<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NTP server linux in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/ntp-server-linux/m-p/6180529#M54399</link>
    <description>&lt;P&gt;hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to configure linux centos as NTP server.&lt;/P&gt;&lt;P&gt;I have tried but womehow am not ble to get the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My server details below ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# uname -a&lt;BR /&gt;Linux centsvr 2.6.18-194.el5xen #1 SMP Fri Apr 2 15:34:40 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find my ntp.conf below on server ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# cat ntp.conf&lt;BR /&gt;# Permit time synchronization with our time source, but do not&lt;BR /&gt;# permit the source to query or modify the service on this system.&lt;BR /&gt;restrict default kod nomodify notrap nopeer noquery&lt;BR /&gt;restrict -6 default kod nomodify notrap nopeer noquery&lt;/P&gt;&lt;P&gt;# Permit all access over the loopback interface. This could&lt;BR /&gt;# be tightened as well, but to do so would effect some of&lt;BR /&gt;# the administrative functions.&lt;BR /&gt;restrict 127.0.0.1&lt;BR /&gt;restrict -6 ::1&lt;BR /&gt;restrict default ignore&lt;/P&gt;&lt;P&gt;# Hosts on local network are less restricted.&lt;BR /&gt;#restrict 192.168.1.0 mask 255.255.255.0 nomodify notrap&lt;/P&gt;&lt;P&gt;# Use public servers from the pool.ntp.org project.&lt;BR /&gt;# Please consider joining the pool (&lt;A href="http://www.pool.ntp.org/join.html)." target="_blank"&gt;http://www.pool.ntp.org/join.html).&lt;/A&gt;&lt;BR /&gt;#server 0.centos.pool.ntp.org&lt;BR /&gt;#server 1.centos.pool.ntp.org&lt;BR /&gt;#server 2.centos.pool.ntp.org&lt;/P&gt;&lt;P&gt;#server 0.in.pool.ntp.org&lt;BR /&gt;#server 1.asia.pool.ntp.org&lt;BR /&gt;#server 0.asia.pool.ntp.org&lt;BR /&gt;server 0.asia.pool.ntp.org&lt;BR /&gt;restrict 0.asia.pool.ntp.org notrap noquery&lt;BR /&gt;server 1.asia.pool.ntp.org&lt;BR /&gt;restrict 1.asia.pool.ntp.org notrap noquery&lt;BR /&gt;logfile /var/log/ntpd.log&lt;BR /&gt;restrict 10.1.1.0 mask 255.255.255.0 nomodify notrap&lt;BR /&gt;#broadcast 192.168.1.255 key 42 # broadcast server&lt;BR /&gt;#broadcastclient # broadcast client&lt;BR /&gt;#broadcast 224.0.1.1 key 42 # multicast server&lt;BR /&gt;#multicastclient 224.0.1.1 # multicast client&lt;BR /&gt;#manycastserver 239.255.254.254 # manycast server&lt;BR /&gt;#manycastclient 239.255.254.254 key 42 # manycast client&lt;/P&gt;&lt;P&gt;# Undisciplined Local Clock. This is a fake driver intended for backup&lt;BR /&gt;# and when no outside source of synchronized time is available.&lt;BR /&gt;server 127.127.1.0 # local clock&lt;BR /&gt;fudge 127.127.1.0 stratum 10&lt;/P&gt;&lt;P&gt;# Drift file. Put this in a directory which the daemon can write to.&lt;BR /&gt;# No symbolic links allowed, either, since the daemon updates the file&lt;BR /&gt;# by creating a temporary in the same directory and then rename()'ing&lt;BR /&gt;# it to the file.&lt;BR /&gt;driftfile /var/lib/ntp/drift&lt;/P&gt;&lt;P&gt;# Key file containing the keys and key identifiers used when operating&lt;BR /&gt;# with symmetric key cryptography.&lt;BR /&gt;keys /etc/ntp/keys&lt;/P&gt;&lt;P&gt;# Specify the key identifiers which are trusted.&lt;BR /&gt;#trustedkey 4 8 42&lt;/P&gt;&lt;P&gt;# Specify the key identifier to use with the ntpdc utility.&lt;BR /&gt;#requestkey 8&lt;/P&gt;&lt;P&gt;# Specify the key identifier to use with the ntpq utility.&lt;BR /&gt;#controlkey 8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When am trying ;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# ntpq -pn&lt;BR /&gt;remote refid st t when poll reach delay offset jitter&lt;BR /&gt;==============================================================================&lt;BR /&gt;61.110.197.50 .INIT. 16 u - 64 0 0.000 0.000 0.000&lt;BR /&gt;62.201.215.14 .INIT. 16 u - 64 0 0.000 0.000 0.000&lt;BR /&gt;*127.127.1.0 .LOCL. 10 l 47 64 377 0.000 0.000 0.002&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this means that i have configured ntp server correctly ??&lt;/P&gt;&lt;P&gt;also ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr sysconfig]# cat iptables&lt;BR /&gt;# Firewall configuration written by system-config-securitylevel&lt;BR /&gt;# Manual customization of this file is not recommended.