106022: Deny protocol connection spoof
Cisco ASA is a security device that provides the combined capabilities of a firewall, an antivirus, and an intrusion prevention system. It also facilitates virtual private network (VPN) connections. It helps to detect threats and stop attacks before they spread through the network.
Message: %ASA-1-106022: Deny protocol connection spoof from source_address to dest_address on interface interface_name.
Event 106022 is generated when a packet, matching a connection, arrives on a different interface, from the one on which the connection began.
How could you resolve this situation?
Ensure that the routing is not asymmetric.