<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: snmp &amp;amp; ntp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3339633#M969002</link>
    <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its my monitoring server that I cannot keep in the DMZ becz the internal servers and switches are all added in that server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it these NTP servers are free.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;actually confused between port acl and Vlan acl, I have read the guide but no clear understanding&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2018 15:02:55 GMT</pubDate>
    <dc:creator>adamgibs7</dc:creator>
    <dc:date>2018-02-28T15:02:55Z</dc:date>
    <item>
      <title>snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3337953#M968998</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;I Have 3 question here please answer&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a perimeter firewall which is connecting to the internet ,DR and extranets, I have a switches in DR &amp;amp; some switches kept in other company premises (extranets)&amp;nbsp;which are routing through firewall&amp;nbsp;&amp;nbsp;is it preferable to configure snmp on these&amp;nbsp;&amp;nbsp;switches and get the snmp traffic to my internal LAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what is best practice to configure NTP on a perimeter firewall&amp;nbsp;at present it is connected to core and core is acting as a NTP server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what security precautions has to be taken for the external switches which are connecting to ISP, extranets and many other neighbor building for the connectivity to our internal LAN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3337953#M968998</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T15:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3338268#M968999</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are few things...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&lt;SPAN&gt;preferable to configure snmp on these&amp;nbsp;&amp;nbsp;switches: If possible move SNMP server to DMZ and configure/allow SNMP&lt;STRONG&gt;v3&lt;/STRONG&gt; and from specific source IPs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2.&amp;nbsp;NTP on a perimeter firewall: If it is at edge of network, then you can use public ntp servers:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;A href="https://tf.nist.gov/tf-cgi/servers.cgi" target="_blank"&gt;https://tf.nist.gov/tf-cgi/servers.cgi&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3.&amp;nbsp;security precautions has to be taken for the external switches: Per your post, these appears to be directly connected to ISP and in turn communicates with your LAN: If all these services can be moved from your LAN to DMZ..good. I know there may be lot of challenges in doing that.. so- if you manage those switches- make sure to address vulnerabilities, Vlan based ACLs, limited admin access with SSH only, and last but not least see if you can add additional (port based) ACLs on firewall for incoming traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;hth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 00:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3338268#M968999</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2018-02-27T00:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3339633#M969002</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its my monitoring server that I cannot keep in the DMZ becz the internal servers and switches are all added in that server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it these NTP servers are free.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;actually confused between port acl and Vlan acl, I have read the guide but no clear understanding&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 15:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3339633#M969002</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-02-28T15:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3340327#M969007</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;-&amp;gt; Yes..I understand the complexity in moving snmp to DMZ. snmp v3 can be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;gt; AFAIK.. all those ntp servers are free.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;gt; What I meant by Vlan ACL is -&amp;nbsp;normal standard/extended&amp;nbsp;ACLs&amp;nbsp; on Vlan interfaces where you allow required communication within subnets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the below link for vpn filters:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 11:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3340327#M969007</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2018-03-01T11:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3340924#M969011</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for snmp server v3&amp;nbsp;I should add remote devices which are on WAN &amp;amp; External Internet switches to get them in inside network for snmp trap , is it a best practice , YES or NO&lt;/P&gt;</description>
      <pubDate>Fri, 02 Mar 2018 06:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3340924#M969011</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-02T06:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: snmp &amp; ntp</title>
      <link>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3341222#M969014</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The question is - Are you 100%&amp;nbsp;responsible for managing all those extranet switches and not knowing whats happening with those switches put you in tough spot? If yes... then I would do it with v3 (more secure) by allowing specific IPs v3 traffic only thru fw. Also, I would consider different v3 Pass for different extranet hardware (may be hard to manage but secure).&lt;/P&gt;
&lt;P&gt;If the answer is 'no one' question you- then your call.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can consider&amp;nbsp;using any freely available SNMP servers (google for those) and place this new server in DMZ and use only for extranet related gear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Fri, 02 Mar 2018 13:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snmp-amp-ntp/m-p/3341222#M969014</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2018-03-02T13:58:46Z</dc:date>
    </item>
  </channel>
</rss>

