<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NTP server unreachable through ASA firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341925#M343310</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your repsonse. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done that, and I think I have an idea what the problem might be. There's a NAT rule that translates the private IP address of the NTP server to the firewall's public IP address, as it leaves the outside interface for access to the NTP servers on the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input intdmz1 udp DMZ_SWITCH_IP 1026 192.168.65.254$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group intdmz1_acl in interface intdmz1&lt;BR /&gt;access-list intdmz1_acl extended permit udp host DMZ_SWITCH_IP host NTP_SERVER_IP eq ntp &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 access-list hide-nat&lt;BR /&gt;&amp;nbsp; match udp inside host NTP_SERVER_IP outside any eq 123&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (FIREWALL's_OUTSIDE_INTERFACE_IP [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 71880216, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: intdmz1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to configure a NAT rule above the existing NAT rule that &lt;EM&gt;doesn't&lt;/EM&gt; translate the NTP server's IP address, if the destination is the DMZ_SWITCH_IP or something like that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Sep 2013 08:43:13 GMT</pubDate>
    <dc:creator>Oliver Drew</dc:creator>
    <dc:date>2013-09-10T08:43:13Z</dc:date>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341923#M343306</link>
      <description>&lt;P&gt;Hi all, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured a DMZ switch to point to an NTP server on on the Inside, but I get a debug message on the switch that says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NTP: &amp;lt;&lt;EM&gt;NTP server IP address&lt;/EM&gt;&amp;gt; unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confident that the NTP server is configured properly, as there are more than a dozen other hosts using it, successfully. The difficulty here is that the NTP packets are having to flow from the DMZ to the Inside. I have a rule set on the firewall that permits the IP address of the switch to connect to the IP address of the NTP server as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list intdmz1_acl extended permit udp host &amp;lt;&lt;EM&gt;IP address of switch&lt;/EM&gt;&amp;gt; host &amp;lt;&lt;EM&gt;IP address of NTP server&lt;/EM&gt;&amp;gt; eq ntp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the hit counter on this rule incrementing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall can ping the NTP server, and the NTP server can ping the switch, so I think routing is OK. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output from the DMZ switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch#&lt;STRONG&gt;show ntp associations &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ref clock&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st&amp;nbsp; when&amp;nbsp; poll reach&amp;nbsp; delay&amp;nbsp; offset&amp;nbsp;&amp;nbsp;&amp;nbsp; disp&lt;BR /&gt;~192.168.65.254&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp;&amp;nbsp; 64&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.00&amp;nbsp; 16000.&lt;BR /&gt;* master (synced), # master (unsynced), + selected, - candidate, ~ configured&lt;/P&gt;&lt;P&gt;switch#&lt;STRONG&gt;show ntp status &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Clock is unsynchronized, stratum 16, no reference clock&lt;/P&gt;&lt;P&gt;nominal freq is 119.2092 Hz, actual freq is 119.2092 Hz, precision is 2**17&lt;/P&gt;&lt;P&gt;reference time is 00000000.00000000 (00:00:00.000 GMT Mon Jan 1 1900)&lt;/P&gt;&lt;P&gt;clock offset is 0.0000 msec, root delay is 0.00 msec&lt;/P&gt;&lt;P&gt;root dispersion is 0.00 msec, peer dispersion is 0.00 msec&lt;/P&gt;&lt;P&gt;PRNLN-DMZ-SW01#sh run | inc ntp&lt;/P&gt;&lt;P&gt;ntp source Vlan138&lt;/P&gt;&lt;P&gt;ntp server 192.168.65.254&lt;/P&gt;&lt;P&gt;ukhvdc00vs01#sh run | inc ntp&lt;/P&gt;&lt;P&gt;ntp source Vlan65&lt;/P&gt;&lt;P&gt;ntp master 3&lt;/P&gt;&lt;P&gt;ntp update-calendar&lt;/P&gt;&lt;P&gt;ntp server 0.uk.pool.ntp.org&lt;/P&gt;&lt;P&gt;ntp server 1.uk.pool.ntp.org&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;PRNLN-DMZ-SW01#show ntp status &lt;BR /&gt;Clock is unsynchronized, stratum 16, no reference clock&lt;BR /&gt;nominal freq is 119.2092 Hz, actual freq is 119.2092 Hz, precision is 2**17&lt;BR /&gt;reference time is 00000000.00000000 (00:00:00.000 GMT Mon Jan 1 1900)&lt;BR /&gt;clock offset is 0.0000 msec, root delay is 0.00 msec&lt;BR /&gt;root dispersion is 0.00 msec, peer dispersion is 0.00 msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the firewall rule need to permit more than UDP/123 for this to work perhaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;NTPconfig on DMZ switch:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;switch#sh run | inc ntp&lt;BR /&gt;ntp source Vlan138&lt;BR /&gt;ntp server &amp;lt;&lt;EM&gt;IP address of NTP server&lt;/EM&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;NTP config on NTP server:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NTP_Server#sh run | inc ntp&lt;BR /&gt;ntp source Vlan65&lt;BR /&gt;ntp master 3&lt;BR /&gt;ntp update-calendar&lt;BR /&gt;ntp server 0.uk.pool.ntp.org&lt;BR /&gt;ntp server 1.uk.pool.ntp.org&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance welcomed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Olly&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341923#M343306</guid>
