Show route terse gives me:
user@juniper# run show route terse
inet.0: 14 destinations, 14 routes (14 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
A Destination P Prf Metric 1 Metric 2 Next hop AS path
* 0.0.0.0/0 S 5 >X.X.X.1
...
* 192.168.60.0/24 D 0 >ge-0/0/6.0
* 192.168.60.1/32 L 0 Local
...
* Y.Y.Y.0/24 D 0 >ge-0/0/0.0
* Y.Y.Y.1/32 L 0 Local
* X.X.X.0/28 D 0 >ge-1/0/0.0
* X.X.X.2/32 L 0 Local
flow session destination-prefix results:
user@juniper> show security flow session destination-prefix 4.2.2.2
Session ID: 2583, Policy name: trust-to-untrust/4, Timeout: 60, Valid
In: 192.168.60.101/43274 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43274;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 9777, Policy name: trust-to-untrust/4, Timeout: 34, Valid
In: 192.168.60.101/43269 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43269;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 21674, Policy name: trust-to-untrust/4, Timeout: 40, Valid
In: 192.168.60.101/43270 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43270;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 25304, Policy name: trust-to-untrust/4, Timeout: 10, Valid
In: 192.168.60.101/43264 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43264;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 37075, Policy name: trust-to-untrust/4, Timeout: 54, Valid
In: 192.168.60.101/43273 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43273;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 37305, Policy name: trust-to-untrust/4, Timeout: 30, Valid
In: 192.168.60.101/43268 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43268;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 38082, Policy name: trust-to-untrust/4, Timeout: 50, Valid
In: 192.168.60.101/43272 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43272;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 39315, Policy name: trust-to-untrust/4, Timeout: 20, Valid
In: 192.168.60.101/43266 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43266;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 40275, Policy name: trust-to-untrust/4, Timeout: 24, Valid
In: 192.168.60.101/43267 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43267;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 44628, Policy name: trust-to-untrust/4, Timeout: 14, Valid
In: 192.168.60.101/43265 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43265;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Session ID: 47940, Policy name: trust-to-untrust/4, Timeout: 44, Valid
In: 192.168.60.101/43271 --> 4.2.2.2/4;icmp, If: ge-0/0/6.0, Pkts: 1, Bytes: 60
Out: 4.2.2.2/4 --> 192.168.60.101/43271;icmp, If: ge-1/0/0.0, Pkts: 0, Bytes: 0
Total sessions: 11
At the moment its no problem, if the working interface and interface I am trying to configure, would run on the same vlan, but thanks for the tip- about configuring vlans on firewall.