<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why is Layer-2-adjacent traffic from admin-PC to ASA logged as &amp;quot;Deny&amp;quot;? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610320#M1090078</link>
    <description>&lt;P&gt;ASA 5506-X Very basic initial config.&lt;/P&gt;&lt;P&gt;Purpose is to firewall my server lab from my HOME-NET and the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA is on my HOME-NET 192.168.82.0.&lt;/P&gt;&lt;P&gt;PC is 192.168.82.99.&lt;/P&gt;&lt;P&gt;ASA HOME-NET (outside) interface is 192.168.82.100.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ASDM to the ASA on 192.168.82.100.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I bring up logging monitor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing Deny messages generated by my ASDM session&amp;nbsp;from my PC 192.168.82.99 to the ASA 192.168.82.100... even though they are in the same Layer-2 together, so the traffic is getting to the ASA just fine... I see my configuration changes happening successfully via the console session (show run). Why are the Deny messages there?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(6 May 15 2022 04:11:46 106015 192.168.82.99 1041 192.168.82.100 443 Deny TCP (no connection) from 192.168.82.99/1041 to 192.168.82.100/443 flags FIN ACK on interface HOME-NET)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I properly configure to get rid of them? There is no session (no connection) established, it says... I get that... but I tried creating a rule on the HOME-NET interface that explicitly allows .99 to talk to .100 via 443... wouldn't it then establish a sesh that could be "tracked" as an established session? How do I establish that connection to avoid this Deny from being triggered. I assume it is benign and can be ignored, but I'm trying to understand what/why its happening and if I can "properly" avoid it.&lt;/P&gt;</description>
    <pubDate>Sun, 15 May 2022 04:48:25 GMT</pubDate>
    <dc:creator>Corey Koellein</dc:creator>
    <dc:date>2022-05-15T04:48:25Z</dc:date>
    <item>
      <title>Why is Layer-2-adjacent traffic from admin-PC to ASA logged as "Deny"?</title>
      <link>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610320#M1090078</link>
      <description>&lt;P&gt;ASA 5506-X Very basic initial config.&lt;/P&gt;&lt;P&gt;Purpose is to firewall my server lab from my HOME-NET and the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA is on my HOME-NET 192.168.82.0.&lt;/P&gt;&lt;P&gt;PC is 192.168.82.99.&lt;/P&gt;&lt;P&gt;ASA HOME-NET (outside) interface is 192.168.82.100.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ASDM to the ASA on 192.168.82.100.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I bring up logging monitor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing Deny messages generated by my ASDM session&amp;nbsp;from my PC 192.168.82.99 to the ASA 192.168.82.100... even though they are in the same Layer-2 together, so the traffic is getting to the ASA just fine... I see my configuration changes happening successfully via the console session (show run). Why are the Deny messages there?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(6 May 15 2022 04:11:46 106015 192.168.82.99 1041 192.168.82.100 443 Deny TCP (no connection) from 192.168.82.99/1041 to 192.168.82.100/443 flags FIN ACK on interface HOME-NET)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I properly configure to get rid of them? There is no session (no connection) established, it says... I get that... but I tried creating a rule on the HOME-NET interface that explicitly allows .99 to talk to .100 via 443... wouldn't it then establish a sesh that could be "tracked" as an established session? How do I establish that connection to avoid this Deny from being triggered. I assume it is benign and can be ignored, but I'm trying to understand what/why its happening and if I can "properly" avoid it.&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 04:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610320#M1090078</guid>
      <dc:creator>Corey Koellein</dc:creator>
      <dc:date>2022-05-15T04:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Layer-2-adjacent traffic from admin-PC to ASA logged as &amp;qu</title>
      <link>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610343#M1090079</link>
      <description>&lt;P&gt;Interface HOME-NET has security-level 0 with IP address 192.168.82.100 and your PC is connected to this subnet with IP address 192.168.82.99. you have enable the https on HOME-NET to get acess the ASDM. your access-rule defined in the shown figure is to let the 192.168.82.99 to connect 192.168.82.100 port https(443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;looking into your logs106015 and 302014.&amp;nbsp; the 302014 log entry is TCP Rset-O (Means that the HOME-NET host send a reset).The 106015 Deny TCP (no connection) FIN ACK on Interface HOME-NET. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so PC sent TCP Rest and ASA Acknowledge it and Finish the session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can set up the capture on HOME-NET interface to get more detail and download it on wireshark&lt;/P&gt;
&lt;PRE&gt;capture HOME-NET interface HOME-NET match ip host 192.168.82.99 host 192.168.82.100&lt;/PRE&gt;</description>
      <pubDate>Sun, 15 May 2022 09:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610343#M1090079</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-15T09:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Layer-2-adjacent traffic from admin-PC to ASA logged as &amp;qu</title>
      <link>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610370#M1090080</link>
      <description>&lt;P&gt;&lt;SPAN&gt;http server enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;http x.x.x.x y.y.y.y outside &amp;lt;- are you config this ??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 11:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610370#M1090080</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-15T11:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Layer-2-adjacent traffic from admin-PC to ASA logged as &amp;qu</title>
      <link>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610461#M1090086</link>
      <description>&lt;P&gt;The ACL that you refer to in the screenshot is to allow THROUGH THE BOX traffic and not TO THE BOX traffic, so this will not have any effect on your ASDM connection.&lt;/P&gt;
&lt;P&gt;The "no connection" log message usually indicates that there is asynchronous routing happening, but since the PC and ASA are on the same subnet it is a little strange that this is showing up.&amp;nbsp; I don't suppose you have NAT configured for this connection as well?&lt;/P&gt;
&lt;P&gt;Could you provide a complete running configuration of the ASA (remember to remove any public IPs and change or remove usernames and passwords)&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 20:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-is-layer-2-adjacent-traffic-from-admin-pc-to-asa-logged-as/m-p/4610461#M1090086</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-15T20:56:55Z</dc:date>
    </item>
  </channel>
</rss>