      <dc:creator>Oliver Drew</dc:creator>
      <dc:date>2019-03-12T02:35:50Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341924#M343308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oliver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input DMZ udp switch_ip 1026 NTP_IP 123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and provide us the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 17:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341924#M343308</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-09T17:06:35Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341925#M343310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your repsonse. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done that, and I think I have an idea what the problem might be. There's a NAT rule that translates the private IP address of the NTP server to the firewall's public IP address, as it leaves the outside interface for access to the NTP servers on the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input intdmz1 udp DMZ_SWITCH_IP 1026 192.168.65.254$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group intdmz1_acl in interface intdmz1&lt;BR /&gt;access-list intdmz1_acl extended permit udp host DMZ_SWITCH_IP host NTP_SERVER_IP eq ntp &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 access-list hide-nat&lt;BR /&gt;&amp;nbsp; match udp inside host NTP_SERVER_IP outside any eq 123&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (FIREWALL's_OUTSIDE_INTERFACE_IP [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 71880216, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: intdmz1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to configure a NAT rule above the existing NAT rule that &lt;EM&gt;doesn't&lt;/EM&gt; translate the NTP server's IP address, if the destination is the DMZ_SWITCH_IP or something like that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 08:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341925#M343310</guid>
      <dc:creator>Oliver Drew</dc:creator>
      <dc:date>2013-09-10T08:43:13Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341926#M343311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Which OS version are you using on ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 10:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341926#M343311</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-09-10T10:09:52Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341927#M343313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oliver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case seems like there is no NAT between each other and packet is being allowed (The Host-Limit NAT does not count)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capdmz interface dmz match udp host dmz_switch_IP host NTP_Inside_IP eq 123&lt;/P&gt;&lt;P&gt;cap capin interface inside match&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;udp host dmz_switch_IP host NTP_Inside_IP eq 123&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to connect to the NTP server and provide&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;show cap capdmz &lt;/P&gt;&lt;P&gt;show cap asp | include NTP_server_IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 16:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341927#M343313</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-10T16:05:13Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341928#M343314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alain, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's running 8.2(4).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Olly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 15:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341928#M343314</guid>
      <dc:creator>Oliver Drew</dc:creator>
      <dc:date>2013-09-12T15:38:42Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341929#M343315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;For the purposes of this information:&lt;BR /&gt;DMZ switch IP = 5.6.7.8&lt;BR /&gt;NTP server IP = 10.1.1.1&lt;/P&gt;&lt;P&gt;Here's the output from the show commands:&lt;/P&gt;&lt;P&gt;ciscoasa# show capture NTPCAPTUREDMZ&lt;/P&gt;&lt;P&gt;11 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 16:22:05.271500 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 16:23:09.276185 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 16:24:13.274033 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 16:24:57.272813 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 16:24:58.279480 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 16:24:59.277817 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 16:25:00.275971 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 16:25:01.275559 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 16:25:02.272599 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp; 10: 16:25:03.279129 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;&amp;nbsp; 11: 16:25:04.277710 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;11 packets shown&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;BR /&gt;ciscoasa# show capture NTPCAPTUREINSIDE&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;ciscoasa# show capture NTPASP | include 10.1.1.1&lt;BR /&gt; 419: 16:24:13.274171 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;1820: 16:24:57.272904 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;1841: 16:24:58.279587 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;1876: 16:24:59.277909 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;1934: 16:25:00.276062 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2027: 16:25:01.275651 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2068: 16:25:02.272690 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2095: 16:25:03.279221 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2129: 16:25:04.277802 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2200: 16:25:05.275849 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2233: 16:25:06.274094 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2275: 16:25:07.273606 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2327: 16:25:08.280182 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2347: 16:25:09.277222 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2373: 16:25:10.275467 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2399: 16:25:11.273759 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;BR /&gt;2414: 16:25:12.273347 802.1Q vlan#138 P6 5.6.7.8.123 &amp;gt; 10.1.1.1.123:&amp;nbsp; udp 48 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing we should see some packets in the second capture, but we're not...&lt;/P&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;P&gt;Thanks!&lt;BR /&gt;Olly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 15:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341929#M343315</guid>
      <dc:creator>Oliver Drew</dc:creator>
      <dc:date>2013-09-12T15:39:45Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341930#M343316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oliver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great job with the captures &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; You did it right!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does help. Let me analize it:&lt;/P&gt;&lt;P&gt;1) On capture dmz we see the requests from the switch to the NTP server&lt;/P&gt;&lt;P&gt;2) On capture Inside no packets being shown (so they are getting stuck in the ASA)&lt;/P&gt;&lt;P&gt;3) On capture ASP (capture for packets being dropped) we see all of the packets, so all of them are being dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are my questions:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input intdmz1 udp DMZ_SWITCH_IP 1026 192.168.65.254$&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here is the packet-tracer . the IP addresses are different than the capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cause I see here:&lt;/P&gt;&lt;P&gt;5.6.7.8.123 &amp;gt; 10.1.1.1.123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do the packet-tracer with those IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also share the running configuration if possible (or send it privateley to my email address listed bellow)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 16:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341930#M343316</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T16:07:01Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341931#M343318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio, I have replied to your email address, but will post back here with relevant information to help anyone else that might find it useful. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Olly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 16:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341931#M343318</guid>
      <dc:creator>Oliver Drew</dc:creator>
      <dc:date>2013-09-12T16:57:14Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341932#M343321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oliver,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just answered u &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 17:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341932#M343321</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T17:23:11Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341933#M343322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Oliver&lt;/P&gt;&lt;P&gt;A question, from the original (Client) you can reach the NTP Server?, &lt;/P&gt;&lt;P&gt;Could you send us the result of the following command:&lt;/P&gt;&lt;P&gt;Ping to the NTP server&lt;/P&gt;&lt;P&gt;Traceroute to the NTP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you can reach it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 17:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341933#M343322</guid>
      <dc:creator>a.guillen</dc:creator>
      <dc:date>2013-09-12T17:36:31Z</dc:date>
    </item>
    <item>
      <title>NTP server unreachable through ASA firewall</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341934#M343323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;any update about this??? I have the same issue with an asa5585...&lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 23:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-unreachable-through-asa-firewall/m-p/2341934#M343323</guid>
      <dc:creator>Salvador Antonio Quintanilla Mendoza</dc:creator>
      <dc:date>2014-01-09T23:01:11Z</dc:date>
    </item>
  </channel>
</rss>

