NTP synchronizations showing in Attack Report
03/26/2020 1042 10212
This article describes the issue with seeing NTP Synchronization attempts and successes in the Attack Reports of Analyzer and GMS.
The general cause of this issue is the SonicWall UTM appliances sending Syslogs with 0.0.0.0 as the IP in the src= field. The GMS/Analyzer then interpets this as an attack and puts it in the attack report.
<133>id=firewall sn=0017CXXXXXXX time="2016-05-23 20:59:35 UTC" fw=XXX.XXX.XXX.229 pri=5 c=128 m=1232 msg="NTP Request sent" n=51 src=0.0.0.0:123:X0 dst=126.96.36.199:123:X1:navobs1.gatech.edu note="Send request to NTP server 188.8.131.52"
Log into the SonicWall UTM appliance and disable Syslog ID messages 1231 and 1232 (Only available on 5.9 and 6.2 firmwares)
Log into the GMS go to Console | Reports | Syslog Filter and add m= 1231 and another for m=1232
Upgrade Gen5 SonicWall UTM appliances to 184.108.40.206 and beyond
Upgrade Gen6 to latest 6.2 version