{"id":86138,"date":"2022-10-24T20:00:22","date_gmt":"2022-10-24T19:00:22","guid":{"rendered":"https:\/\/www.avanet.com\/kb\/configurar-sophos-firewall-como-servidor-ntp\/"},"modified":"2022-11-08T10:42:27","modified_gmt":"2022-11-08T09:42:27","slug":"configurar-sophos-firewall-como-servidor-ntp","status":"publish","type":"kb","link":"https:\/\/www.avanet.com\/es\/kb\/configurar-sophos-firewall-como-servidor-ntp\/","title":{"rendered":"Configurar Sophos Firewall como servidor NTP"},"content":{"rendered":"\n<p>Hay que admitir que el t\u00edtulo es estrictamente err\u00f3neo, ya que no hay ning\u00fan servicio NTP funcionando en el Sophos Firewall.\nSin embargo, esto puede resolverse con una regla de NAT para que el Sophos Firewall se encargue de todas las solicitudes de NTP y la IP de la puerta de enlace pueda seguir especific\u00e1ndose como servidor NTP en el cliente o servidor. <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-nat-ntp-regel-erstellen\">Crear regla NAT NTP<\/h2>\n\n<p>Primero, creo una regla NAT que se encarga del protocolo NTP.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1259\" data-id=\"84307\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84307\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled-64x31.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-300x148.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1024x504.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-768x378.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1536x756.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-2048x1007.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-600x295.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<p>La regla NAT define ahora para qu\u00e9 redes locales debe responder el Sophos Firewall a las peticiones NTP.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1849\" data-id=\"84322\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\" alt=\"\" class=\"wp-image-84322\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled-64x46.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-300x217.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1024x740.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-768x555.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1536x1110.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-2048x1479.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-600x433.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\">1. Original Source<\/h3>\n\n<p>Aqu\u00ed se introducen las redes o direcciones IP individuales que deben utilizar esta regla NAT.\nPor ejemplo, 192.168.33.0\/24 o CUALQUIERA, si se deben considerar todas las solicitudes. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Original Destination<\/h3>\n\n<p>Aqu\u00ed se enumeran todas las direcciones IP que el Sophos Firewall debe escuchar.\nPor ejemplo, la direcci\u00f3n de la puerta de enlace: 192.168.12.1 o CUALQUIERA, si se deben considerar todas las solicitudes. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Original Service<\/h3>\n\n<p>Se especifica <strong>NTP<\/strong> como protocolo, que ya es un servicio predefinido en el cortafuegos.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Translated Source (SNAT)<\/h3>\n\n<p>El cortafuegos debe realizar el enmascaramiento de IP y, por lo tanto, seleccionamos <strong>MASQ<\/strong> como valor aqu\u00ed.<\/p>\n\n<h3 class=\"wp-block-heading\">5. Translated destination (DNAT)<\/h3>\n\n<p>Aqu\u00ed introducimos la direcci\u00f3n del servidor NTP al que el cortafuegos debe enviar todas las peticiones de hora.\nYo uso el FQDN <strong>time.google.com<\/strong> aqu\u00ed o <strong>pool.ntp.org<\/strong> tambi\u00e9n es popular. <\/p>\n\n<h3 class=\"wp-block-heading\">Inbound Interface<\/h3>\n\n<p>Adem\u00e1s, tambi\u00e9n puede almacenar las interfaces locales, por ejemplo, para estar seguro de no responder a ninguna solicitud de la WAN.\nLo dejo en ANY y lo resuelvo despu\u00e9s a trav\u00e9s de la regla del firewall. <\/p>\n\n<h2 class=\"wp-block-heading\">Regla del cortafuegos para el servicio NTP<\/h2>\n\n<p>Para permitir el tr\u00e1fico de la regla NAT, se necesita una regla de firewall, que se crea ahora.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1564\" height=\"2560\" data-id=\"84327\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84327\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg 1564w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled-64x105.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-300x491.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-183x300.jpg 183w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-625x1024.jpg 625w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-768x1257.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-938x1536.jpg 938w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-1251x2048.jpg 1251w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-600x982.jpg 600w\" sizes=\"auto, (max-width: 1564px) 100vw, 1564px\" \/><\/a><\/figure>\n<figcaption class=\"blocks-gallery-caption\">Regla de Sophos Firewall para el tr\u00e1fico del servidor NTP<\/figcaption><\/figure>\n\n<h3 class=\"wp-block-heading\">1. Source Zones<\/h3>\n\n<p>Aqu\u00ed se enumeran todas las zonas de origen, como <strong>la LAN.<\/strong>\nLo que no queremos ver aqu\u00ed es la zona <strong>WAN<\/strong>, ya que no queremos proporcionar un servidor NTP para Internet aqu\u00ed. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Source Networks and Devices<\/h3>\n\n<p>Aqu\u00ed podemos enumerar las mismas redes que en la regla NAT del punto 1. fuente original.\nComo lo resuelvo aqu\u00ed a trav\u00e9s de la zona, lo dejo en CUALQUIER, pero, por supuesto, tambi\u00e9n puede almacenar tanto la zona como las redes de origen. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Destination Zones<\/h3>\n\n<p>Como nuestro servidor horario est\u00e1 en Internet, aqu\u00ed elijo la zona <strong>WAN<\/strong>.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Destination Networks<\/h3>\n\n<p>He definido time.google.com como servidor NTP en la regla NAT.\nPor eso tambi\u00e9n selecciono este FQDN aqu\u00ed, pero podr\u00eda dejarlo en CUALQUIER, ya que est\u00e1 definido en la regla NAT.\nSin embargo, me gusta ver inmediatamente en la regla del cortafuegos hacia d\u00f3nde va el tr\u00e1fico.  <\/p>\n\n<h3 class=\"wp-block-heading\">5. Services<\/h3>\n\n<p>Al igual que con la regla NAT, utilizamos el protocolo predefinido <strong>NTP<\/strong>.<\/p>\n\n<h3 class=\"wp-block-heading\">6. Detect and prevent exploits (IPS)<\/h3>\n\n<p>Tienes el cortafuegos porque tambi\u00e9n quieres aportar algo de seguridad a la red.\nPor eso tambi\u00e9n proporcionamos una regla IPS para el tr\u00e1fico NTP.\nPara ello, simplemente he creado una regla IPS con el filtro inteligente <strong>nat<\/strong>.  <\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" data-id=\"84332\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg\" alt=\"\" class=\"wp-image-84332\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled-64x33.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-300x156.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-768x400.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1536x800.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-2048x1067.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-600x313.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Regla NAT de IPS<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" data-id=\"84337\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\" alt=\"\" class=\"wp-image-84337\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-64x42.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-300x196.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-768x502.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1536x1003.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-2048x1338.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-600x392.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>A\u00f1adir nueva regla IPS para NAT<\/figcaption><\/figure>\n<\/figure>\n\n<p>La funci\u00f3n IPS (Intrusion Prevention) requiere una licencia de Network Protection.<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"template":"","format":"standard","kb_kategorie":[408],"class_list":["post-86138","kb","type-kb","status-publish","format-standard","hentry","kb_kategorie-sophos-firewall"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/kb\/86138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/users\/5"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/media?parent=86138"}],"wp:term":[{"taxonomy":"kb_kategorie","embeddable":true,"href":"https:\/\/www.avanet.com\/es\/wp-json\/wp\/v2\/kb_kategorie?post=86138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}