. We recommend to leave it disabled unless advised by Cisco’s Technical Assistance Center while troubleshooting a problem.
From ASA 9.13(1), the telemetry details were included to the output of this command. The show running-config command shows only the non-default configuration ( no service telemetry) of the telemetry service. Use the all command to also view the default telemetry service configuration.
Examples
The following is sample output from the show running-config command:
The following is sample output from the show running-config access-group command:
The following is sample output from the show running-config arp command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show saml metadata
Show the SAML metadata tunnel-group-name.
show saml metadata tunnel-group-name
 
    
        
     Syntax Description
 
   Enter the name of the tunnel group to display SAML metadata for.
 
    
        
     Command Default
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
    
  Examples
The following is sample output from the show scansafe server command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Creates an inspection class map for whitelisted users and groups.  |  
      
show scansafe server
To show the status of the Cloud Web Security proxy servers, use the show scansafe server command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Command Default
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   This command shows the status of the server, whether it is the current active server, the backup server, or unreachable.
In multiple context mode, the output of this command depends on the admin-contexts ability to reach the Scansafe servers. The admin context makes regular poll attempts to verify whether the Scansafe server is up when no traffic is going through the ASA. The polling attempt interval is unconfigurable and is fixed at 15 minutes. The admin-context also sends keepalives to the Scansafe tower.
Examples
The following is sample output from the show scansafe server command:
 
    
        
     Related Commands
 
   show scansafe statistics
To show information about Cloud Web Security activity, use the show scansafe statistics command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Command Default
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   The show scansafe statistics command shows information about Cloud Web Security activity, such as the number of connections redirected to the proxy server, the number of current connections being redirected, and the number of whitelisted connections.
Examples
The following is sample output from the show scansafe statistics command:
 
    
        
     Related Commands
 
   show sctp
To display current Stream Control Transmission Protocol (SCTP) cookies and associations, use the show sctp command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Detailed output now includes information about multi-homing, multiple streams, and frame reassembly.  |  
      
 
    
        
     Usage Guidelines
 
   The show sctp command displays information about SCTP cookies and associations.
Examples
The following is sample output from the show sctp command:
The following is sample output from the show sctp detail command:
Starting with 9.7(1), detailed output includes information about multi-homing, multiple streams, and frame reassembly.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Shows information on hosts making connections through the ASA, per interface.  |  
      |
show service-policy
To display the service policy statistics, use the show service-policy command in privileged EXEC mode.
show service-policy [ global | interface intf ] [ csc | cxsc | inspect inspection [ arguments ] | ips | police | priority | set connection [ details ] | sfr | shape | user-statistics ]
show service-policy [ global | interface intf ] [ flow protocol { host src_host | src_ip src_mask } [ eq src_port ] { host dest_host | dest_ip dest_mask } [ eq dest_port ] [ icmp_number | icmp_control_message ]]
 
    
        
     Syntax Description
 
    
    
        
     Defaults
 
   If you do not specify any arguments, this command shows all global and interface policies.
 
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
    
    
        
     Usage Guidelines
 
   The number of embryonic connections displayed in the show service-policy command output indicates the current number of embryonic connections to an interface for traffic matching that defined by the class-map command. The “embryonic-conn-max” field shows the maximum embryonic limit configured for the traffic class using the Modular Policy Framework. If the current embryonic connections displayed equals or exceeds the maximum, TCP intercept is applied to new TCP connections that match the traffic type defined by the class-map command.
When you make service policy changes to the configuration, all new connections use the new service policy. Existing connections continue to use the policy that was configured at the time of the connection establishment. show command output will not include data about the old connections. For example, if you remove a QoS service policy from an interface, then re-add a modified version, then the show service-policy command only displays QoS counters associated with new connections that match the new service policy; existing connections on the old policy no longer show in the command output. To ensure that all connections use the new policy, you need to disconnect the current connections so they can reconnect using the new policy. See the clear conn or clear local-host commands.
 
