[j-nsp] NTP Reflection
Per Granath
per.granath at gcc.com.cy
Tue Jan 14 09:36:08 EST 2014
# show policy-options
policy-options {
prefix-list lo0.0-inet-address {
apply-path "interfaces lo0 unit 0 family inet address <*>";
}
prefix-list ntp-servers {
apply-path "system ntp server <*>";
}
}
# show firewall
firewall {
family inet {
filter protect_RE {
term NTP {
from {
source-prefix-list {
ntp-servers;
lo0.0-inet-address;
}
protocol udp;
port ntp;
}
then accept;
}
}
bla
bla
bla
-----Original Message-----
From: juniper-nsp [mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of Chris Adams
Sent: Tuesday, January 14, 2014 4:19 PM
To: juniper-nsp at puck.nether.net
Subject: Re: [j-nsp] NTP Reflection
Once upon a time, Olivier Benghozi <olivier.benghozi at wifirst.fr> said:
> Because if you don't do it, you'll obtain some nice "Server Timeout" if you want to issue a "show ntp status" or "show ntp associations".
> So:
> - Junos doesn't use 127.0.0.1 to locally communicate with ntpd
> - In you filters you're obliged to manually authorize internal private
> IP traffic used by the CLI and that doesn't even leave the RE
>
> Another fine design...
Seems like a good case for a commit script to auto-build the filter rule from configured NTP servers and configured loopback addresses.
--
Chris Adams <cma at cmadams.net>
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net https://puck.nether.net/mailman/listinfo/juniper-nsp
More information about the juniper-nsp
mailing list