Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NTP Issue

    Scheduled Pinned Locked Moved General pfSense Questions
    98 Posts 11 Posters 11.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      conover @ARAMP1
      last edited by

      @ARAMP1 said in NTP Issue:

      @JonathanLee said in NTP Issue:

      They have a Redmine open for NTP authentication issues I think the patch that Marcos and Matthew merged might also fix this.

      I just played around a bit with this and couldn't get it to work.

      it is not fixed, also not able to get it to work in 24.03

      1 Reply Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee
        last edited by JonathanLee

        Seems the newer versions of software function by way of a different pair of spectacles. I have a number of issues versus older reliable versions. I can tell you I personally like the old software better, it functions and feels far more resilient. I wonder why, I really do. I shouldn’t feel less trust with the new software. Again I hate to admit it’s starting to feel like that. Leading to, I shouldn’t feel afraid to upgrade. I use to get excited about even upgrade, now I question what is going to be broken if I upgrade. I am fearful of updates. Weird right? Is it big tech influence? Who knows, maybe I am just paranoid and don’t want to risk it now that I have it working way I want. Sorry it isn’t working

        Make sure to upvote

        C 1 Reply Last reply Reply Quote 2
        • C
          conover @JonathanLee
          last edited by

          @JonathanLee said in NTP Issue:

          Seems the newer versions of software function by way of a different pair of spectacles. I have a number of issues versus older reliable versions. I can tell you I personally like the old software better, it functions and feels far more resilient. I wonder why, I really do. I shouldn’t feel less trust with the new software. Again I hate to admit it’s starting to feel like that. Leading to, I shouldn’t feel afraid to upgrade. I use to get excited about even upgrade, now I question what is going to be broken if I upgrade. I am fearful of updates. Weird right? Is it big tech influence? Who knows, maybe I am just paranoid and don’t want to risk it now that I have it working way I want. Sorry it isn’t working

          Fully agreed!
          That's the reason why I did not upgraded all my boxes yet.
          Firewall software with a bad gut feeling is a "no go" (for me).
          So I am started to thinking about changing the system with the next (hardware) cycle....

          Dobby_D 1 Reply Last reply Reply Quote 1
          • Dobby_D
            Dobby_ @conover
            last edited by

            @conover said in NTP Issue:

            So I am started to thinking about changing the system with the next (hardware) cycle....

            What you are thinking to go with?
            OPNSense, OpenWRT, RouterOS, VyOS, ClearOS, Untangle,......

            #~. @Dobby

            Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
            PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
            PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

            C 1 Reply Last reply Reply Quote 0
            • C
              conover @Dobby_
              last edited by

              @Dobby_ said in NTP Issue:

              @conover said in NTP Issue:

              So I am started to thinking about changing the system with the next (hardware) cycle....

              What you are thinking to go with?
              OPNSense, OpenWRT, RouterOS, VyOS, ClearOS, Untangle,......

              To be honest, not sure yet. Just started thinking about it....

              Dobby_D 1 Reply Last reply Reply Quote 0
              • Dobby_D
                Dobby_ @conover
                last edited by

                @conover said in NTP Issue:

                To be honest, not sure yet. Just started thinking about it....

                I ordered some parts for setting up a tiny LAN server to free pfSense from
                some tasks or services. Its nearly 200ish € but its worth in my eyes.

                RaspBerry PI 4 B (8GB)
                GPS hat (u.blox M8)
                Micro SD card 64 GB
                mSATA board x857
                active magnetic GSP antenna (5 meter cable)
                USB C - PSU

                Later it should run the following services;

                • PI hole or CrowdSec
                • syslog-ng server
                • NTP (Internet, RTC, GPS)
                • RadiusServer (FreeRadius)
                • LDAP server (OpenLDAP)

                Eventually later a DCF77 kit over USB but this is actually only brainstorming.
                So for the entire network it will be then a Stratum1 NTP server with RTC,
                GPS and over the internet with 4 pools and 4 servers.