&lt;BR /&gt;*filter&lt;BR /&gt;:INPUT ACCEPT [0:0]&lt;BR /&gt;:FORWARD ACCEPT [0:0]&lt;BR /&gt;:OUTPUT ACCEPT [0:0]&lt;BR /&gt;:RH-Firewall-1-INPUT - [0:0]&lt;BR /&gt;-A INPUT -j RH-Firewall-1-INPUT&lt;BR /&gt;-A FORWARD -j RH-Firewall-1-INPUT&lt;BR /&gt;-A RH-Firewall-1-INPUT -i lo -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p 50 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p 51 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2049 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 137 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 138 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 139 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 445 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 23 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 177 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6000:6010 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j ACCEPT&lt;BR /&gt;COMMIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is iptable entry correct do i have to put o/p entry too ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# ntpdate 0.asia.pool.ntp.org&lt;BR /&gt;23 Aug 15:49:03 ntpdate[13294]: the NTP socket is in use, exiting&lt;BR /&gt;[root@centsvr etc]# /etc/init.d/ntpd stop&lt;BR /&gt;Shutting down ntpd: [ OK ]&lt;BR /&gt;[root@centsvr etc]# ntpdate 0.asia.pool.ntp.org&lt;BR /&gt;23 Aug 15:49:36 ntpdate[13302]: no server suitable for synchronization found&lt;BR /&gt;[root@centsvr etc]# ping 0.asia.pool.ntp.org&lt;BR /&gt;PING 0.asia.pool.ntp.org (78.111.50.1) 56(84) bytes of data.&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=1 ttl=238 time=216 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=2 ttl=238 time=216 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=3 ttl=238 time=221 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=4 ttl=238 time=216 ms&lt;/P&gt;</description>
    <pubDate>Fri, 23 Aug 2013 10:19:46 GMT</pubDate>
    <dc:creator>chindi</dc:creator>
    <dc:date>2013-08-23T10:19:46Z</dc:date>
    <item>
      <title>NTP server linux</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ntp-server-linux/m-p/6180529#M54399</link>
      <description>&lt;P&gt;hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to configure linux centos as NTP server.&lt;/P&gt;&lt;P&gt;I have tried but womehow am not ble to get the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My server details below ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# uname -a&lt;BR /&gt;Linux centsvr 2.6.18-194.el5xen #1 SMP Fri Apr 2 15:34:40 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find my ntp.conf below on server ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# cat ntp.conf&lt;BR /&gt;# Permit time synchronization with our time source, but do not&lt;BR /&gt;# permit the source to query or modify the service on this system.&lt;BR /&gt;restrict default kod nomodify notrap nopeer noquery&lt;BR /&gt;restrict -6 default kod nomodify notrap nopeer noquery&lt;/P&gt;&lt;P&gt;# Permit all access over the loopback interface. This could&lt;BR /&gt;# be tightened as well, but to do so would effect some of&lt;BR /&gt;# the administrative functions.&lt;BR /&gt;restrict 127.0.0.1&lt;BR /&gt;restrict -6 ::1&lt;BR /&gt;restrict default ignore&lt;/P&gt;&lt;P&gt;# Hosts on local network are less restricted.&lt;BR /&gt;#restrict 192.168.1.0 mask 255.255.255.0 nomodify notrap&lt;/P&gt;&lt;P&gt;# Use public servers from the pool.ntp.org project.&lt;BR /&gt;# Please consider joining the pool (&lt;A href="http://www.pool.ntp.org/join.html)." target="_blank"&gt;http://www.pool.ntp.org/join.html).&lt;/A&gt;&lt;BR /&gt;#server 0.centos.pool.ntp.org&lt;BR /&gt;#server 1.centos.pool.ntp.org&lt;BR /&gt;#server 2.centos.pool.ntp.org&lt;/P&gt;&lt;P&gt;#server 0.in.pool.ntp.org&lt;BR /&gt;#server 1.asia.pool.ntp.org&lt;BR /&gt;#server 0.asia.pool.ntp.org&lt;BR /&gt;server 0.asia.pool.ntp.org&lt;BR /&gt;restrict 0.asia.pool.ntp.org notrap noquery&lt;BR /&gt;server 1.asia.pool.ntp.org&lt;BR /&gt;restrict 1.asia.pool.ntp.org notrap noquery&lt;BR /&gt;logfile /var/log/ntpd.log&lt;BR /&gt;restrict 10.1.1.0 mask 255.255.255.0 nomodify notrap&lt;BR /&gt;#broadcast 192.168.1.255 key 42 # broadcast server&lt;BR /&gt;#broadcastclient # broadcast client&lt;BR /&gt;#broadcast 224.0.1.1 key 42 # multicast server&lt;BR /&gt;#multicastclient 224.0.1.1 # multicast client&lt;BR /&gt;#manycastserver 239.255.254.254 # manycast server&lt;BR /&gt;#manycastclient 239.255.254.254 key 42 # manycast client&lt;/P&gt;&lt;P&gt;# Undisciplined Local Clock. This is a fake driver intended for backup&lt;BR /&gt;# and when no outside source of synchronized time is available.&lt;BR /&gt;server 127.127.1.0 # local clock&lt;BR /&gt;fudge 127.127.1.0 stratum 10&lt;/P&gt;&lt;P&gt;# Drift file. Put this in a directory which the daemon can write to.&lt;BR /&gt;# No symbolic links allowed, either, since the daemon updates the file&lt;BR /&gt;# by creating a temporary in the same directory and then rename()'ing&lt;BR /&gt;# it to the file.&lt;BR /&gt;driftfile /var/lib/ntp/drift&lt;/P&gt;&lt;P&gt;# Key file containing the keys and key identifiers used when operating&lt;BR /&gt;# with symmetric key cryptography.