Besides the show commands John mentioned (those won't send out to an external server), you can check for the syslog message generated during login (varies per the type of VPN that's setup). Typically that's a level 5 or 6 syslog message. You can setup the ASA to send that message only (or elevate its priority and send all messages of say priority 4 or higher).
You can't easily capture what servers were accessed unless you filter out all the level 6 tcp connections and udp flow messages. We generally don't recommend logging at that level unless you're troubleshooting or are required to do so for regulatory or legal reasons.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...