                #~. @Dobby

                Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
                PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
                PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @ARAMP1
                  last edited by johnpoz

                  @ARAMP1 said in NTP Issue:

                  I just played around a bit with this and couldn't get it to work.

                  And what did you play with? Can we see your config? Can we see your ntp log? Can we see a simple sniff, you say it works via just using ntp out on the internet. Can we see sniff of that working?

                  I have been running a pi as my ntp server via a gps hat and yeah it would use pps as the source. For years, multiple versions of pfsense back to pre + days, And currently have a 2.7.2 pfsense as well as 23.09.1 and not having any issues syncing with my pi ntp server.

                  Are you trying to use auth? To your ntp - you say none of your other devices have any issues syncing with your ntp server? Can we see this output?

                  example

                  $ ntpq
                  ntpq> pe
                       remote           refid      st t when poll reach   delay   offset  jitter
                  ==============================================================================
                  *ntp.home.arpa   .PPS.            1 u   57  128  377    1.542   +0.376   0.193
                  ntpq>
                  

                  My windows box sync with my pi, here is pfsense

                  [23.09.1-RELEASE][admin@sg4860.home.arpa]/root: ntpq
                  ntpq> pe
                       remote           refid      st t when poll reach   delay   offset  jitter
                  ==============================================================================
                  *ntp.home.arpa   .PPS.            1 u  137  512  377    0.449   -0.741   0.189
                  ntpq> 
                  

                  What are you using as your ntp server, ntpsec, chrony, just the plain jane ntp from ntp.org?

                  If there was some inherent bug/issue with ntp sync then you would think there would be many posts about it.. Since there does not seem to be - this points to something unique in your setup that is problematic, etc..

                  here is my settings, where 192.168.3.32 is my pi ntp box.. Which is running ntpsec

                  ntp.jpg

                  Here is my pi output

                  pi@pi-ntp:~ $ ntpq
                  ntpq> pe
                       remote                                   refid      st t when poll reach   delay   offset   jitter
                  =======================================================================================================
                  *SHM(1)                                  .PPS.            0 l    2   16  377   0.0000  -0.6487   0.0136
                  -SHM(0)                                  .GPS.            0 l   42   64  377   0.0000 -150.638   1.3091
                  +ntp-0.gw.illinois.edu                   200.7.224.32     2 u    6   64  377  12.1672   2.2484   1.0747
                  +ntp.your.org                            .GPS.            1 u   41   64  377  10.5027   2.4140   0.7471
                  -tock.usshc.com                          .WAAS.           1 u   37   64  377  16.0153   1.7570   0.6719
                  -ntp1.netwrx1.com                        24.196.111.36    2 u   33   64  377  37.7684  -2.0801   1.9852
                  ntpq> version
                  ntpsec-1.2.1+85-g1a7bb2e3a
                  ntpq>
                  

                  edit: my 2.7.2 box was off, just booted it - and can see right away that it can talk to my ntp server.. as reach is counting up

                  272.jpg

                  edit2: just booted my 24.03 and pointed it to my ntp server and bam its talking to it as you can see reach is counting up as well

                  2403.jpg

                  here is a pcap of pfsense 3.253 talking to the ntp server 3.32

                  pcap.jpg

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  ARAMP1A 1 Reply Last reply Reply Quote 1
                  • C
                    conover
                    last edited by

                    @johnpoz said in NTP Issue:

                    If there was some inherent bug/issue with ntp sync then you would think there would be many posts about it.. Since there does not seem to be - this points to something unique in your setup that is problematic, etc..

                    well, there are 3 or 4 post addressing that issue and a few people hopped on each thread.

                    The problem is, that NTP works but not with all NTP servers. The latter one is the issue. So it is not an issue with NTP itself.
                    We went thru all config options and other options (e.g. delete config and start over again etc) in the named threads.

