<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP vulnerability issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3375218#M902855</link>
    <description>Thanks John.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Kris</description>
    <pubDate>Mon, 30 Apr 2018 06:48:08 GMT</pubDate>
    <dc:creator>krisvamcee</dc:creator>
    <dc:date>2018-04-30T06:48:08Z</dc:date>
    <item>
      <title>NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3373288#M902851</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the vulnerability scan, we got the below issue for NTP for Cisco 3850 switch. Could somebody please advise how to fix it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An NTP control (mode 6) message with the UNSETTRAP (31) opcode with an unknown association identifier will cause NTP to respond with two packets -- one error response packet indicating that the association identifier was invalid followed by another non-error.&lt;/P&gt;
&lt;P&gt;Apply a restrict option to all hosts that are not authorized to perform NTP queries. For example, to deny query requests from all clients, put the following in the NTP configuration file, typically /etc/ntp.conf, and restart the NTP service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only config the switch have for NTP is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ntp source loopback&lt;/P&gt;
&lt;P&gt;ntp server x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Kris&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3373288#M902851</guid>
      <dc:creator>krisvamcee</dc:creator>
      <dc:date>2020-02-21T15:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3373314#M902852</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If you switch is just going to be an ntp client than you will need to restrict query and server requests using access lists&lt;/P&gt;
&lt;P&gt;e.g.&lt;/P&gt;
&lt;P&gt;access-list 40 permit host 192.168.1.1&lt;/P&gt;
&lt;P&gt;access-list 50&amp;nbsp; deny any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ntp access-group peer 40&lt;/P&gt;
&lt;P&gt;ntp access-group serve-only 50&lt;/P&gt;
&lt;P&gt;ntp access-group query-only 50&lt;/P&gt;
&lt;P&gt;ntp server 192.168.1.1&lt;/P&gt;
&lt;P&gt;The example above allows switch to get time from ntp server 192.168.1.1 Access-list 49 only allows time from 192.168.1.1 Access-list 50 prevents switch from providing time to anyone and prevents queries from anyone.&lt;/P&gt;
&lt;P&gt;The following doc provides more details:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020508-ntp-vulnerability" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020508-ntp-vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 05:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3373314#M902852</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-04-26T05:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3374213#M902853</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot for the reply. So just to confirm in this case, access list 50 prevents the ntp client to respond to NTP queries and and it doesn't accept control queries.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Kris&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 03:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3374213#M902853</guid>
      <dc:creator>krisvamcee</dc:creator>
      <dc:date>2018-04-27T03:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3375152#M902854</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Yes, access-list 50 is to prevent the switch from being an ntp server and to prevent the switch responding to control queries.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 23:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3375152#M902854</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-04-29T23:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3375218#M902855</link>
      <description>Thanks John.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Kris</description>
      <pubDate>Mon, 30 Apr 2018 06:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3375218#M902855</guid>
      <dc:creator>krisvamcee</dc:creator>
      <dc:date>2018-04-30T06:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3770678#M902856</link>
      <description>I am also facing the same ntp 6 vulnerability in Cisco 7609 Router IOS Version 15.5(3)S5. Is it  same configure in the router as well to close this vulnerability.. Pankaj Jain</description>
      <pubDate>Mon, 31 Dec 2018 05:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/3770678#M902856</guid>
      <dc:creator>Pankaj1</dc:creator>
      <dc:date>2018-12-31T05:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/4999877#M1108135</link>
      <description>&lt;P&gt;I know this is an old message, I was wondering what options can be done for a switch that is NTP Master for all your other switches.&amp;nbsp;&amp;nbsp; I found this:&amp;nbsp; &lt;A href="https://community.cisco.com/t5/network-management/ntp-allow-mode-control/td-p/4596164" target="_blank"&gt;https://community.cisco.com/t5/network-management/ntp-allow-mode-control/td-p/4596164&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So I went with the ntp allow mode control 3 option and our Nessus scan no longer shows this switch having the NTP Mode 6 vulnerability.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 14:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/4999877#M1108135</guid>
      <dc:creator>kkana</dc:creator>
      <dc:date>2024-01-18T14:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: NTP vulnerability issue</title>
      <link>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/5133203#M1113607</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/183162"&gt;@kkana&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So many articles and posts on various forms to sift through, just to get this answer.&lt;/P&gt;&lt;P&gt;Much appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 13:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ntp-vulnerability-issue/m-p/5133203#M1113607</guid>
      <dc:creator>rodonnell2</dc:creator>
      <dc:date>2024-06-18T13:43:29Z</dc:date>
    </item>
  </channel>
</rss>

