Solved

NTP pix - cannot use ACL

Posted on 2006-10-30
6
471 Views
Last Modified: 2010-04-08
I have a PIX 515. I have three external time server I need to be able to pull time from.

We have built a time server that lives on the internal LAN. IP Addresses are Internal - xxx.xxx.10.9 and External - xxx.xxx.195.23.  Our time servers will be 129.7.1.66, 130.126.24.53, and 140.221.9.20.

We will not move over to ACLs, because we are moving to multiple ASA Clusters that are currently in testing. So I have to use conduit's and static commands in our PIX Firewalls.

So what static command do I need to use for this internal time server in order to get out and receive back NTP packets.

What is the proper conduit command to use for this to limit NTP Port 123 traffic only from/to xxx.xxx.195.23 and the External Time Servers?

Thanks in advance.
0
Comment
Question by:huffakerce
  • 2
6 Comments
 
LVL 3

Expert Comment

by:mahe2000
Comment Utility
try to avoid conduits and move to acl. to send packets out you need to make a global-nat set of commands. you told that your internal server has to access the external one.
the syntax could be something like:

global (outside) 10 xxx.xxx.195.23 netmask 255.255.255.255
nat (inside) 10 xxx.xxx.10.9 255.255.255.255

the ports you need to open from your ntp server to the outside ntp server is udp 123, but if you are not using acl you don't need to open them.
0
 

Author Comment

by:huffakerce
Comment Utility
mahe2000,

As stated above we will not move to ACLs.. We have purchased 4 ASA 5520's and it would be a waste of our time to switch everything over to ACL's at this time when we will be moving all traffic over to ASAs in the near future.

I need to know the command(s) used for static and conduits on a PIX 515..  

Thanks..
0
 
LVL 3

Expert Comment

by:mahe2000
Comment Utility
my friend, when you use conduits you already have enabled access from higher security level interfaces to lower security level interfaces you just need to let them go out with a public IP address.
0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 250 total points
Comment Utility
You need these,

static(inside,outside) xxx.xxx.195.23 xxx.xxx.10.9 netmask 255.255.255.255

conduit permit udp host xxx.xxx.195.23 gt 1025 host 129.7.1.66 eq 123

Similar for other ip addresses as well.

Cheers,
Rajesh
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now