<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP Server problem. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754297#M8689</link>
    <description>Hello Marvin Rhoads,&lt;BR /&gt;&lt;BR /&gt;I appreciate your Solution but my question is, how i permit the traffic for this  10.x.x.x(local Ntp server) on ASA to sync with global Ntp servers, do i use the public IP address of global Ntp server as a Destination IP in access rule or do i allow any destination with UDP 123.</description>
    <pubDate>Wed, 28 Nov 2018 12:29:34 GMT</pubDate>
    <dc:creator>Nishan Thevathason</dc:creator>
    <dc:date>2018-11-28T12:29:34Z</dc:date>
    <item>
      <title>NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3753862#M8685</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you all are doing great.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a Ntp server in a customer local network and we want to sync that Ntp server with Global Ntp server, the Ntp traffic will traverse through the Cisco ASA, So i just want to know what is the Best practice we ever used while we are creating rules for inbound or outbound traffic on ASA for Ntp.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently we are using below rules for Ntp traffic on ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Outside-to-Inside extended permit udp any host 10.x.x.x eq ntp&lt;BR /&gt;access-list Inside-to-Outside extended permit udp host 10.x.x.x any eq ntp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3753862#M8685</guid>
      <dc:creator>Nishan Thevathason</dc:creator>
      <dc:date>2020-02-21T16:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3753892#M8686</link>
      <description>&lt;P&gt;my opinion&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Outside-to-Inside extended permit udp any host 10.x.x.x eq ntp &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;however, if you know the ntp server ip address than create a object-group and match it with that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example.&lt;/P&gt;
&lt;P&gt;Object-group NTP-SERVER&lt;/P&gt;
&lt;P&gt;&amp;nbsp;object-network host x.x.x.x.x&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list Outside-to-Inside extended permit object-group NTP-SERVER&amp;nbsp; host 10.x.x.x eq ntp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 21:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3753892#M8686</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-11-27T21:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754022#M8687</link>
      <description>&lt;P&gt;If the ntp requests originate from inside, you don't need the outside-to-inside acl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA is a stateful firewall and will recognize the return traffic as part of a udp flow that it has in the state table.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 02:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754022#M8687</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-28T02:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754057#M8688</link>
      <description>that's good point.</description>
      <pubDate>Wed, 28 Nov 2018 04:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754057#M8688</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2018-11-28T04:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754297#M8689</link>
      <description>Hello Marvin Rhoads,&lt;BR /&gt;&lt;BR /&gt;I appreciate your Solution but my question is, how i permit the traffic for this  10.x.x.x(local Ntp server) on ASA to sync with global Ntp servers, do i use the public IP address of global Ntp server as a Destination IP in access rule or do i allow any destination with UDP 123.</description>
      <pubDate>Wed, 28 Nov 2018 12:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754297#M8689</guid>
      <dc:creator>Nishan Thevathason</dc:creator>
      <dc:date>2018-11-28T12:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754303#M8690</link>
      <description>&lt;P&gt;If you want to restrict the local ntp server to using one and only one public (global) ntp server then specify that public ntp server as the destination ip.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the internal server points to an FQDN (like pool.ntp.org which resolves to multiple IP addresses) or you want to allow them to use any public ntp server without requiring further firewall ACL changes then use "any" as the destination ip.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 12:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754303#M8690</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-28T12:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754320#M8691</link>
      <description>Thanks Marvin,&lt;BR /&gt;&lt;BR /&gt;I want to point the internal server points to an FQDN (like pool.ntp.org which resolves to multiple IP addresses) but i want to ensure, if there is any chance of any cyber attack, or it is safe to use "any" destination with udp 123.</description>
      <pubDate>Wed, 28 Nov 2018 12:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754320#M8691</guid>
      <dc:creator>Nishan Thevathason</dc:creator>
      <dc:date>2018-11-28T12:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754322#M8692</link>
      <description>&lt;P&gt;The "any" doesn't affect who can originate traffic from outside. It only allows the trusted inside ntp server to use any public server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only the return flows from the public ntp servers that your trusted server has selected will be allowed from outside to inside.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 12:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754322#M8692</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-28T12:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754327#M8693</link>
      <description>Thanks Marvin,&lt;BR /&gt;&lt;BR /&gt;This is the only confusion i have if anyone maliciously attack on our trusted local Ntp server, So i could we save our trusted Ntp server.&lt;BR /&gt;&lt;BR /&gt;i am looking forward that best practice or workaround.</description>
      <pubDate>Wed, 28 Nov 2018 13:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754327#M8693</guid>
      <dc:creator>Nishan Thevathason</dc:creator>
      <dc:date>2018-11-28T13:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754332#M8694</link>
      <description>&lt;P&gt;Best practice varies according to your risk profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ultra secure is a dedicated NTP appliance with antenna to GPS satellites. They encode precise timing and a dedicate appliance can derive NTP from that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anything Internet-based is less secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The next most secure would be a hardened Linux server running minimal services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the middle would be what many organizations do - distribute NTP from a core switch or other network device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Less (least?) secure would be running a Windows server with NTP server enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In all the Internet-based cases, if your trusted server is only configured to use a well-known (or few well-known) public ntp server(s) then your attack scenarios would have to be someone taking over thoise servers and targeting you (or the whole Internet) in an ntp-based attack. Most people would consider that a very unlikely scenario.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could further lock it down by doing only authenticated ntp, however you have to register or subscribe for such services.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 13:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754332#M8694</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-28T13:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Server problem.</title>
      <link>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754370#M8695</link>
      <description>Thanks a lot Marvin.</description>
      <pubDate>Wed, 28 Nov 2018 14:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-server-problem/m-p/3754370#M8695</guid>
      <dc:creator>Nishan Thevathason</dc:creator>
      <dc:date>2018-11-28T14:08:03Z</dc:date>
    </item>
  </channel>
</rss>

