Palo Alto at the perimeter
Cisco ASA DMZ
Splunk collecting all logs and running reports from both Cisco and Palo Alto
Failed login reports based on the Palo Alto logs sent daily
Allowed traffic pattern
Inbound SFTP connection NAT'd to SFTP server using SSH Key authentication
So, we allow SFTP traffic through the firewall into the SFTP server in the DMZ, and in my daily failed login attempts report, I am seeing thousands of failed guest account login attempts with the source being the Palo Alto on the perimeter. This is on a daily basis.
The crux of the question is, is this noise? Meaning is this how the Palo Alto is interpreting this NAT? Have we got a configuration problem? Is this safe to ignore? Or is this just a persistent bot?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The Live Community thanks you for your participation!