   Note
 For an inspect icmp and inspect icmp error policies, the packet counts only include the echo request and reply packets.
Examples
The following is sample output from the show service-policy global command:
The following is sample output from the show service-policy priority command:
The following is sample output from the show service-policy flow command:
The following is sample output from the show service-policy inspect http command. This example shows the statistics of each match command in a match-any class map.
For devices that have multiple CPU cores, there is a counter for lock failure. The locking mechanism is used to protect shared data structures and variables, because they can be used by multiple cores.When the core fails to acquire a lock, it tries to get the lock again. The lock fail counter increments for each failed attempt.
The following is sample output from the show service-policy inspect waas command. This example shows the waas statistics.
The following command shows the statistics for GTP inspection. The output is explained in Table 12-1 .
The following command displays information about the PDP contexts:
Starting with ASA 9.6.2, GTP PDP context information is shown one per line instead of in a table. This makes it easier to read when using IPv6 addresses.
Table 12-2 describes the output from the show service-policy inspect gtp pdp-context command.
|  
         |  
        
         |  
      
|---|---|
Displays the serving gateway service node (SGSN) or serving gateway (SGW).  |  
      |
Displays the time for which the PDP or bearer context has not been in use.  |  
      |
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the service policies configured in the running configuration.  |  
      
show shared license
To show shared license statistics, use the show shared license command in privileged EXEC mode. Optional keywords are available only for the licensing server.
show shared license [ detail | client [ hostname ] | backup ]
 
    
        
     Syntax Description
 
    
    
        
     Command Default
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   To clear the statistics, enter the clear shared license command.
Examples
The following is sample output from the show shared license command on the license participant:
Table 12-3 describes the output from the show shared license command.
The following is sample output from the show shared license detail command on the license server:
 
    
        
     Related Commands
 
   show shun
To display shun information, use the show shun command in privileged EXEC mode.
show shun [ src_ip | statistics ]
 
    
        
     Syntax Description
 
    
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
For threat events, the severity level was changed from a warning to a notification. Threat events can be triggered every five minutes.  |  
      
Examples
The following is sample output from the show shun command:
 
    
        
     Related Commands
 
   show sip
To display SIP sessions, use the show sip command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   The show sip command displays information for SIP sessions established across the ASA.
 
   Note
 We recommend that you configure the pager command before using the show sip command. If there are a lot of SIP session records and the pager command is not configured, it will take a while for the show sip command output to reach its end.
Examples
The following is sample output from the show sip command:
 This sample shows two active SIP sessions on the ASA (as shown in the  Total field). Each  call-id  represents a call.
 The first session, with the  call-id  c3943000-960ca-2e43-228f@10.130.56.44, is in the state  Call Init,  which means the session is still in call setup. Call setup is complete only when the ACK is seen. This session has been idle for 1 second.
 The second session is in the state  Active, in which call setup is complete and the endpoints are exchanging media. This session has been idle for 6 seconds.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the connection state for different connection types.  |  
      |
Sets the maximum idle time duration for different protocols and session types.  |  
      
show skinny
To troubleshoot SCCP (Skinny) inspection engine issues, use the show skinny command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   The show skinny command displays information for SCCP (Skinny) sessions.
Examples
The following is sample output from the show skinny command under the following conditions. There are two active Skinny sessions set up across the ASA. The first one is established between an internal Cisco IP Phone at local address 10.0.0.11 and an external Cisco CallManager at 172.18.1.33. TCP port 2000 is the CallManager. The second one is established between another internal Cisco IP Phone at local address 10.0.0.22 and the same Cisco CallManager.
The output indicates a call has been established between both internal Cisco IP Phones. The RTP listening ports of the first and second phones are UDP 22948 and 20798 respectively.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the connection state for different connection types.  |  
      |
Sets the maximum idle time duration for different protocols and session types.  |  
      
show sla monitor configuration
To display the configuration values, including the defaults, for SLA operations, use the show sla monitor configuration command in user EXEC mode.
show sla monitor configuration [ sla-id ]
 
    
        
     Syntax Description
 
   (Optional) The ID number of the SLA operation. Valid values are from 1 to 2147483647.  |  
      
 
    
        
     Defaults
 
   If the sla-id is not specified, the configuration values for all SLA operations are shown.
 