                    The main point is, NTP worked with the mentioned specifc server type (which are also working with all other clients) in 23.05 / 23.05.01 and stopped working in 23.09 (NTP works again going back to 23.05). And still not works with 24.03.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @conover
                      last edited by

                      @conover said in NTP Issue:

                      well, there are 3 or 4 post addressing that issue and a few people hopped on each thread.

                      Lets see out of how many 1000's and 10s of 1000's of pfsense deployments? I am on here way too much, and I am not seeing these posts..

                      There may well be a bug/issue - but without some actual specifics of the users setup to find something common, users chiming in with me too.. Are of zero help.. For all we know they have some simple misconfiguration.. Like wrong IP address of their ntp server for gosh sake..

                      the only way to track down what your problem is with info.. Not I play with some stuff and couldn't get it to work ;)

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      C 1 Reply Last reply Reply Quote 0
                      • C
                        conover @johnpoz
                        last edited by

                        @johnpoz guess, all infos can be found here: https://forum.netgate.com/topic/184170/23-09-local-ntp-server-unrechable-worked-with-23-05-1

                        another thread (besides this one) is here (in German) https://forum.netgate.com/post/1137308

                        1 Reply Last reply Reply Quote 0
                        • ARAMP1A
                          ARAMP1 @johnpoz
                          last edited by stephenw10

                          @johnpoz said in NTP Issue:

                          @ARAMP1 said in NTP Issue:

                          I just played around a bit with this and couldn't get it to work.

                          And what did you play with? Can we see your config? Can we see your ntp log? Can we see a simple sniff, you say it works via just using ntp out on the internet. Can we see sniff of that working?

                          I have been running a pi as my ntp server via a gps hat and yeah it would use pps as the source. For years, multiple versions of pfsense back to pre + days, And currently have a 2.7.2 pfsense as well as 23.09.1 and not having any issues syncing with my pi ntp server.

                          Are you trying to use auth? To your ntp - you say none of your other devices have any issues syncing with your ntp server? Can we see this output?

                          example

                          $ ntpq
                          ntpq> pe
                               remote           refid      st t when poll reach   delay   offset  jitter
                          ==============================================================================
                          *ntp.home.arpa   .PPS.            1 u   57  128  377    1.542   +0.376   0.193
                          ntpq>
                          

                          My windows box sync with my pi, here is pfsense

                          [23.09.1-RELEASE][admin@sg4860.home.arpa]/root: ntpq
                          ntpq> pe
                               remote           refid      st t when poll reach   delay   offset  jitter
                          ==============================================================================
                          *ntp.home.arpa   .PPS.            1 u  137  512  377    0.449   -0.741   0.189
                          ntpq> 
                          

                          What are you using as your ntp server, ntpsec, chrony, just the plain jane ntp from ntp.org?

                          If there was some inherent bug/issue with ntp sync then you would think there would be many posts about it.. Since there does not seem to be - this points to something unique in your setup that is problematic, etc..

                          here is my settings, where 192.168.3.32 is my pi ntp box.. Which is running ntpsec

                          ntp.jpg

                          Here is my pi output

                          pi@pi-ntp:~ $ ntpq
                          ntpq> pe
                               remote                                   refid      st t when poll reach   delay   offset   jitter
                          =======================================================================================================
                          *SHM(1)                                  .PPS.            0 l    2   16  377   0.0000  -0.6487   0.0136
                          -SHM(0)                                  .GPS.            0 l   42   64  377   0.0000 -150.638   1.3091
                          +ntp-0.gw.illinois.edu                   200.7.224.32     2 u    6   64  377  12.1672   2.2484   1.0747
                          +ntp.your.org                            .GPS.            1 u   41   64  377  10.5027   2.4140   0.7471
                          -tock.usshc.com                          .WAAS.           1 u   37   64  377  16.0153   1.7570   0.6719
                          -ntp1.netwrx1.com                        24.196.111.36    2 u   33   64  377  37.7684  -2.0801   1.9852
                          ntpq> version
                          ntpsec-1.2.1+85-g1a7bb2e3a
                          ntpq>
                          

                          edit: my 2.7.2 box was off, just booted it - and can see right away that it can talk to my ntp server.. as reach is counting up

                          272.jpg

                          edit2: just booted my 24.03 and pointed it to my ntp server and bam its talking to it as you can see reach is counting up as well

                          2403.jpg

                          here is a pcap of pfsense 3.253 talking to the ntp server 3.32

                          pcap.jpg

                          Oh, I'd bet it's 100% user error, just want to figure out where.

