• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2567
  • Last Modified:

Windows 2008 R2 as an NTP source for Cisco ASA5510 (8.3)

Hi Guys,

I have configured my Windows 2008 R2 PDC so that will act as an NTP server. I have a Cisco ASA5510 that I also configured to use the Windows machine as its NTP source. I cannot see any errors on the Windows server, and the Windows Firewall is turned off. I can see that it is getting its own time from the external server I configured (pool.ntp.org) and it did change its own system time.

On the ASA when I run sh ntp status I get the following:
Clock is unsynchronized, stratum 16, no reference clock
nominal freq is 99.9984 Hz, actual freq is 99.9984 Hz, precision is 2**6
reference time is 00000000.00000000 (01:28:16.000 EST Thu Feb 7 2036)
clock offset is 0.0000 msec, root delay is 0.00 msec
root dispersion is 0.00 msec, peer dispersion is 0.00 msec

When I run sh ntp associations the following is returned:
      address         ref clock     st  when  poll reach  delay  offset    disp
 ~     4   221  1024  377     0.7  254418   493.0
 * master (synced), # master (unsynced), + selected, - candidate, ~ configured

The IP address of the PDC is and showing as configured but not synced. I have set the PDC as the preferred NTP source as well. Has anyone sucessfully completed this before? any help would be much appreciated!
1 Solution
I'm not sure if things have changed or not with Win2k8, but I was never able to get Windows to be the master for Cisco devices:


Instead, I always make the Cisco device the master and make Windows the subordinate.
kjorvissAuthor Commented:
Thanks, that lead me to the solution....
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now