<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic To protect from the security in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602733#M201961</link>
    <description>&lt;P&gt;To protect from&amp;nbsp;the security issues that occur while opening port 123 for NTP , I have tried to configure NTP Client on the CISCO ASA Firewall. I have tried to synchronize the NTP Client time with an outside NTP Server.&amp;nbsp;But the synchronization is not taking place due to large time difference between NTP Client and NTP Server.&lt;/P&gt;&lt;P&gt;To make the time difference less, I have to use the ntpd or ntpdate commands in the NTP running on the firewall. Is there any way to execute those commands in firewall ?.&lt;/P&gt;&lt;P&gt;Also is it possible to use the same NTP Client running on the firewall as an NTP server, from which other internal systems can synchronize their time ?.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Dec 2014 08:59:11 GMT</pubDate>
    <dc:creator>johnmathewhere</dc:creator>
    <dc:date>2014-12-18T08:59:11Z</dc:date>
    <item>
      <title>Configuring CISCO ASA Application Layer Protocol Inspection</title>
      <link>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602731#M201959</link>
      <description>&lt;H3 class="p_H_Head2" style="font-size: 12.7272720336914px; color: rgb(51, 102, 102); font-weight: bold; font-family: Arial, Helvetica, sans-serif; margin: 14px 0em 7px -0.1in; line-height: normal;"&gt;&amp;nbsp;&lt;/H3&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;While configuring a DNS Inspection Policy Map,&amp;nbsp;To match a specific flag that is set in the DNS header,&amp;nbsp;the following command can be used:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;hostname(config-cmap)# &lt;B class="cBold"&gt;match &lt;/B&gt;[&lt;B class="cBold"&gt;not&lt;/B&gt;]&lt;B class="cBold"&gt; header-flag &lt;/B&gt;[&lt;SPAN style="color: black; font-weight: bold;"&gt;eq&lt;/SPAN&gt;] {&lt;SPAN style="color: black; font-style: oblique;"&gt;f_well_known&lt;/SPAN&gt; | &lt;SPAN style="color: black; font-style: oblique;"&gt;f_value&lt;/SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to configure NTP&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;Inspection Policy Map.&amp;nbsp;My aim is to drop all Mode-6 and Mode-7 NTP Packets that arrive at the&amp;nbsp;firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Which command can be used to match a specific flag that is set in the NTP Header ?.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602731#M201959</guid>
      <dc:creator>johnmathewhere</dc:creator>
      <dc:date>2019-03-12T05:14:25Z</dc:date>
    </item>
    <item>
      <title>There is no NTP-inspection</title>
      <link>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602732#M201960</link>
      <description>&lt;P&gt;There is no NTP-inspection engine in the ASA. Have a look at the following list for the supported inspections:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/inspect-overview.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/inspect-overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You have to look for a solution outside of the ASA. Do you have an IOS-router in front of your ASA? Perhaps &lt;A href="http://www.cisco.com/c/en/us/products/security/ios-flexible-packet-matching-fpm/index.html"&gt;Flexible packet matching&lt;/A&gt; could help you with that.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 08:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602732#M201960</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T08:23:44Z</dc:date>
    </item>
    <item>
      <title>To protect from the security</title>
      <link>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602733#M201961</link>
      <description>&lt;P&gt;To protect from&amp;nbsp;the security issues that occur while opening port 123 for NTP , I have tried to configure NTP Client on the CISCO ASA Firewall. I have tried to synchronize the NTP Client time with an outside NTP Server.&amp;nbsp;But the synchronization is not taking place due to large time difference between NTP Client and NTP Server.&lt;/P&gt;&lt;P&gt;To make the time difference less, I have to use the ntpd or ntpdate commands in the NTP running on the firewall. Is there any way to execute those commands in firewall ?.&lt;/P&gt;&lt;P&gt;Also is it possible to use the same NTP Client running on the firewall as an NTP server, from which other internal systems can synchronize their time ?.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 08:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602733#M201961</guid>
      <dc:creator>johnmathewhere</dc:creator>
      <dc:date>2014-12-18T08:59:11Z</dc:date>
    </item>
    <item>
      <title>Before configuring NTP on the</title>
      <link>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602734#M201962</link>
      <description>&lt;P&gt;Before configuring NTP on the client, you should set the clock manually to a time that is very close to the time on the NTP-server. Just remember that the timezone is not communicated in NTP and has to be set individually.&lt;/P&gt;&lt;P&gt;For the rest: What system are you talking about? Can't be an ASA as there is no ntpd or ntpdate. All is configured with "ntp ...".&lt;/P&gt;&lt;P&gt;And the ASA only has an ntp-client, but can't act as an ntp-server. An IOS-device can be ntp-client and ntp-server at the same time.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 09:19:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-cisco-asa-application-layer-protocol-inspection/m-p/2602734#M201962</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T09:19:36Z</dc:date>
    </item>
  </channel>
</rss>