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   Use the show running config sla monitor command to see the SLA operation commands in the running configuration.
Examples
The following is sample output from the show sla monitor command. It displays the configuration values for SLA operation 123. Following the output of the show sla monitor command is the output of the show running-config sla monitor command for the same SLA operation.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the SLA operation configuration commands in the running configuration.  |  
      |
show sla monitor operational-state
To display the operational state of SLA operations, use the show sla monitor operational-state command in user EXEC mode.
show sla monitor operational-state [ sla-id ]
 
    
        
     Syntax Description
 
   (Optional) The ID number of the SLA operation. Valid values are from 1 to 2147483647.  |  
      
 
    
        
     Defaults
 
   If the sla-id is not specified, statistics for all SLA operations are displayed.
 
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   Use the show running-config sla monitor command to display the SLA operation commands in the running configuration.
Examples
The following is sample output from the show sla monitor operational-state command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the SLA operation configuration commands in the running configuration.  |  
      |
show snmp-server engineid
To display the identification of the SNMP engine that has been configured on the ASA, use the show snmp-server engineid command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show snmp-server engineid command:
ciscoasa# show snmp-server engineid 
    
    
        
     Usage Guidelines 
 
   An SNMP engine is a copy of SNMP that can reside on a local device. The engine ID is a unique value that is assigned for each SNMP agent for each ASA context. The engine ID is not configurable on the ASA. The engine ID is 25 bytes long, and is used to generate encrypted passwords. The encrypted passwords are then stored in flash memory. The engine ID can be cached. In a failover pair, the engine ID is synchronized with the peer.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show snmp-server group
To display the names of configured SNMP groups, the security model being used, the status of different views, and the storage type of each group, use the show snmp-server group command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show snmp-server group command:
ciscoasa# show snmp-server group 
    
    
        
     Usage Guidelines 
 
   SNMP users and groups are used according to the View-based Access Control Model (VACM) for SNMP. The SNMP group determines the security model to be used. The SNMP user should match the security model of the SNMP group. Each SNMP group name and security level pair must be unique.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show snmp-server host
To display the names of configured SNMP hosts that belong to a host group, the interface being used, and the version of SNMP being used, use the show snmp-server host command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
The output was updated to show only active hosts that are polling the ASA, as well as the statically configured hosts.  |  
      
Examples
The following is sample output from the show snmp-server host command:
ciscoasa# show snmp-server host 
   The following is sample output from the show snmp-server host command as of Version 9.4(1), which shows only the active hosts polling the ASA:
ciscoasa# show snmp-server host 
    
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show snmp-server statistics
To display SNMP server statistics, use the show snmp-server statistics command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show snmp-server statistics command:
0 SNMP packets input 
    0 Bad SNMP version errors 
    0 Unknown community name 
    0 Illegal operation for community name supplied 
    0 Encoding errors 
    0 Number of requested variables 
    0 Number of altered variables 
    0 Get-request PDUs 
    0 Get-next PDUs 
    0 Get-bulk PDUs 
    0 Set-request PDUs (Not supported) 
   0 SNMP packets output 
    0 Too big errors (Maximum packet size 512) 
    0 No such name errors 
    0 Bad values errors 
    0 General errors 
    0 Response PDUs 
    0 Trap PDUs 
    
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show snmp-server user
To display information about the configured characteristics of SNMP users, use the show snmp-server user command in privileged EXEC mode.
show snmp-server user [ username ]
 
    
        
     Syntax Description
 
   (Optional) Identifies a specific user or users about which to display SNMP information.  |  
      
 
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show snmp-server user command:
ciscoasa# show snmp-server user authuser 
   The output provides the following information:
- The username, which is a string that identifies the name of the SNMP user.
 - The engine ID, which is a string that identifies the copy of SNMP on the ASA.
 - The storage-type, which indicates whether or not the settings have been set in volatile or temporary memory on the ASA, or in nonvolatile or persistent memory, in which settings remain after the ASA has been turned off and on again.
 - The active access list, which is the standard IP access list associated with the SNMP user.
 - The Rowstatus, which indicates whether or not it is active or inactive.
 - The authentication protocol, which identifies which authentication protocol is being used. Options are MD5, SHA, or none. If authentication is not supported in your software image, this field does not appear.
 - The privacy protocol, which indicates whether or not DES packet encryption is enabled. If privacy is not supported in your software image, this field does not appear.
 - The group name, which indicates to which SNMP group the user belongs. SNMP groups are defined according to the View-based Access Control Model (VACM).
 
