{"id":86140,"date":"2022-10-24T20:00:22","date_gmt":"2022-10-24T19:00:22","guid":{"rendered":"https:\/\/www.avanet.com\/kb\/impostare-sophos-firewall-come-server-ntp\/"},"modified":"2022-11-08T10:43:24","modified_gmt":"2022-11-08T09:43:24","slug":"impostare-sophos-firewall-come-server-ntp","status":"publish","type":"kb","link":"https:\/\/www.avanet.com\/it\/kb\/impostare-sophos-firewall-come-server-ntp\/","title":{"rendered":"Impostare Sophos Firewall come server NTP"},"content":{"rendered":"\n<p>Il titolo \u00e8 in realt\u00e0 errato, in quanto non esiste un servizio NTP in esecuzione su Sophos Firewall.\nTuttavia, questo problema pu\u00f2 essere risolto con una regola NAT, in modo che il Sophos Firewall si occupi di tutte le richieste NTP e l&#8217;IP del gateway possa ancora essere specificato come Server NTP sul client o sul Server. <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-nat-ntp-regel-erstellen\">Creare una regola NAT NTP<\/h2>\n\n<p>Per prima cosa, creo una regola NAT che si occupa del protocollo NTP.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1259\" data-id=\"84307\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84307\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-scaled-64x31.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-300x148.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1024x504.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-768x378.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-1536x756.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-2048x1007.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-600x295.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<p>La regola NAT definisce ora per quali reti locali il Sophos Firewall deve rispondere alle richieste NTP.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1849\" data-id=\"84322\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg\" alt=\"\" class=\"wp-image-84322\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled.jpg 2560w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-scaled-64x46.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-300x217.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1024x740.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-768x555.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-1536x1110.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-2048x1479.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-nat-rule-detail-600x433.jpg 600w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n<\/figure>\n\n<h3 class=\"wp-block-heading\">1. Original Source<\/h3>\n\n<p>Qui si inseriscono le reti o i singoli indirizzi IP che devono utilizzare questa regola NAT.\nAd esempio, 192.168.33.0\/24 o ANY, se si vuole prendere in considerazione ogni richiesta. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Original Destination<\/h3>\n\n<p>Qui si elencano tutti gli indirizzi IP che il Sophos Firewall deve ascoltare.\nAd esempio, l&#8217;indirizzo del gateway: 192.168.12.1 o ANY, se si vuole prendere in considerazione ogni richiesta. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Original Service<\/h3>\n\n<p>Come protocollo viene specificato <strong>NTP<\/strong>, che \u00e8 gi\u00e0 un servizio predefinito sul firewall.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Translated Source (SNAT)<\/h3>\n\n<p>Il firewall deve eseguire il masquerading IP e quindi selezioniamo <strong>MASQ<\/strong> come valore.<\/p>\n\n<h3 class=\"wp-block-heading\">5. Translated destination (DNAT)<\/h3>\n\n<p>Qui si inserisce l&#8217;indirizzo del Server NTP a cui il firewall deve inviare tutte le richieste di orario.\nIo uso l&#8217;FQDN <strong>time.google.com<\/strong>, ma anche <strong>pool.ntp.org<\/strong> \u00e8 molto diffuso. <\/p>\n\n<h3 class=\"wp-block-heading\">Inbound Interface<\/h3>\n\n<p>Inoltre, \u00e8 possibile memorizzare anche le interfacce locali, per esempio, in modo da essere sicuri di non rispondere a nessuna richiesta WAN.\nLo lascio a QUALSIASI e risolvo il problema in seguito tramite la regola del firewall. <\/p>\n\n<h2 class=\"wp-block-heading\">Regola del firewall per il servizio NTP<\/h2>\n\n<p>Per consentire il traffico della regola NAT, \u00e8 necessaria una regola del firewall, che ora viene creata.<\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1564\" height=\"2560\" data-id=\"84327\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg\" alt=\"\" class=\"wp-image-84327\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled.jpg 1564w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-scaled-64x105.