Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

LAN Clients unable to receive External NTP Server Time

Hello,

Recently moved from UTM to XG and I'm encountering an issue where my LAN clients are unable to receive NTP replied from NTP servers.  I did not have this issue in UTM.

My general rule setup is to allow any LAN client unrestricted access to the internet.  When viewing the logs, port 123 traffic is allowed outbound, but does not appear that any client is recieiving the reply.  I have no other known issues connecting to the internet for any other services.  The Sophos XG appliance is able to get accurate time from NTP servers.

Are there any configurations I should be making to allow NTP for the LAN clients?

Thanks!

Brad



This thread was automatically locked due to age.
Parents
  • Probably a late reply for your post. Best practice for NTP configuration is

    1. The DC (PDC )  will be the main NTP server on the network. The NTP source for this server should be an external souce. (ntp.org1,2... )

    2. If you have multiple DC's - there is a chance that FSMO roles will be transferred. So a group policy should exist so ntp source for the network clients are from only the DC's

    3. If you have vmware in your enviroment - the time source should be the DC and the service should start and stop with the host.

    4. IF you are on hyper-v environment - Disable hyper v time sync service inside the DC 

    5. Ensure the polling internval setup on the DC is 900 ms or less and not default 3600 in a virtual environment

    6. Change the ntp source on all your network devices to your primary ntp server

    7. XG  would not block port 123 on the LAN. Also on XG configure the ntp source as external (ntp.org1,2... )

Reply
  • Probably a late reply for your post. Best practice for NTP configuration is

    1. The DC (PDC )  will be the main NTP server on the network. The NTP source for this server should be an external souce. (ntp.org1,2... )

    2. If you have multiple DC's - there is a chance that FSMO roles will be transferred. So a group policy should exist so ntp source for the network clients are from only the DC's

    3. If you have vmware in your enviroment - the time source should be the DC and the service should start and stop with the host.

    4. IF you are on hyper-v environment - Disable hyper v time sync service inside the DC 

    5. Ensure the polling internval setup on the DC is 900 ms or less and not default 3600 in a virtual environment

    6. Change the ntp source on all your network devices to your primary ntp server

    7. XG  would not block port 123 on the LAN. Also on XG configure the ntp source as external (ntp.org1,2... )

Children
No Data