Basic setup: Palo Alto at the perimeter Cisco ASA DMZ Splunk collecting all logs and running reports from both Cisco and Palo Alto Failed login reports based on the Palo Alto logs sent daily Allowed traffic pattern Inbound SFTP connection NAT'd to SFTP server using SSH Key authentication So, we allow SFTP traffic through the firewall into the SFTP server in the DMZ, and in my daily failed login attempts report, I am seeing thousands of failed guest account login attempts with the source being the Palo Alto on the perimeter. This is on a daily basis. The crux of the question is, is this noise? Meaning is this how the Palo Alto is interpreting this NAT? Have we got a configuration problem? Is this safe to ignore? Or is this just a persistent bot?
... View more