08-09-2017 09:25 AM - edited 03-08-2019 11:40 AM
Got this in the logs : is there any way to find the source (culprit) (ip) ?
Aug 9 14:27:46 switch-name : 2017 Aug 9 14:27:46 ET: %DAEMON-3-SYSTEM_MSG: NTP Receive dropping message: Received NTP control mode packet. Drop count:1 - ntpd[3825]
08-09-2017 09:32 AM
A packet capture in front of or on the syslog server will expose who is sending the NTP message by IP Address.
There may be a way to have the syslog message read the IP rather than the hostname but I'll leave that up to someone who has more experience.
08-09-2017 09:39 AM
As an aside... Routers and switches can be configured to send syslog messages with an IP instead of a hostname. Doesn't help your situation but worth noting.
10-31-2017 01:55 AM
Have you looked into this anymore? What did you end up doing regarding this message?
We have the same in our Nexus enviroment.
Br
Geir
02-08-2018 07:57 AM
I found the origin for ours by using this command on our 7018:
ethanalyzer local interface inband capture-filter "port 123" limit-captured-frames 100 write bootflash:<filename>.pcap display
Good luck.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide