Event ID - PIX-4-106100

Message CodePIX-4-106100
SeverityWarning
Descriptionaccess-list acl_ID {permitted | denied |Test-allowed} protocol interface_name/source_address(source_port) ->interface_name/dest_address(dest_port) hit-cnt number ({first hit |number-second interval})
ExplanationIf you configured the log option for the access-list command, the packets matched an ACL statement. The message level depends on the level set in the access-list command (by default, the level is 6). The message indicates either the initial occurrance or the total number of occurrances during an interval. This message provides more information than message 106023, which only logs denied packets, and does not include the hit count or a configurable level. The following list describes the message values:
• permitted | denied | est-allowed —These values specify if the packet was permitted or denied by the ACL. If the value is est-allowed, the packet was denied by the ACL but was allowed for an already established session (for example, an internal user is allowed to accesss the Internet, and responding packets that would normally be denied by the ACL are accepted).
• protocol—TCP, UDP, ICMP, or an IP protocol number.
• interface_name—The interface name for the source or destination of the logged flow. The VLAN interfaces are supported.
• source_address—The source IP address of the logged flow.
• dest_address—The destination IP address of the logged flow.
• source_port—The source port of the logged flow (TCP or UDP). For ICMP, this field is 0.
• dest_port—The destination port of the logged flow (TCP or UDP). For ICMP, this field is icmp-type.
• hit-cnt number—The number of times this flow was permitted or denied by this ACL entry in the configured time interval. The value is 1 when the Cisco ASA generates the first system log message for this flow.
• first hit—The first message generated for this flow.
• number-second interval—The interval in which the hit count is accumulated. Set this interval using the access-list command with interval option.
User ActionNone required.
Reference Links

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.