 
    
        
     Usage Guidelines 
 
   An SNMP user must be part of an SNMP group. If you do not enter the username argument, the show snmp-server user command displays information about all configured users. If you enter the username argument and the user exists, the information about that user appears.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show software authenticity development
To verify that the loading of development key signed images is enabled or disabled, use the show software authenticity development command in privileged EXEC mode.
show software authenticity development
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show software authenticity file command:
 
    
        
     Related Commands
 
   show software authenticity file
To display digital signature information related to software authentication for a specific image file, use the show software authenticity file command in privileged EXEC mode.
show software authenticity [ filename ]
 
    
        
     Syntax Description
 
    
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show software authenticity file command:
ciscoasa# show software authenticity file asa913.SSA 
   The output provides the following information:
- The filename, which is the name of the filename in memory.
 - The image type, which is the type of image being shown.
 - The signer information specifies the signature information, which includes the following:
 
 –
 The common name, which is the name of the software manufacturer.
 –
 The organization unit, which indicates the hardware that the software image is deployed on. 
 –
 The organization name, which is the owner of the software image.
- The certificate serial number, which is the certificate serial number for the digital signature.
 - The hash algorithm, which indicates the type of hash algorithm used in digital signature verification.
 - The signature algorithm, which identifies the type of signature algorithm used in digital signature verification.
 - The key version, which indicates the key version used for verification.
 
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the software version, hardware configuration, license key, and related uptime data.  |  
      
show software authenticity keys
To display information about development keys and release keys that are stored in SPI flash, use the show software authenticity keys command in privileged EXEC mode.
show software authenticity keys
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show software authenticity keys command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Displays the digital signature information related to the current running file.  |  
      |
show software authenticity running
To display digital signature information related to software authentication for a specific image file, use the show software authenticity running command in privileged EXEC mode. This command is the same as show software authenticity file except that it displays the digital signature information related to the current running file.
show software authenticity running
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
Examples
The following is sample output from the show software authenticity running command:
The output provides the following information:
- The filename, which is the name of the filename in memory.
 - The image type, which is the type of image being shown.
 - The signer information specifies the signature information, which includes the following:
 
 –
 The common name, which is the name of the software manufacturer.
 –
 The organization unit, which indicates the hardware that the software image is deployed on. 
 –
 The organization name, which is the owner of the software image.
- The certificate serial number, which is the certificate serial number for the digital signature.
 - The hash algorithm, which indicates the type of hash algorithm used in digital signature verification.
 - The signature algorithm, which identifies the type of signature algorithm used in digital signature verification.
 - The key version, which indicates the key version used for verification.
 
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show ssh sessions
To display information about the active SSH sessions on the ASA, use the show ssh sessions command in privileged EXEC mode.
show ssh sessions [ hostname or A.B.C.D ] [ hostname or X:X:X:X::X ] [ detail ]
 
    
        
     Syntax Description
 
   (Optional) Displays SSH session information for only the specified SSH client IPv4 address.  |  
      |
(Optional) Displays SSH session information for only the specified SSH client IPv6 address.  |  
      |
 
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   The SID is a unique number that identifies the SSH session. The Client IP is the IP address of the system running an SSH client. The Version is the protocol version number that the SSH client supports. If the SSH only supports SSH version 1, then the Version column displays 1.5. If the SSH client supports both SSH version 1 and SSH version 2, then the Version column displays 1.99. If the SSH client only supports SSH version 2, then the Version column displays 2.0. The Encryption column shows the type of encryption that the SSH client is using. The State column shows the progress that the client is making as it interacts with the ASA. The Username column lists the login username that has been authenticated for the session. The Mode column describes the direction of the SSH data streams.
For SSH version 2, which can use the same or different encryption algorithms, the Mode field displays in and out. For SSH version 1, which uses the same encryption in both directions, the Mode field displays nil (‘-’) and allows only one entry per connection.
Examples
The following is sample output from the show ssh sessions command:
The following is sample output from the show ssh sessions detail command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show ssl
To display information about the SSL configuration and active SSL sessions on the ASA, use the show ssl command in privileged EXEC mode.
show ssl [ cache | ciphers [ level ] | errors | information | mib | objects ]
 
    
        
     Syntax Description
 
    
    
        
     Defaults
 
   For show ssl information, the following default settings are applied with or without 3DES:
 