&lt;BR /&gt;keys /etc/ntp/keys&lt;/P&gt;&lt;P&gt;# Specify the key identifiers which are trusted.&lt;BR /&gt;#trustedkey 4 8 42&lt;/P&gt;&lt;P&gt;# Specify the key identifier to use with the ntpdc utility.&lt;BR /&gt;#requestkey 8&lt;/P&gt;&lt;P&gt;# Specify the key identifier to use with the ntpq utility.&lt;BR /&gt;#controlkey 8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When am trying ;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# ntpq -pn&lt;BR /&gt;remote refid st t when poll reach delay offset jitter&lt;BR /&gt;==============================================================================&lt;BR /&gt;61.110.197.50 .INIT. 16 u - 64 0 0.000 0.000 0.000&lt;BR /&gt;62.201.215.14 .INIT. 16 u - 64 0 0.000 0.000 0.000&lt;BR /&gt;*127.127.1.0 .LOCL. 10 l 47 64 377 0.000 0.000 0.002&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this means that i have configured ntp server correctly ??&lt;/P&gt;&lt;P&gt;also ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr sysconfig]# cat iptables&lt;BR /&gt;# Firewall configuration written by system-config-securitylevel&lt;BR /&gt;# Manual customization of this file is not recommended.&lt;BR /&gt;*filter&lt;BR /&gt;:INPUT ACCEPT [0:0]&lt;BR /&gt;:FORWARD ACCEPT [0:0]&lt;BR /&gt;:OUTPUT ACCEPT [0:0]&lt;BR /&gt;:RH-Firewall-1-INPUT - [0:0]&lt;BR /&gt;-A INPUT -j RH-Firewall-1-INPUT&lt;BR /&gt;-A FORWARD -j RH-Firewall-1-INPUT&lt;BR /&gt;-A RH-Firewall-1-INPUT -i lo -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p 50 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p 51 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 2049 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 137 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 138 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 139 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 445 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 23 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 177 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6000:6010 -j ACCEPT&lt;BR /&gt;-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited&lt;BR /&gt;-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j ACCEPT&lt;BR /&gt;COMMIT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is iptable entry correct do i have to put o/p entry too ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@centsvr etc]# ntpdate 0.asia.pool.ntp.org&lt;BR /&gt;23 Aug 15:49:03 ntpdate[13294]: the NTP socket is in use, exiting&lt;BR /&gt;[root@centsvr etc]# /etc/init.d/ntpd stop&lt;BR /&gt;Shutting down ntpd: [ OK ]&lt;BR /&gt;[root@centsvr etc]# ntpdate 0.asia.pool.ntp.org&lt;BR /&gt;23 Aug 15:49:36 ntpdate[13302]: no server suitable for synchronization found&lt;BR /&gt;[root@centsvr etc]# ping 0.asia.pool.ntp.org&lt;BR /&gt;PING 0.asia.pool.ntp.org (78.111.50.1) 56(84) bytes of data.&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=1 ttl=238 time=216 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=2 ttl=238 time=216 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=3 ttl=238 time=221 ms&lt;BR /&gt;64 bytes from host-1.net50.sol.az (78.111.50.1): icmp_seq=4 ttl=238 time=216 ms&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2013 10:19:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ntp-server-linux/m-p/6180529#M54399</guid>
      <dc:creator>chindi</dc:creator>
      <dc:date>2013-08-23T10:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: NTP server linux</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ntp-server-linux/m-p/6181383#M54401</link>
      <description>&lt;P&gt;Your ntpq -pn output indicates that ntpd is trying to query the *.asia.pool.ntp.org servers, but failing to get any response at all. Only the local clock has been used successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that your iptables ruleset is stopping the incoming NTP protocol messages. The ordering of iptables rules is very important: in your ruleset, the rule for allowing NTP traffic (UDP port 123) has the right syntax, but it is after a rule that rejects all traffic that has not been accepted by a previous rule. So your NTP rule will never be effective in that location.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To fix it, move the "accept NTP" rule before the "reject everything (that has not already been accepted)" rule:&lt;/P&gt;&lt;PRE&gt;[...]
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 6000:6010 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 123 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2013 19:34:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ntp-server-linux/m-p/6181383#M54401</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2013-08-24T19:34:47Z</dc:date>
    </item>
  </channel>
</rss>

