input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 129.103.152.219
serverIP: 10.187.22.130 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "109.96.249.80",
"serverIP": "31.44.105.71"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 109.96.249.80
serverIP: 31.44.105.71 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "186.159.102.69",
"serverIP": "240.20.48.188"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 186.159.102.69
serverIP: 240.20.48.188 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "244.89.177.27",
"serverIP": "9.185.6.83"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 244.89.177.27
serverIP: 9.185.6.83 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "62.178.42.160",
"serverIP": "244.4.199.191"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 62.178.42.160
serverIP: 244.4.199.191 | Explain this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43803,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "165.199.230.220",
"serverIP": "244.115.24.190"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43803
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 165.199.230.220
serverIP: 244.115.24.190 | Explain this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43803,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "157.239.33.38",
"serverIP": "101.2.68.87"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43803
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 157.239.33.38
serverIP: 101.2.68.87 | Explain this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43803,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "78.72.254.137",
"serverIP": "254.110.129.80"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43803
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 78.72.254.137
serverIP: 254.110.129.80 | Explain this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43803,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "150.185.153.79",
"serverIP": "68.207.46.65"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43803
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 150.185.153.79
serverIP: 68.207.46.65 | Explain this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| {
"priority": 132,
"senderhost": "10.11.200.67",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 14015,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "71.90.84.226",
"serverIP": "138.21.207.208"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.11.200.67
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 14015
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 71.90.84.226
serverIP: 138.21.207.208 | Explain this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| {
"priority": 132,
"senderhost": "10.11.200.67",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 14015,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "131.9.85.43",
"serverIP": "191.189.210.52"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.11.200.67
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 14015
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 131.9.85.43
serverIP: 191.189.210.52 | Explain this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| {
"priority": 132,
"senderhost": "10.11.200.67",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 14015,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "182.67.171.242",
"serverIP": "215.75.79.189"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.11.200.67
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 14015
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 182.67.171.242
serverIP: 215.75.79.189 | Explain this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| {
"priority": 132,
"senderhost": "10.11.200.67",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 14015,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "68.48.233.178",
"serverIP": "157.172.24.53"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.11.200.67
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 14015
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 68.48.233.178
serverIP: 157.172.24.53 | Explain this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 5774,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 56693,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "71.38.109.212",
"serverIP": "185.216.80.42"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 5774
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 56693
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 71.38.109.212
serverIP: 185.216.80.42 | Explain this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 5774,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 56693,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "103.87.209.116",
"serverIP": "213.172.45.200"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 5774
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 56693
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 103.87.209.116
serverIP: 213.172.45.200 | Explain this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 5774,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 56693,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "3.107.64.235",
"serverIP": "86.22.169.16"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 5774
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 56693
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 3.107.64.235
serverIP: 86.22.169.16 | Explain this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 5774,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 56693,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "15.60.84.221",
"serverIP": "75.219.98.71"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 5774
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 56693
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 15.60.84.221
serverIP: 75.219.98.71 | Explain this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 13443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 46594,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "1.10.231.61",
"serverIP": "99.19.59.214"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 13443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 46594
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 1.10.231.61
serverIP: 99.19.59.214 | Explain this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 13443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 46594,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "142.125.142.132",
"serverIP": "157.234.146.212"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 13443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 46594
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 142.125.142.132
serverIP: 157.234.146.212 | Explain this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 13443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 46594,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "23.105.236.44",
"serverIP": "40.6.225.227"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 13443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 46594
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 23.105.236.44
serverIP: 40.6.225.227 | Explain this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 13443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 46594,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "230.236.81.203",
"serverIP": "38.35.225.129"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 13443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 46594
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 230.236.81.203
serverIP: 38.35.225.129 | Explain this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| {
"priority": 132,
"senderhost": "10.15.130.254",
"serverport": 25000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 55896,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "46.128.33.16",
"serverIP": "106.72.121.32"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.15.130.254
serverport: 25000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 55896
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 46.128.33.16
serverIP: 106.72.121.32 | Explain this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| {
"priority": 132,
"senderhost": "10.15.130.254",
"serverport": 25000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 55896,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "2.23.119.60",
"serverIP": "155.101.53.98"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.15.130.254
serverport: 25000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 55896
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 2.23.119.60
serverIP: 155.101.53.98 | Explain this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| {
"priority": 132,
"senderhost": "10.15.130.254",
"serverport": 25000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 55896,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "189.189.140.254",
"serverIP": "14.93.99.183"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.15.130.254
serverport: 25000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 55896
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 189.189.140.254
serverIP: 14.93.99.183 | Explain this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| {
"priority": 132,
"senderhost": "10.15.130.254",
"serverport": 25000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 55896,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "13.253.52.235",
"serverIP": "77.53.224.176"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.15.130.254
serverport: 25000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 55896
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 13.253.52.235
serverIP: 77.53.224.176 | Explain this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.121.224.132",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 32158,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "194.132.15.94",
"serverIP": "81.48.153.176"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.121.224.132
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 32158
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 194.132.15.94
serverIP: 81.48.153.176 | Explain this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.121.224.132",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 32158,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "92.3.49.16",
"serverIP": "9.52.217.156"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.121.224.132
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 32158
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 92.3.49.16
serverIP: 9.52.217.156 | Explain this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.121.224.132",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 32158,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "67.186.169.156",
"serverIP": "69.173.51.136"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.121.224.132
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 32158
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 67.186.169.156
serverIP: 69.173.51.136 | Explain this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| {
"priority": 132,
"senderhost": "10.121.224.132",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 32158,
"vendorcode": "ASA-4-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "37.146.208.234",
"serverIP": "48.230.236.66"
} | Create a JSON artifact from the message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.121.224.132
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 32158
vendorcode: ASA-4-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 37.146.208.234
serverIP: 48.230.236.66 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "210.121.176.234",
"serverIP": "231.40.54.6"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 210.121.176.234
serverIP: 231.40.54.6 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "170.112.161.76",
"serverIP": "158.253.216.139"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 170.112.161.76
serverIP: 158.253.216.139 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "52.162.231.12",
"serverIP": "81.172.66.76"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 52.162.231.12
serverIP: 81.172.66.76 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "181.29.119.158",
"serverIP": "42.72.109.75"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 181.29.119.158
serverIP: 42.72.109.75 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "0.33.18.22",
"serverIP": "170.217.223.242"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |