Best practices suggest that the SA Server should be configured to act as NTP server for all other hosts within a Security Analytics environment.
This ensures that hosts within a site are in sync time-wise
On the SA Server:
- Make sure you have the following Firewall rule:
-A INPUT -p udp -m udp -m multiport --dports 123 -m comment --comment "ntp" -m conntrack --ctstate NEW -j ACCEPT
- This can be checked by running the following command on SA Admin Server CLI:
#iptables -L --line-numbers | grep -i ntp
- If it is not added by default, please follow these steps to add the NTP firewall rules:
- SSH into the SA Server
- Backup the existing iptables configuration
#cp /etc/sysconfig/iptables /etc/sysconfig/iptables.backup.$(date +"%Y%m%d_%H%M")
- Add an NTP entry for the INPUT chain:
A) Iptables: To list out the rules with line numbers:
#iptables -L --line-numbers
B) Save the current iptables configuration:
#service iptables save
C) Take note of the line number for the final Input Chain DROP, because we'll need to input the allow rule before that line:
#iptables -L --line-numbers | grep DROP
Chain INPUT (policy DROP)
23 DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
1 DROP all -- anywhere anywhere
D) Add the new iptables logic to allow for
input NTP Traffic.
Note: In my example I am adding them before line 23, which is my final Input Chain DROP, so line 22
iptables -I INPUT 22 -p udp -m state --state NEW -m udp --dport 123 -j ACCEPT
E) Add the new iptables logic to allow for output NTP Traffic.
iptables -A OUTPUT -p udp --sport 123 -j ACCEPT
- Save & Restart iptables if modified:
A) Save iptables:
#service iptables save
B) Restart iptables
#service iptables restart
C) Verify the changes:
#iptables -L --line-numbers | grep -i ntp
22 ACCEPT udp -- anywhere anywhere state NEW udp dpt:ntp
2 ACCEPT udp -- anywhere anywhere udp spt:ntp
- To verify NTP setting on all hosts:
Run this command from SA Admin Server CLI:
salt '*' cmd.run 'hostname; cat /etc/ntp.conf | grep -i upstream -a2 | tail -n2'
Output example:
b3fd7da3-83e6-44cd-aa33-bc98c05af753:
NW11-ESAPRIMARY
server nw-node-zero iburst maxpoll 10
6c1ffd76-a79c-4b7e-866a-43d1474f083c:
NW11-EP-BROKER
server nw-node-zero iburst maxpoll 10
7923c28f-225a-46ba-972c-ce3925b0b061:
NEW-N11-ENDPOINT
server nw-node-zero iburst maxpoll 10
fa65b8d0-66b0-4373-93c1-661c822f1b69:
NW11-DEDICATED-BROKER
server nw-node-zero iburst maxpoll 10
06a69dd3-6faa-44a8-9d4c-104532436909:
NW12-ARCHIVER
server nw-node-zero iburst maxpoll 10
- To verify that all host are synced with SA admin Server:
Run this command from SA Admin Server CLI:
salt '*' cmd.run 'ntpstat'
- You can run this command on any host to sync it in time with SA admin Server:
- SSH to NetWitness host.
- Run the following commands:
#systemctl stop ntpd
#ntpdate nw-node-zero
#systemctl start ntpd