PANW-NM-000099 - The Palo Alto Networks security platform must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.

Information

Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronizing internal information system clocks provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network.

The Palo Alto Networks security platform can be configured to use specified Network Time Protocol (NTP) servers. NTP is used to synchronize the system clock of a computer to reference time source. Sources outside of the configured acceptable allowance (drift) may be inaccurate. When properly configured, NTP will synchronize all participating computers to within a few milliseconds of the reference time source.

Solution

Go to Device >> Setup >> Services.
Select the 'Edit' icon (the gear symbol in the upper-right corner of the pane).
In the 'Services' window, in the 'Primary NTP Server Address' field and the 'Secondary NTP Server Address' field, enter the IP address or hostname of the NTP servers.

In the 'Authentication Type' field, select one of the following:
None (default); this option disables NTP authentication.
Symmetric Key; this option uses symmetric key exchange, which are shared secrets. Enter the key ID, algorithm, authentication key, and confirm the authentication key.
Autokey; this option uses auto key, or public key cryptography.
Commit changes by selecting 'Commit' in the upper-right corner of the screen.
Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y24M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, CCI|CCI-004923, CCI|CCI-004926, Rule-ID|SV-228664r997681_rule, STIG-ID|PANW-NM-000099, STIG-Legacy|SV-77245, STIG-Legacy|V-62755, Vuln-ID|V-228664

Plugin: Palo_Alto

Control ID: cec2ea5a2971dc81ecdd1145da32077ad3aed5153dc89c1e0af378233e7568dc