<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Repeated NTP-UDP123 logs on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699671#M12595</link>
    <description>&lt;P&gt;Different devices typically have different sets of NTP-servers configured. All these servers are queried regularly to pick the "best" server out of the configured pool. These are the requests you are seeing here.&lt;/P&gt;
&lt;P&gt;If you do not want that these&amp;nbsp;many different servers are queried, you have to configure all your internal&amp;nbsp;devices with the NTP-servers of your choice.&lt;/P&gt;
&lt;P&gt;Here are some servers to choose from:&amp;nbsp;&lt;A href="http://support.ntp.org/bin/view/Servers/NTPPoolServers" target="_blank"&gt;http://support.ntp.org/bin/view/Servers/NTPPoolServers&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Sep 2018 10:59:54 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2018-09-03T10:59:54Z</dc:date>
    <item>
      <title>Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699600#M12529</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;I am seeings frequent UDP-123(NTP traffic) logs on Cisco ASA Firewall, which is initiated from Internal LAN to Outside Internet. Source and destination port is 123. Can some one guide, what is causing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Understand, that UDP-123(NTP traffic) is used for time synchronisation, but why to different set of Public Internet servers frequently?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Sreeraj&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:11:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699600#M12529</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2020-02-21T16:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699642#M12530</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA is doing its job of providing the information it can. You can either block it if required or refer to source and check the source host/server to see what configuration is causing the NTP traffic to be initiated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can take captures as well on internal interface of ASA is the syslog info is insufficient.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;AJ&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 10:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699642#M12530</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-09-03T10:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699671#M12595</link>
      <description>&lt;P&gt;Different devices typically have different sets of NTP-servers configured. All these servers are queried regularly to pick the "best" server out of the configured pool. These are the requests you are seeing here.&lt;/P&gt;
&lt;P&gt;If you do not want that these&amp;nbsp;many different servers are queried, you have to configure all your internal&amp;nbsp;devices with the NTP-servers of your choice.&lt;/P&gt;
&lt;P&gt;Here are some servers to choose from:&amp;nbsp;&lt;A href="http://support.ntp.org/bin/view/Servers/NTPPoolServers" target="_blank"&gt;http://support.ntp.org/bin/view/Servers/NTPPoolServers&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 10:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3699671#M12595</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-09-03T10:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701770#M12596</link>
      <description>&lt;P&gt;Thank you for the advice provided.&lt;/P&gt;
&lt;P&gt;Also, please suggest, on the Security vulnerability with respect to NTP protocol and ways to prevent the same. Is builting an Campus NTP Server a recommended solution for the same. Please provide more light/documentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Sreeraj Murali&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 06:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701770#M12596</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2018-09-06T06:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701840#M12597</link>
      <description>&lt;P&gt;While ntp as a protocol does have its share of vulnerabilities and is not inherently secure, it is very far down on the list of things to worry about.&amp;nbsp;&lt;SPAN&gt;Keeping accurate time across systems using NTP is a best practice; but spending much time on countermeasures against NTP vulnerabilities has a very very small return on investment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd focus your efforts on email with phishing links, malware attachments and users browsing to bad websites. That will cover 95% or more of the threats to your infrastructure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701840#M12597</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-06T09:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701850#M12598</link>
      <description>&lt;P&gt;Thanks. We do Software as a service business, and all the Customer servers are hosted in our SAS environment. Currently, all the linux servers are having the time synchronised from public NTP Server, which i am thinking as a risk with NTP DDoS amblification attack. So, looking for a counter measure to mitigate this. Please advice.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701850#M12598</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2018-09-06T09:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701879#M12599</link>
      <description>&lt;P&gt;You can always purchase a time server appliance that synchronizes its clock via a GPS antenna. Install it inside your network and then block all udp/123 ntp through your firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find several with a quick web search. Prices vary widely (US$300 to US$5000) according to how "industrial strength" you need it to be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.amazon.com/TimeMachines-TM1000A-maintains-broadcast-Satellites/dp/B002RC3Q4Q" target="_blank"&gt;https://www.amazon.com/TimeMachines-TM1000A-maintains-broadcast-Satellites/dp/B002RC3Q4Q&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.endruntechnologies.com/time-servers.htm" target="_blank"&gt;https://www.endruntechnologies.com/time-servers.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://spectracom.com/products-services/precision-timing/enterprise-class-securesync" target="_blank"&gt;https://spectracom.com/products-services/precision-timing/enterprise-class-securesync&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701879#M12599</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-06T09:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701885#M12600</link>
      <description>&lt;P&gt;Thanks, Can we have a provision of configuring Windows DNS Server(Domain Controller) as an NTP Server?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 09:58:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701885#M12600</guid>
      <dc:creator>sreeraj.murali</dc:creator>
      <dc:date>2018-09-06T09:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701893#M12601</link>
      <description>&lt;P&gt;You can but it would still need to get time from an Internet-based time source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's also not designed to scale and hand out time to non-Windows systems. You could just as easily run a small Linux machine to act as your ntp server (or add the service onto an existing utility server you may already have).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://askubuntu.com/questions/14558/how-do-i-setup-a-local-ntp-server" target="_blank"&gt;https://askubuntu.com/questions/14558/how-do-i-setup-a-local-ntp-server&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 10:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701893#M12601</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-06T10:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated NTP-UDP123 logs on firewall</title>
      <link>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701894#M12602</link>
      <description>&lt;P&gt;You can but it would still need to get time from an Internet-based time source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's also not designed to scale and hand out time to non-Windows systems. You could just as easily run a small Linux machine to act as your ntp server (or add the service onto an existing utility server you may already have).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://askubuntu.com/questions/14558/how-do-i-setup-a-local-ntp-server" target="_blank"&gt;https://askubuntu.com/questions/14558/how-do-i-setup-a-local-ntp-server&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 10:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-ntp-udp123-logs-on-firewall/m-p/3701894#M12602</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-06T10:11:15Z</dc:date>
    </item>
  </channel>
</rss>