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-300x491.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-183x300.jpg 183w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-625x1024.jpg 625w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-768x1257.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-938x1536.jpg 938w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-1251x2048.jpg 1251w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-firewall-rule-600x982.jpg 600w\" sizes=\"auto, (max-width: 1564px) 100vw, 1564px\" \/><\/a><\/figure>\n<figcaption class=\"blocks-gallery-caption\">Regola del Sophos Firewall per il traffico del Server NTP<\/figcaption><\/figure>\n\n<h3 class=\"wp-block-heading\">1. Source Zones<\/h3>\n\n<p>Qui vengono elencate tutte le zone di origine, come la <strong>LAN.<\/strong>\nQuello che non vogliamo vedere qui \u00e8 la zona <strong>WAN<\/strong>, poich\u00e9 non vogliamo fornire un Server NTP per Internet. <\/p>\n\n<h3 class=\"wp-block-heading\">2. Source Networks and Devices<\/h3>\n\n<p>Qui si possono elencare le stesse reti della regola NAT al punto 1. sorgente originale.\nPoich\u00e9 qui risolvo il problema tramite la zona, lo lascio a QUALSIASI, ma naturalmente \u00e8 possibile memorizzare sia le reti di zona che quelle di origine. <\/p>\n\n<h3 class=\"wp-block-heading\">3. Destination Zones<\/h3>\n\n<p>Poich\u00e9 il nostro time server \u00e8 su Internet, scelgo qui la zona <strong>WAN<\/strong>.<\/p>\n\n<h3 class=\"wp-block-heading\">4. Destination Networks<\/h3>\n\n<p>Ho definito time.google.com come Server NTP nella regola NAT.\nPer questo motivo ho scelto questo FQDN, ma potrei lasciarlo a QUALSIASI, poich\u00e9 \u00e8 gi\u00e0 definito nella regola NAT.\nTuttavia, mi piace vedere immediatamente nella regola del firewall dove va il traffico.  <\/p>\n\n<h3 class=\"wp-block-heading\">5. Services<\/h3>\n\n<p>Come per la regola NAT, utilizziamo il protocollo predefinito <strong>NTP<\/strong>.<\/p>\n\n<h3 class=\"wp-block-heading\">6. Detect and prevent exploits (IPS)<\/h3>\n\n<p>Avete il firewall perch\u00e9 volete anche garantire una certa sicurezza alla rete.\nPer questo motivo forniamo anche una regola IPS per il traffico NTP.\nA tale scopo, ho semplicemente creato una regola IPS con lo Smart Filter <strong>nat<\/strong>.  <\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" data-id=\"84332\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg\" alt=\"\" class=\"wp-image-84332\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1024x533.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-scaled-64x33.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-300x156.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-768x400.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-1536x800.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-2048x1067.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-600x313.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Regola IPS NAT<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" data-id=\"84337\" src=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg\" alt=\"\" class=\"wp-image-84337\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1024x669.jpg 1024w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-64x42.jpg 64w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-300x196.jpg 300w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-768x502.jpg 768w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-1536x1003.jpg 1536w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-2048x1338.jpg 2048w, https:\/\/www.avanet.com\/assets\/sophos-firewall-ntp-server-ips-rule-add-new-600x392.jpg 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Aggiungere una nuova regola IPS per NAT<\/figcaption><\/figure>\n<\/figure>\n\n<p>La funzione IPS (Intrusion Prevention) richiede una licenza Network Protection.<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"template":"","format":"standard","kb_kategorie":[409],"class_list":["post-86140","kb","type-kb","status-publish","format-standard","hentry","kb_kategorie-sophos-firewall"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/kb\/86140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/users\/5"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/media?parent=86140"}],"wp:term":[{"taxonomy":"kb_kategorie","embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/kb_kategorie?post=86140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}