Solved

how to create an access-list to allow ntp

Posted on 2014-09-21
14
502 Views
Last Modified: 2014-10-09
hi I have an asa5505 connected to my cisco2950 and currently my master dc/ad/dhcp/dns has internet access.

qns1.  I wish to know the correct way of allowing access to an external ntp  ?

I am not sure of how to create an access-list or if an access-group should be used, in-conjunction with my current config.
0
Comment
Question by:mikey250
14 Comments
 
LVL 24

Expert Comment

by:Mohammed Khawaja
ID: 40335850
0
 
LVL 9

Accepted Solution

by:
nattygreg earned 250 total points
ID: 40335935
Use the config below to set the time and date, microsoft provides good ntp server google it, and use the non authenticated config to connect to it. ( no microsoft will not provide you with auth but there servers are reliable)
(remember this will be the weakest point in your secure network)


Configure Clock Settings:

To configure the clock settings of the ASA appliance, use the clock set command as shown below:

ciscoasa# clock set hh:mm:ss [day month | month day] year

Example:

ciscoasa# clock set 18:30:00 Apr 10 2009

To verify the correct clock on the appliance, use the show clock command.

Configure Time Zone and Daylight Saving Time:

To configure the time zone and the summer daylight saving time use the commands below:

ciscoasa# config t
ciscoasa(config)# clock timezone [zone name] [offset hours from UTC]
ciscoasa(config)# clock summer-time [zone name] recurring [week weekday month hh:mm week weekday month hh:mm] [offset]

Example:

ciscoasa(config)# clock timezone MST -7
ciscoasa(config)# clock summer-time MST recurring 1 Sunday April 2:00 last Sunday October 2:00

Configure Network Time Protocol (NTP):

If there is an NTP server in the network that provides accurate clock settings, then you can configure the firewall to synchronize its time with the NTP server. Both an authenticated and non-authenticated NTP is supported:

Non-Authenticated NTP:

ciscoasa(config)# ntp server [ip address of NTP] source [interface name]

Example:

ciscoasa(config)# ntp server 10.1.23.45 source inside

Authenticated NTP:

ciscoasa(config)# ntp authenticate
ciscoasa(config)# ntp authentication-key [key ID] md5 [ntp key]
ciscoasa(config)# ntp trusted-key [key ID]
ciscoasa(config)# ntp server [ip address of NTP] key [key ID] source [intf name]

Example:

ciscoasa(config)# ntp authenticate
ciscoasa(config)# ntp authentication-key 32 md5 secretkey1234
ciscoasa(config)# ntp trusted-key 32
ciscoasa(config)# ntp server 10.1.2.3 key 32 source inside
0
 

Author Comment

by:mikey250
ID: 40339097
hi nattygreg, thanks for your input but yes I have pretty much that config already put to one side.

what I wanted to do was ensure ntp configured on my asa5505 was configured in an 'access-group 1st and then an 'access-list' created and then pointed to an outside ntp free device so I wanted to know how to do this first and the wait for a response so I know it is working before ensure my master dc can sync to an external ntp also.

I am currently trying to put together an access-group & access-list that allows this but not sure if I have it correct yet.  currently I have created an 'allow_icmp' for inbound via a youtube video.
0
 

Author Comment

by:mikey250
ID: 40339113
I was thinking something like below that allows me to ping my public ntp server as below and then do: sh ntp status - for example... my network is disconnected at the moment

config t
ntp server 93.93.131.217 source outside

object network outside_subnet
object network inside_subnet
  subnet 192.168.0.0 255.255.255.0
object-group icmp-type allow-icmp
 icmp-object echo-reply
 icmp-object time-exceeded
 icmp-object unreachable
 icmp-object traceroute

access-list INBOUND extended permit icmp any any object-group ALLOW-ICMP
access-list outbound extended permit udp any any eq ntp
0
 

Author Comment

by:mikey250
ID: 40339140
& the below to allow my single master dc to keep ntp clock timing with the below:

access-list outbound extended permit udp host 192.168.1.1 any eq 123 or ntp (not sure)
access-group outbound in interface inside
0
 
LVL 79

Assisted Solution

by:lrmoore
lrmoore earned 250 total points
ID: 40347602
If you already have an outbound access list that only allows certain hosts out on certain ports, then yes you need the outbound acl
Access-list outbound permit udp host 192.168.1.1 any eq 123

If you do not currently have an outbound acl applied, then don't do this. You will block everything else.

You dont need the inbound ace because if the packet is allowed out, the response is automatically allowed back in.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:mikey250
ID: 40347766
hi I have since set asa5505 back to factory default settings.

I have now only added:

access-list outbound extended permit udp any any eq ntp

ntp server 93.93.131.217 source outside
0
 

Author Comment

by:mikey250
ID: 40347769
I can ping 8.8.8.8 successful

I cannot yet ping 93.93.131.217 - but I realise it may take a long time to allow

I am not sure if my acl above is all that is needed  ?
0
 
LVL 24

Expert Comment

by:Mohammed Khawaja
ID: 40348085
Could it be that the IP you are trying to ping does not accept ping request?
0
 

Author Comment

by:mikey250
ID: 40348308
hi mohammed, yes I realise if I cannot ping the ip address: 93.93.131.217 then it may not be accepting ping requests.

I have also read the below url regarding also microsofts free timer server:

http://www.techrepublic.com/article/synchronize-a-cisco-routers-clock-with-network-time-protocol-ntp/

via my standalone win 7 desktop which is plugged directly into my virgin media box I carried out the below:

ping time-nw.nist.gov - failed ping
ping 131.107.1.10 - failed ping
ping 131.107.1.100 - failed ping
0
 

Author Comment

by:mikey250
ID: 40348412
I have been looking at links like this but nothing seems to ping and not even sure if I need to register.

http://support.ntp.org/bin/view/Servers/StratumOneTimeServers
0
 

Author Closing Comment

by:mikey250
ID: 40371494
good advice appreciated.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now