{"id":84344,"date":"2022-10-24T20:00:22","date_gmt":"2022-10-24T19:00:22","guid":{"rendered":"https:\/\/www.avanet.com\/kb\/set-up-sophos-firewall-as-ntp-server\/"},"modified":"2022-10-24T20:24:49","modified_gmt":"2022-10-24T19:24:49","slug":"set-up-sophos-firewall-as-ntp-server","status":"publish","type":"kb","link":"https:\/\/www.avanet.com\/en\/kb\/set-up-sophos-firewall-as-ntp-server\/","title":{"rendered":"Set up Sophos Firewall as NTP server"},"content":{"rendered":"\n<p>The title is, technically speaking, incorrect, as the Sophos Firewall does not run an NTP service. However, this can be solved with a NAT rule so that the Sophos Firewall takes care of all NTP requests and the gateway IP can still be specified as the NTP server on the client or server. <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-nat-ntp-regel-erstellen\">Create NAT NTP rule<\/h2>\n\n<p>First, I create a NAT rule that takes care of the NTP protocol.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1259\" data-id=\"84307\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84307\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled-64x31.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-300x148.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1024x504.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-768x378.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1536x756.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-2048x1007.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-600x295.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<p>The NAT rule now defines for which local networks the Sophos Firewall should answer NTP requests.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1849\" data-id=\"84322\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\" alt=\"\" class=\"wp-image-84322\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled-64x46.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-300x217.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1024x740.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-768x555.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1536x1110.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-2048x1479.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-600x433.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\">1. Original Source<\/h3>\n\n<p>The networks or individual IP addresses that are to use this NAT rule are entered here. For example, 192.168.33.0\/24 or ANY, if every request is to be processed. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Original Destination<\/h3>\n\n<p>Here you list all IP addresses that the Sophos Firewall should listen to. For example, the gateway address: 192.168.12.1 or ANY, if every request is to be considered. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Original Service<\/h3>\n\n<p><strong>NTP<\/strong> is specified as the protocol, which is already a predefined service on the firewall.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Translated Source (SNAT)<\/h3>\n\n<p>The firewall should perform IP masquerading and therefore we select <strong>MASQ<\/strong> as the value here.<\/p>\n\n<h3 class=\"wp-block-heading\">5. Translated destination (DNAT)<\/h3>\n\n<p>Here we enter the NTP server address to which the firewall should send all time requests. I use the FQDN <strong>time.google.com<\/strong> here or <strong>pool.ntp.org<\/strong> is also popular. <\/p>\n\n<h3 class=\"wp-block-heading\">Inbound Interface<\/h3>\n\n<p>In addition, you can also store the local interfaces, for example, so that you are sure not to answer any WAN requests. I leave it at ANY and solve this afterwards via the firewall rule. <\/p>\n\n<h2 class=\"wp-block-heading\">Firewall rule for NTP service<\/h2>\n\n<p>To allow the traffic of the NAT rule, you need a firewall rule, which you now create.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1564\" height=\"2560\" data-id=\"84327\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84327\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg 1564w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled-64x105.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-300x491.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-183x300.jpg 183w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-625x1024.jpg 625w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-768x1257.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-938x1536.jpg 938w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-1251x2048.jpg 1251w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-600x982.jpg 600w\" sizes=\"auto, (max-width: 1564px) 100vw, 1564px\" \/><\/a><\/figure>\n<figcaption class=\"blocks-gallery-caption\">Sophos Firewall rule for NTP server traffic<\/figcaption><\/figure>\n\n<h3 class=\"wp-block-heading\">1. Source Zones<\/h3>\n\n<p>Here we list all source zones, such as <strong>LAN<\/strong>. What we do not want to see here is the <strong>WAN<\/strong> zone, as we do not want to provide an NTP server for the Internet here. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Source Networks and Devices<\/h3>\n\n<p>Here we can list the same networks as in the NAT rule at point 1. original source. Since I solve this here via the zone, I leave it at ANY, but you can of course also store both zone and source networks. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Destination Zones<\/h3>\n\n<p>Since our time server is on the Internet, I choose the <strong>WAN<\/strong> zone here.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Destination Networks<\/h3>\n\n<p>I have defined time.google.com as the NTP server in the NAT rule. That&#8217;s why I choose this FQDN here, but I could leave it at ANY, as this is already defined in the NAT rule. However, I like to see immediately in the firewall rule where the traffic is going.  <\/p>\n\n<h3 class=\"wp-block-heading\">5. Services<\/h3>\n\n<p>As with the NAT rule, we use the predefined protocol <strong>NTP<\/strong>.<\/p>\n\n<h3 class=\"wp-block-heading\">6. Detect and prevent exploits (IPS)<\/h3>\n\n<p>You have the firewall because you also want to bring some security to the network. That&#8217;s why we also provide an IPS rule for the NTP traffic. For this, I simply created an IPS rule with the Smart Filter <strong>nat<\/strong>.  <\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" data-id=\"84332\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg\" alt=\"\" class=\"wp-image-84332\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled-64x33.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-300x156.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-768x400.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1536x800.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-2048x1067.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-600x313.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>IPS NAT rule<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" data-id=\"84337\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\" alt=\"\" class=\"wp-image-84337\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-64x42.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-300x196.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-768x502.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1536x1003.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-2048x1338.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-600x392.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Add new IPS rule for NAT<\/figcaption><\/figure>\n<\/figure>\n\n<p>\u26a0\ufe0f The IPS (Intrusion Prevention) function requires a Network Protection licence.<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"template":"","format":"standard","kb_kategorie":[382],"class_list":["post-84344","kb","type-kb","status-publish","format-standard","hentry","kb_kategorie-sophos-firewall"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb\/84344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media?parent=84344"}],"wp:term":[{"taxonomy":"kb_kategorie","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb_kategorie?post=84344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}