input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 129.103.152.219 serverIP: 10.187.22.130
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "109.96.249.80", "serverIP": "31.44.105.71" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 109.96.249.80 serverIP: 31.44.105.71
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "186.159.102.69", "serverIP": "240.20.48.188" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 186.159.102.69 serverIP: 240.20.48.188
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "244.89.177.27", "serverIP": "9.185.6.83" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 244.89.177.27 serverIP: 9.185.6.83
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "62.178.42.160", "serverIP": "244.4.199.191" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 62.178.42.160 serverIP: 244.4.199.191
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43803, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "165.199.230.220", "serverIP": "244.115.24.190" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43803 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 165.199.230.220 serverIP: 244.115.24.190
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43803, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "157.239.33.38", "serverIP": "101.2.68.87" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43803 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 157.239.33.38 serverIP: 101.2.68.87
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43803, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "78.72.254.137", "serverIP": "254.110.129.80" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43803 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 78.72.254.137 serverIP: 254.110.129.80
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43803, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "150.185.153.79", "serverIP": "68.207.46.65" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43803 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 150.185.153.79 serverIP: 68.207.46.65
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 14015, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "71.90.84.226", "serverIP": "138.21.207.208" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 14015 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 71.90.84.226 serverIP: 138.21.207.208
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 14015, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "131.9.85.43", "serverIP": "191.189.210.52" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 14015 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 131.9.85.43 serverIP: 191.189.210.52
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 14015, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "182.67.171.242", "serverIP": "215.75.79.189" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 14015 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 182.67.171.242 serverIP: 215.75.79.189
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 14015, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "68.48.233.178", "serverIP": "157.172.24.53" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 14015 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 68.48.233.178 serverIP: 157.172.24.53
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 56693, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "71.38.109.212", "serverIP": "185.216.80.42" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 56693 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 71.38.109.212 serverIP: 185.216.80.42
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 56693, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "103.87.209.116", "serverIP": "213.172.45.200" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 56693 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 103.87.209.116 serverIP: 213.172.45.200
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 56693, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "3.107.64.235", "serverIP": "86.22.169.16" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 56693 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 3.107.64.235 serverIP: 86.22.169.16
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 56693, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "15.60.84.221", "serverIP": "75.219.98.71" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 56693 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 15.60.84.221 serverIP: 75.219.98.71
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 46594, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "1.10.231.61", "serverIP": "99.19.59.214" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 46594 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 1.10.231.61 serverIP: 99.19.59.214
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 46594, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "142.125.142.132", "serverIP": "157.234.146.212" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 46594 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 142.125.142.132 serverIP: 157.234.146.212
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 46594, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "23.105.236.44", "serverIP": "40.6.225.227" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 46594 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 23.105.236.44 serverIP: 40.6.225.227
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 46594, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "230.236.81.203", "serverIP": "38.35.225.129" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 46594 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 230.236.81.203 serverIP: 38.35.225.129
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 55896, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "46.128.33.16", "serverIP": "106.72.121.32" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 55896 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 46.128.33.16 serverIP: 106.72.121.32
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 55896, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "2.23.119.60", "serverIP": "155.101.53.98" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 55896 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 2.23.119.60 serverIP: 155.101.53.98
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 55896, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "189.189.140.254", "serverIP": "14.93.99.183" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 55896 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 189.189.140.254 serverIP: 14.93.99.183
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group \"VQE#2-Lab\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 55896, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "13.253.52.235", "serverIP": "77.53.224.176" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 55896 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 13.253.52.235 serverIP: 77.53.224.176
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 32158, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "194.132.15.94", "serverIP": "81.48.153.176" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 32158 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 194.132.15.94 serverIP: 81.48.153.176
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 32158, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "92.3.49.16", "serverIP": "9.52.217.156" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 32158 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 92.3.49.16 serverIP: 9.52.217.156
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 32158, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "67.186.169.156", "serverIP": "69.173.51.136" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 32158 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 67.186.169.156 serverIP: 69.173.51.136
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 32158, "vendorcode": "ASA-4-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "37.146.208.234", "serverIP": "48.230.236.66" }
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 32158 vendorcode: ASA-4-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 37.146.208.234 serverIP: 48.230.236.66
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "210.121.176.234", "serverIP": "231.40.54.6" }
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 23 streamName: cisco_asa clientIP: 210.121.176.234 serverIP: 231.40.54.6
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "170.112.161.76", "serverIP": "158.253.216.139" }
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 23 streamName: cisco_asa clientIP: 170.112.161.76 serverIP: 158.253.216.139
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "52.162.231.12", "serverIP": "81.172.66.76" }
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 23 streamName: cisco_asa clientIP: 52.162.231.12 serverIP: 81.172.66.76
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "181.29.119.158", "serverIP": "42.72.109.75" }
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 23 streamName: cisco_asa clientIP: 181.29.119.158 serverIP: 42.72.109.75
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "0.33.18.22", "serverIP": "170.217.223.242" }
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message