Cisco ASA Audit Event: 106103

Cisco ASA Events

The logs of network perimeter devices such as firewalls, antivirus applications and intrusion prevention systems contain crucial information that helps to pre-emptively block security attacks and breaches. Hence, it's mandatory for you to monitor and audit these logs. Because Cisco ASA provides the combined functionality of all the three, it becomes all the more important to monitor its logs. 

ManageEngine's EventLog Analyzer, a comprehensive log management solution, collects and analyzes the log data from Cisco ASA devices, triggers alerts and generate reports on detected security incidents thus helping you to take suitable measures against security threats, if any. 

Cisco » 106103: Packet denied by ACL applied through VPN filter

106103: Packet denied by ACL applied through VPN filter

Cisco ASA is a security device that provides the combined capabilities of a firewall, an antivirus, and an intrusion prevention system. It also facilitates virtual private network (VPN) connections. It helps to detect threats and stop attacks before they spread through the network. 

Message: %ASA-4-106103: access-list acl_ID denied protocol for user username interface_name /source_address source_port interface_name /dest_address dest_port hit-cnt number first hit hash codes.

Event 106103 is generated when a packet is denied by an access-list that had been applied through a VPN filter. The ID of the Access Control List (ACL) and information on the source and destination interfaces are specified in the message.

How could you resolve this situation?

This event does not require any action.

We can help you simplify log management and improve your organization's security with EventLog Analyzer.

  • Enter your email id
    Please enter a valid email id
  • Enter your phone number
  • Select demo date
  •  
  • By clicking 'Schedule a personalized demo', you agree to processing of personal data according to the Privacy Policy. You can unsubscribe from our mails at anytime.