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
    
    
        
     Usage Guidelines
 
   This command shows information about the current SSLv2 and SSLv3 sessions, including the enabled cipher order, which ciphers are disabled, SSL trustpoints being used, and whether or not certificate authentication is enabled.
Examples
The following is sample output from the show ssl command:
The following is sample output from the show ssl ciphers fips command:
The following is output from the show ssl ciphers command.
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Sets the port on which the server listens for SSL connections from participants.  |  
      |
Specifies the encryption algorithms for the SSL, DTLS, and TLS protocols.  |  
      
show startup-config
To show the startup configuration or to show any errors when the startup configuration loaded, use the show startup-config command in privileged EXEC mode.
show startup-config [ errors ]
 
    
        
     Syntax Description
 
   (Optional) Shows any errors that were generated when the ASA loaded the startup configuration.  |  
      
 
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
|  
       1.The errors keyword is only available in single mode and the system execution space,  |  
    
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   In multiple context mode, the show startup-config command shows the startup configuration for your current execution space: the system configuration or the security context.
The show startup-config command output displays encrypted, masked, or clear text passwords when password encryption is either enabled or disabled.
To clear the startup errors from memory, use the clear startup-config errors command.
Examples
The following is sample output from the show startup-config command:
The following is sample output from the show startup-config errors command:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
show sunrpc-server active
To display the pinholes open for Sun RPC services, use the show sunrpc-server active command in privileged EXEC mode.
 
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   Use the show sunrpc-server active command to display the pinholes open for Sun RPC services, such as NFS and NIS.
Examples
To display the pinholes open for Sun RPC services, enter the show sunrpc-server active command. The following is sample output from the show sunrpc-server active command:
The entry in the LOCAL column shows the IP address of the client or server on the inside interface, while the value in the FOREIGN column shows the IP address of the client or server on the outside interface.
 
    
        
     Related Commands
 
   show switch mac-address-table
To view the switch MAC address table, use the show switch mac-address-table command in privileged EXEC mode.
 
  Note
 Supported for the Firepower 1010 and ASA 5505 only.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   The switch MAC address table maintains the MAC address-to-switch port mapping for traffic within each VLAN in the switch hardware. If you are in transparent firewall mode, use the show mac-address-table command to view the bridge MAC address table in the ASA software. The bridge MAC address table maintains the MAC address-to-VLAN interface mapping for traffic that passes between VLANs.
Examples
The following is sample output from the show switch mac-address-table command.
Table 12-4 shows each field description:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Shows the MAC address table for models that do not have a built-in switch.  |  
      |
show switch vlan
To view the VLANs and the associated switch ports, use the show switch vlan command in privileged EXEC mode.
 
  Note
 Supported for the Firepower 1010 and ASA 5505 only.
 
    
        
     Syntax Description
 
    
   
    
        
     Defaults
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   This command is for models with built-in switches only. For other models, use the show vlan command.
Examples
The following is sample output from the show switch vlan command.
Table 12-4 shows each field description:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Creates a VLAN interface and enters interface configuration mode.  |  
      |
Shows the VLANs for models that do not have built-in switches.  |  
      |
show sw-reset-button
To show whether the ASA 5506-X, 5508-X, or 5516-X software reset button is enabled, use the show sw-reset-button command in privileged EXEC mode.
 
    
        
     Syntax Description
 
    
   
    
        
     Command Default
 
    
   
   
       
    Command Modes
 
  The following table shows the modes in which you can enter the command:
|  
        |  
       
        |  
       
        |  
     |||
|---|---|---|---|---|---|
|  
        |  
       
        |  
       
        |  
       
        |  
     ||
|  
        |  
       
        |  
     ||||
 
    
        
     Command History
 
   |  
         |  
        
         |  
      
|---|---|
 
    
        
     Usage Guidelines
 
   Enable or disable the software reset button using the service sw-reset-button command. The reset button is a small recessed button on the rear panel that if pressed for longer than three seconds resets the ASA to its default “as-shipped” state following the next reboot. Configuration variables are reset to factory default. However, the flash is not erased, and no files are removed.
Examples
The following example enables the software reset button:
The following example disables the software reset button:
 
    
        
     Related Commands
 
   |  
         |  
        
         |  
      
|---|---|
Feedback