[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Udp Access denied by ACL

Posted on 2006-07-14
2
Medium Priority
?
1,008 Views
Last Modified: 2008-01-09
Hello all
I am having issues with my PIX 515e.  Every couple hours it does a reboot.  I try to log what happens, but can't pin point the problem.  I do get many of UDP access denied errors.  I was wondering if this could be forcing a reboot.

UDP access denied by ACL from 192.168.2.90/137 to inside:192.168.2.14/137


The logs are full of these.  Any help would be appreciated.
0
Comment
Question by:ebigs27
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 1000 total points
ID: 17111384
These are nothing more than Netbios broadcasts on the local LAN that the PIX is ignoring. Absolutely typical traffic on any Windows network.
You can easily set your PIX logging to ignore this event # and clean up the logs..
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17111388
>Every couple hours it does a reboot.
Not a good sign. Possible power supply going bad. Hope you have SmartNet!
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question