Hello,
In UTM 9 i was able to point Sophos at a time source, and then internal clients could reference it for time. I don't see this option in XG, is this no longer possible?
Thanks!
This thread was automatically locked due to age.
Cd you please check attached configuration. I tried routing NTP traffic to public NTP server. It's not working. Could yo please help with this ?
All i need is to forward the NTP requests to a public NTP server.
Model: XG450 (SFOS 17.0.5 MR-5)
Rule Type:Business Application Rule
Hi,
why are you using a business rule, a simple network rule would be adequate.
Source (local lan), local network, destination wan, any, service ntp.
If you want to provide more security int he destination you can use the FQDN group for the NTP servers.
Do you have country blocking enabled? I have found that country blocking blocked my NTP access for country based NTP servers ag AU and US business and government servers.
Ian
Hi,
why are you using a business rule, a simple network rule would be adequate.
Source (local lan), local network, destination wan, any, service ntp.
If you want to provide more security int he destination you can use the FQDN group for the NTP servers.
Do you have country blocking enabled? I have found that country blocking blocked my NTP access for country based NTP servers ag AU and US business and government servers.
Ian
Finally I got it worked. I Forwarded NTP requests coming to Sophos Device to a public NTP server
Note:
** Do not use default Sophos NTP service, for some reason it was not working
** Create a custom NTP service with entry only for UDP 123
** Ensure to masquerade the DNAT rule
** Create new Business rule type DNAT
Is it me or you are allowing the whole universe, and more, to access an internal device 172.16.x1x.xxx via service NTP ??? NAT or not, seems to me your naked and vulnerable !!!
I too noticed NTP do not work sometime. And I too have created a custom NTP service.
Hi CharlesEapen,
as i see, we have the same idea to make a workaround for the "open feature". :-)
You should remove the "WAN" from the Zones, no need for it.
It's not a security leak, like Big_Buck means, because maped to LAN and not WAN, but it looks not realy clean. :-)
@ rfcat_vk
You have to create a separate service, like CharlesEapen did it.
The original "NTP" service in the XG contain two entries, TCP 123 and UDP 123.
The problem is, a "Business Application Rule" (DNAT), didn't work with more than one target port. :-(
So for a NTP TCP & UDP support you have to create two rules, one for NTP_UDP_123 and one for NTP_TCP_123.
At the end of the day, it works but an integrated NTP server is definitely a better solution.
Have to create over 30 rules, for a simple NTP "Server" Support on 15 internal networks. :-(
Alexander Fuchs
IT System Admiral
IT Technology Senior Evangelist
Hi rfcat_vk,
for DNS there is no need to do that.
In contrast to NTP the DNS (Service/Server/Proxy) works fine on the XG.
You found a god configuration example behind the following link.
rfcat are you really around 70?
If yes, so my major respect that you work with a XG Setup.
I see a lot of more younger guy's, which were completely overwhelmed with the configuration of a XG.
Best Regards
Alexander Fuchs
IT System Admiral
IT Technology Senior Evangelist
Hi Alexander,
that post/thread is for the UTM and you would be the first person to say that the XG has DNS proxy similar to the UTM, but thinking about the default configuration where the internal devices point at the internal interface I suppose that then indicates a DNS proxy.
Yes, I am 70 in a couple of months. The company I worked for was installing Pal Alto devices a couple of years ago and I needed to understand how they worked, no training budget and XG v15 happened to be released at the same time. The thinking is totally different and not always easy to grasp, but I give it my best shot. I have had some good teachers in these forums, Flo, Luk etc.
I have been using the UTM since 2005.
Ian
Hi rfcat_vk,
I see, I have to relativize my statement regarding DNS.
The “DNS-Service” on the XG is not really a full DNS-Server, it’s more a Proxy/Relay.
But that is exactly the same, that I see on all other Firewalls the last 20 years.
OK, the Handling is a little bit confusing, but at the end of the day the XG did exactly that what I want and need.
…
After today, no one can claim to me, that the XG is a bad firewall or something else.
Yes, sure, “she” is very touchy to who she gets tackled not like she want.
But if you take your time and try to understand her correctly, so you will be rewarded in the end with a very good solution.
A Partner and me bring today a setup at a customer online, where the Sophos Presales says “Guys, you’re sure … we not ”.
Forefront-Firewall:
XG 330 CLUSTER
Backend-Firewall:
XG 330 CLUSTER
We did the switch today at 12:15 till 13:15.
Now we have the end of the day with the following state.
Have a nice Evening
Alexander Fuchs
IT System Admiral
IT Technology Senior Evangelist