/
NTP

NTP

The following table lists the auto rules that are used to mitigate NTP attacks and to support security for NTP traffic on your advanced appliance. These rules include support for the following: NTP requests and responses, NTP IPv4 and IPv6 ACLs (Access Control Lists), private mode 7 packets, named ACLs, and “ANY” ACLs. For information about the parameters, see Overview of Packet Flow.

Rule ID

Rule Type

Rule NameDescription

Enable/Disable Condition

ParametersComments
130600100Auto

RATELIMIT PASS NTP TIME responses

When the NTP client is enabled, this rule passes UDP NTP TIME responses until the traffic hits the rate limit of 10 packets per second; it then blocks all NTP traffic for 15 seconds.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Events per second (default = 1)


130600120Auto

DROP NTP TIME responses

This rule drops all UDP NTP TIME responses when the NTP client is disabled.

Enabled when NTP service is disabled on this member.Events per second (default = 1)
200001001Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed GET_RESTRICT Requests IMPL 0x02

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed GET_RESTRICT Requests IMPL 0x02 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001005Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed GET_RESTRICT Requests IMPL 0x03

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed GET_RESTRICT Requests IMPL 0x03 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001010Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST_SUM Requests IMPL 0x02

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST_SUM Requests IMPL 0x02 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001015Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST_SUM Requests IMPL 0x03

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST_SUM Requests IMPL 0x03 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001020Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST Requests IMPL 0x02

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST Requests IMPL 0x02 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001025Auto

DOS Possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST Requests IMPL 0x03

When the NTP server is enabled, this rule warns about possible NTP DDoS Inbound Frequent Un-Authed PEER_LIST Requests IMPL 0x03 attacks. It then blocks suspicious NTP traffic for a time period that is specified in Drop Interval.

Enabled when NTP service is disabled on this member.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001050Auto

RATELIMIT PASS NTPQ IPv4 requests

This rule passes UDP NTPQ requests from NTP IPv4 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTPQ traffic for a time specified in Drop Interval.

Enabled when NTP IPv4 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is disabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001055Auto

RATELIMIT PASS NTP TIME IPv4 requests

This rule passes UDP NTP TIME requests from NTP IPv4 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTP TIME traffic for a time specified in Drop interval.

Enabled when NTP IPv4 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is enabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001060Auto

RATELIMIT PASS NTP private mode IPv4 requests

This rule passes UDP NTP private mode 7 requests from NTP IPv4 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTP private mode 7 traffic for a time specified in Drop interval.

Enabled when NTP IPv4 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is disabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001065Auto

RATELIMIT PASS NTPQ IPv6 requests

This rule passes UDP NTPQ requests from NTP IPv6 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTPQ traffic for a time specified in Drop Interval.

Enabled when NTP IPv6 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is disabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001070Auto

RATELIMIT PASS NTP TIME IPv6 requests

This rule passes UDP NTP TIME requests from NTP IPv6 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTP TIME traffic for a time specified in Drop interval.

Enabled when NTP IPv6 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is enabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001075Auto

RATELIMIT PASS NTP private mode IPv6 requests

This rule passes UDP NTP private mode 7 requests from NTP IPv4 ACLs until the traffic hits the rate limit (Packets per second) value. It then blocks all subsequent NTP private mode 7 traffic for a time specified in Drop interval.

Enabled when NTP IPv6 ACLs are defined. If no ACLs are defined and the NTP server is enabled, the default ACLs are enabled, and this rule is disabled.

Packets per second (default = 10)

Drop interval  (default = 15 seconds)

Rate algorithm (default = rate limiting)

Events per second (default = 1)


200001100Auto

DROP NTPQ requests unexpected

When NTP service is disabled, this rule drops all UDP NTPQ requests.

Enabled when NTP service is disabled on this member.

Events per second (default = 1)


200001105Auto

DROP NTP TIME requests unexpected

When NTP service is disabled, this rule drops all UDP NTP TIME requests.

Enabled when NTP service is disabled on this member.

Events per second (default = 1)


200001110Auto

DROP NTP private mode requests unexpected

When NTP service is disabled, this rule drops all UDP NTP private mode 7 requests.

Enabled when NTP service is disabled on this member.

Events per second (default = 1)


200001115Auto

DROP invalid NTP requests

When NTP service is disabled, this rule drops all invalid UDP NTP requests.

Enabled when NTP service is disabled on this member.

Events per second (default = 1)