<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP and proxy bypass in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187137#M56990</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46571"&gt;@PaulBrock&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you seeing the vpn/proxybypass be identified as NTP in the traffic logs, or are you seeing the vpn/pbp hit your NTP policy and be allowed by it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in case of the latter, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;'s solution will solve your issue. In case of the former you'll want to collect as much information as possible (pcaps, paket-diag log feature flow basic + appid basic) and open a support case&lt;/P&gt;</description>
    <pubDate>Wed, 15 Nov 2017 08:57:30 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-11-15T08:57:30Z</dc:date>
    <item>
      <title>NTP and proxy bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187022#M56976</link>
      <description>&lt;P&gt;Hi i have a problem at the moment where it appears there is a proxy/Vpn application that is using port 123 .&lt;/P&gt;&lt;P&gt;as i have lots of byod devices&amp;nbsp;that require access to NTP i leave the port open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I look at the monitor logs it source port can be anything from 123 to any other port and the dest port is 123 and P.A is letting me know the application is NTP , hence allowed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ssl decryption turned on .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am slightly stuck on how i ca allow legitimate NTP traffic as opposed to vpn/proxy using port 123&amp;nbsp; ?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 22:50:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187022#M56976</guid>
      <dc:creator>PaulBrock</dc:creator>
      <dc:date>2017-11-14T22:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: NTP and proxy bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187044#M56978</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;At this point it would be the application inspection. In your logs, filter by port 123 and see which applications are using that port. Then rewrite the rule to allow only NTP 'application' and remove the port 'Service'.&lt;/P&gt;&lt;P&gt;So the policy would look similar to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 322px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12423iA17356B13CE937FF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If there is an app using ssl over port 123, you might need an additional policy to allow ssl over port 123.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope I understood your question correctly. Please let me know if I havent and i'll do my best to answer it correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 23:58:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187044#M56978</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-11-14T23:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: NTP and proxy bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187137#M56990</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/46571"&gt;@PaulBrock&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you seeing the vpn/proxybypass be identified as NTP in the traffic logs, or are you seeing the vpn/pbp hit your NTP policy and be allowed by it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in case of the latter, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;'s solution will solve your issue. In case of the former you'll want to collect as much information as possible (pcaps, paket-diag log feature flow basic + appid basic) and open a support case&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 08:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-and-proxy-bypass/m-p/187137#M56990</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-15T08:57:30Z</dc:date>
    </item>
  </channel>
</rss>

