input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:109.96.249.80/56949 dst outside:31.44.105.71/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:186.159.102.69/56949 dst outside:240.20.48.188/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:244.89.177.27/56949 dst outside:9.185.6.83/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:62.178.42.160/56949 dst outside:244.4.199.191/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/165.199.230.220(43803) -> entportal-qa-vip/244.115.24.190(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/157.239.33.38(43803) -> entportal-qa-vip/101.2.68.87(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/78.72.254.137(43803) -> entportal-qa-vip/254.110.129.80(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:16 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/150.185.153.79(43803) -> entportal-qa-vip/68.207.46.65(23) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/71.90.84.226(14015) -> PUB_DMZ/138.21.207.208(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/131.9.85.43(14015) -> PUB_DMZ/191.189.210.52(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/182.67.171.242(14015) -> PUB_DMZ/215.75.79.189(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
{ "priority": 132, "senderhost": "10.11.200.67", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:00:30 10.11.200.67 : %ASA-4-106100: access-list CSM_FW_ACL_ denied tcp Outside/68.48.233.178(14015) -> PUB_DMZ/157.172.24.53(22) hit-cnt 1 first hit [0x6921d058, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.11.200.67 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/71.38.109.212(56693) -> portal-vip/185.216.80.42(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/103.87.209.116(56693) -> portal-vip/213.172.45.200(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/3.107.64.235(56693) -> portal-vip/86.22.169.16(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 5774, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:10 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/15.60.84.221(56693) -> portal-vip/75.219.98.71(5774) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 5774 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/1.10.231.61(46594) -> entportal-qa-vip/99.19.59.214(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/142.125.142.132(46594) -> entportal-qa-vip/157.234.146.212(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/23.105.236.44(46594) -> entportal-qa-vip/40.6.225.227(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 13443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:20:42 10.10.124.188 : %ASA-4-106100: access-list acl-global denied tcp outside/230.236.81.203(46594) -> entportal-qa-vip/38.35.225.129(13443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 13443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:46.128.33.16/55896 dst outside:106.72.121.32/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:2.23.119.60/55896 dst outside:155.101.53.98/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:189.189.140.254/55896 dst outside:14.93.99.183/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
{ "priority": 132, "senderhost": "10.15.130.254", "serverport": 25000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkn...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:55: %ASA-4-106023: Deny tcp src VQE#2-Lab:13.253.52.235/55896 dst outside:77.53.224.176/25000 by access-group "VQE#2-Lab" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.15.130.254 serverport: 25000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: un...
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/194.132.15.94(32158) -> outside/81.48.153.176(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/92.3.49.16(32158) -> outside/9.52.217.156(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/67.186.169.156(32158) -> outside/69.173.51.136(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
{ "priority": 132, "senderhost": "10.121.224.132", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unkno...
Create a JSON artifact from the message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Feb 12 2023 13:21:47 10.121.224.132 : %ASA-4-106100: access-list acl-global denied tcp inside/37.146.208.234(32158) -> outside/48.230.236.66(443) hit-cnt 1 first hit [0x7b71e4d1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.121.224.132 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unk...
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Fe...
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:210.121.176.234 dst INSIDE:231.40.54.6 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: nor...
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Fe...
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:170.112.161.76 dst INSIDE:158.253.216.139 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: nor...
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Fe...
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:52.162.231.12 dst INSIDE:81.172.66.76 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: nor...
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Fe...
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:181.29.119.158 dst INSIDE:42.72.109.75 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: nor...
Explain this syslog message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Fe...
Create a JSON artifact from the message
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message