<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic  HI EJI think the problem is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723367#M179063</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HI EJ&lt;/P&gt;&lt;P&gt;I think the problem is your NAT&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;o&lt;EM&gt;bject network ntp_internal_Yoko&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; line-height: normal;" /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;host&amp;nbsp; "NTPInsideServer1"&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; line-height: normal;" /&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;nat (inside,outside) static ntp_external service udp 123 123&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;you are trying to do&amp;nbsp;&amp;nbsp;a NAT&amp;nbsp;&amp;nbsp;from a real device to another real device!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;you don't really need to do a NAT at all as long as you allow outside to inside with ACLs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;Richard.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Sep 2015 03:54:26 GMT</pubDate>
    <dc:creator>Richard Bradfield</dc:creator>
    <dc:date>2015-09-07T03:54:26Z</dc:date>
    <item>
      <title>Pit falls of passing NTP from an inside source through an ASA to a DMZ Perimeter switch</title>
      <link>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723366#M179062</link>
      <description>&lt;P&gt;Good day all, I'm in a bit of a pickle.&lt;/P&gt;&lt;P&gt;We have a new 5585X running ASA &amp;nbsp;9.1(6)6 with ASDM 7.4(2) in HA configuration.&lt;/P&gt;&lt;P&gt;It's working fine for our normal traffic and I have it passing log files from the DMZ to the log server; however, trying to get a DMZ Perimeter switch to talk to the NTP server on the inside is a bit of a bear.&lt;/P&gt;&lt;P&gt;Right now we have the packet tracer showing&amp;nbsp;all green for the path between the Outside and Inside interfaces on the firewall.&lt;/P&gt;&lt;P&gt;However we are unable to see the DMZ device respond to time updates from the inside NTP server.&lt;/P&gt;&lt;P&gt;!create object for the outside interface&amp;nbsp;&lt;BR /&gt;object network ntp_external&lt;BR /&gt;host "DMZoutside"&lt;/P&gt;&lt;P&gt;!Create the first object for the yoko ntp server&lt;BR /&gt;object network ntp_internal_Yoko&lt;BR /&gt;host&amp;nbsp; "NTPInsideServer1"&lt;BR /&gt;nat (inside,outside) static ntp_external service udp 123 123&lt;/P&gt;&lt;P&gt;!Create the second object for the sas ntp server&lt;BR /&gt;object network ntp_internal_Sas&lt;BR /&gt;host "NTPInsideServer2"&lt;BR /&gt;nat (inside,outside) static ntp_external service udp 123 123&lt;/P&gt;&lt;P&gt;! Create the object group to bundle both servers IP's&lt;BR /&gt;&amp;nbsp;object-group network NTP_Group1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object object ntp_internal_Yoko&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object object ntp_internal_Sas&lt;/P&gt;&lt;P&gt;! Create the access-lists for the outside interface&lt;BR /&gt;access-list outside_access_in line 6 extended permit tcp object YOSSR object ntp_internal_Yoko eq 123 log disable&lt;BR /&gt;access-list outside_access_in line 6 extended permit tcp object YOSSR object ntp_internal_Sas eq 123 log disable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Creating the rule for ntp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;access-group global_access global&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list Outside_access_in line 28 extended permit udp object ntp_external object-group NTP_Group1 eq ntp&amp;nbsp; log disable&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; clear configure access-list global_acce&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone shed some light on this topic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723366#M179062</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2019-03-12T06:33:11Z</dc:date>
    </item>
    <item>
      <title> HI EJI think the problem is</title>
      <link>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723367#M179063</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HI EJ&lt;/P&gt;&lt;P&gt;I think the problem is your NAT&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;o&lt;EM&gt;bject network ntp_internal_Yoko&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; line-height: normal;" /&gt;&lt;EM&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;host&amp;nbsp; "NTPInsideServer1"&lt;/SPAN&gt;&lt;BR style="font-size: 14.3999996185303px; line-height: normal;" /&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;nat (inside,outside) static ntp_external service udp 123 123&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;you are trying to do&amp;nbsp;&amp;nbsp;a NAT&amp;nbsp;&amp;nbsp;from a real device to another real device!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;you don't really need to do a NAT at all as long as you allow outside to inside with ACLs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; line-height: normal;"&gt;Richard.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2015 03:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723367#M179063</guid>
      <dc:creator>Richard Bradfield</dc:creator>
      <dc:date>2015-09-07T03:54:26Z</dc:date>
    </item>
    <item>
      <title>the correct answer we found</title>
      <link>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723368#M179064</link>
      <description>&lt;P&gt;the correct answer we found out was to do twice nat.&lt;/P&gt;&lt;P&gt;once we did that everything worked just fine.&lt;/P&gt;&lt;P&gt;Then the NTP server stopped working a few days later.&lt;/P&gt;&lt;P&gt;We just rebooted it and everything is backup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2015 01:32:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pit-falls-of-passing-ntp-from-an-inside-source-through-an-asa-to/m-p/2723368#M179064</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2015-10-26T01:32:27Z</dc:date>
    </item>
  </channel>
</rss>

