<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP setup - possible issues in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109609#M14941</link>
    <description>&lt;P&gt;So it went smooth for all GWs, but one that is connected back to location where NTP sits via s2s VPN.&lt;/P&gt;&lt;P&gt;Issue is that when sending NTP request it uses mgmt interface which has public IP and the checkpoint on the other side of VPN tunnel drops traffic.&lt;/P&gt;&lt;P&gt;Is there a way to change source interface for NTP service traffic ?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kuba&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Feb 2021 10:33:05 GMT</pubDate>
    <dc:creator>Jacob_W</dc:creator>
    <dc:date>2021-02-03T10:33:05Z</dc:date>
    <item>
      <title>NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109264#M14835</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As we're not using NTP servers for our security GWs, we're experiencing some problems with logs synchronizations, etc. due to clocks mismatch.&lt;/P&gt;&lt;P&gt;I'm planning to setup up all the GWs and mgmt server to use corporate NTP servers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is what issues might pop-up? Differences between clocks on specific GWs are even few hours.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does the NTP configuration imply GW reboot?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 09:47:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109264#M14835</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-01-29T09:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109293#M14836</link>
      <description>&lt;P&gt;Make sure you have the correct timezones set prior, no reboot should be necessary.&lt;/P&gt;
&lt;P&gt;Lack of time sync can cause issues with Logging, certificates and VPNs.&lt;/P&gt;
&lt;P&gt;Are all the affected systems physical appliances?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 14:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109293#M14836</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-01-29T14:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109296#M14837</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;Thanks for the answer. Yes, they are all physical boxes located in two different timezones.&lt;/P&gt;&lt;P&gt;Is the GAIA GUI right place for that setup or should I go with CLI ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 15:09:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109296#M14837</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-01-29T15:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109303#M14838</link>
      <description>&lt;P&gt;Both are valid and actually the same thing, if you configure the NTP servers in CLISH they will appear in the web UI and vice-versa.&lt;/P&gt;&lt;P&gt;Just make sure you type "save config" if you do it in CLISH, in the UI it's done automatically.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 16:21:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109303#M14838</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2021-01-29T16:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109323#M14839</link>
      <description>&lt;P&gt;Before setting the NTP servers, make sure the time and date is correct.&lt;BR /&gt;NTP will only correct for clock drift, not massive changes (more than a few minutes) in the clock.&lt;BR /&gt;You may want to use the ntpdate command from expert mode to do this one time.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jan 2021 06:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109323#M14839</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-30T06:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109609#M14941</link>
      <description>&lt;P&gt;So it went smooth for all GWs, but one that is connected back to location where NTP sits via s2s VPN.&lt;/P&gt;&lt;P&gt;Issue is that when sending NTP request it uses mgmt interface which has public IP and the checkpoint on the other side of VPN tunnel drops traffic.&lt;/P&gt;&lt;P&gt;Is there a way to change source interface for NTP service traffic ?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kuba&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 10:33:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/109609#M14941</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-03T10:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110115#M15106</link>
      <description>&lt;P&gt;Anyone has any idea on above?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 06:11:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110115#M15106</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T06:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110130#M15110</link>
      <description>&lt;P&gt;create a static route for this traffic&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:01:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110130#M15110</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T09:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110132#M15111</link>
      <description>&lt;P&gt;Static route won't help here as there's only one outside interface and it's the one with public IP. Default route is s2s VPN.&lt;/P&gt;&lt;P&gt;Traffic must be originated from LAN interface to be properly classified on the other end of tunnel.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:04:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110132#M15111</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T09:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110133#M15112</link>
      <description>&lt;P&gt;so your ntp traffic goes in clear and the other site drops it?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:10:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110133#M15112</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T09:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110135#M15114</link>
      <description>&lt;P&gt;Yes, it's getting dropped as the source IP (mgmt interface) is not a part of encryption domain of that VPN.&lt;/P&gt;&lt;P&gt;That's why I'm looking on hot to pick up other interface as source for NTP traffic. This would be the easiest and best option.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:14:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110135#M15114</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T09:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110136#M15115</link>
      <description>&lt;P&gt;add it to the enc domain or do an exclusion for this traffic in the vpn community&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:14:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110136#M15115</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T09:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110138#M15116</link>
      <description>&lt;P&gt;Adding to encryption domain might be the solution/workaround here.&lt;/P&gt;&lt;P&gt;Exclusion would also require change in implied rules, right ?&lt;/P&gt;&lt;P&gt;I was just wondering if Checkpoint has functionality like service routes in Palo Alto firewalls - this would be the easiest way here.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 09:23:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110138#M15116</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T09:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110147#M15117</link>
      <description>&lt;P&gt;exclusion is done in the vpn community, there is a tab service exclusion. There you add ntp and this traffic goes by this community without being enc/decr. Of course you must have a rule on both site to pass this traffic. This is not a change in implied rule. Sometimes I use this function for icmp to proof a customer that the devices has connectivity and the problem is somewhere in the encryption part&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; .&lt;/P&gt;&lt;P&gt;I never heard of any kind of service route in CP but I believe policy based routing can do the same. In your case the enc/decr traffic goes thru mgmt interface, also the ntp goes thru the same mgmt interface, so routing the traffic to eth1 doesn't make sense, or I miss something in your environment?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 10:12:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110147#M15117</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T10:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110149#M15118</link>
      <description>&lt;P&gt;Thanks a lot for explanation.&lt;/P&gt;&lt;P&gt;It's not about routing traffic via eth1, but sourcing traffic from it. They it could be encrypted/decrypted and would work fine.&lt;/P&gt;&lt;P&gt;ICMP traffic from that gateway is now hitting implied rule on other end of VPN tunnel and this is fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll try both in some maintenance window - exclusion and adding mgmt int IP to enc domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 10:16:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110149#M15118</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T10:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110168#M15125</link>
      <description>&lt;P&gt;but the ntp traffic originates from the gw itself. It makes no sense to source it from eth1 and leaves via mng to be encrypted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see two solutions for you: 1) add your gw in the vpn community and ntp as an interesting traffic on both sites 2) exclude ntp in the vpn community&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 11:37:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110168#M15125</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T11:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110173#M15128</link>
      <description>&lt;P&gt;In this specific use case it doesn't make sense, true.&lt;/P&gt;&lt;P&gt;But there are other use cases when it would be a benefit to source some, let's say service traffic, out from interfaces different than management.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll proceed with solutions You provided. Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 12:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110173#M15128</guid>
      <dc:creator>Jacob_W</dc:creator>
      <dc:date>2021-02-08T12:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: NTP setup - possible issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110177#M15129</link>
      <description>&lt;P&gt;It's a matter of routing. You can play with policy based routing to achieve something different than static/default routing. Also you must think of the surrounding devices so there won't be any assymetric traffic&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 12:17:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NTP-setup-possible-issues/m-p/110177#M15129</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-02-08T12:17:13Z</dc:date>
    </item>
  </channel>
</rss>

