- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Palo Alto at the perimeter
Cisco ASA DMZ
Splunk collecting all logs and running reports from both Cisco and Palo Alto
Failed login reports based on the Palo Alto logs sent daily
Allowed traffic pattern
Inbound SFTP connection NAT'd to SFTP server using SSH Key authentication
So, we allow SFTP traffic through the firewall into the SFTP server in the DMZ, and in my daily failed login attempts report, I am seeing thousands of failed guest account login attempts with the source being the Palo Alto on the perimeter. This is on a daily basis.
The crux of the question is, is this noise? Meaning is this how the Palo Alto is interpreting this NAT? Have we got a configuration problem? Is this safe to ignore? Or is this just a persistent bot?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!