                          It appears I have it set up like yours.

                          NTP 3.jpg NTP 2.jpg NTP 1.jpg

                          I'm using one of those chinese ebay boxes. I've had it running fine in pfSense for about 3 years now.

                          Here are the logs related to the server at 192.168.10.120

                          Jun 2 12:45:34 ntpd 8952 192.168.10.120 local addr 192.168.10.1 -> <null>
                          Jun 2 12:06:10 ntpd 15912 192.168.10.120 local addr 192.168.10.1 -> <null>
                          Jun 2 12:04:11 ntpd 15912 192.168.10.120 8011 81 mobilize assoc 17918
                          Jun 2 12:45:34 ntpd 75278 192.168.10.120 8011 81 mobilize assoc 23975
                          Jun 2 12:06:21 ntpd 8952 192.168.10.120 8011 81 mobilize assoc 59753
                          Jun 2 12:06:10 ntpd 15912 192.168.10.120 8012 82 demobilize assoc 17918
                          Jun 2 12:45:34 ntpd 8952 192.168.10.120 8012 82 demobilize assoc 59753

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @ARAMP1
                            last edited by johnpoz

                            @ARAMP1 one thing I see as different is why are you pointing to multiple pools that are really the same? You run your own ntp server, while sure it should point to some others vs just its gps time.. pfsense really has litte need other than just pointing to your one ntp server that you are running.

                            Why can it not talk to any of those other ntp servers either.. All of those other ones should be available via wan, that it is seems it talking to the 128.138.141.172 box.

                            You cut off your config - are you trying to do auth?

                            If you want to add more later - sure but for troubleshooting I would just point to your 1 local server.. And then sniff do you see an answer?

                            Can we see your other devices that are syncing off this local server? For example I already showed my windows box syncing - here is one of my switches using it

                            sg300-28#sho sntp status
                            
                            Clock is synchronized, stratum 1, reference is 192.168.3.32, unicast
                            
                            Unicast servers:
                            
                            Server            : 192.168.3.32
                              Source          : Static
                              Stratum         : 1
                              Status          : up
                              Last Response   : 17:03:25.0 web Jun 2 2024
                              Offset          : 347.3516068 mSec
                              Delay           : -1000 mSec
                            

                            here is my nas, and printer all pointing to my local ntp - showing working

                            printer.jpg

                            nas.jpg

                            For troubleshooting - I would set the only interface on to be the one interface where your ntp server is. And I would sniff the traffic to validate you see it sending to it, and getting a response on its own accord, not with the ntpdate command, etc.

                            Here is my unifi controller setting, and showing that one of the AP is sync'd etc

                            unifi.jpg

                            edit: oh my nas is using old name, which still resolves - but should change that to home.arpa vs local.lan

                            What are you running for your ntp server? ntp, ntpsec, chrony?

                            edit2: that you are only able to talk to 1 of the many many ntp servers your pointing to is very odd to me.. If there was something wrong with pfsense, why is talking to anything. If there was some disconnect between pfsense and your ntp server, why is it not talking to all the other servers your pointing to?

                            Clearly something is amiss - figuring out what it is the puzzle needed to be solved.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            ARAMP1A 1 Reply Last reply Reply Quote 0
                            • ARAMP1A
                              ARAMP1 @johnpoz
                              last edited by ARAMP1

                              @johnpoz said in NTP Issue:

                              @ARAMP1 one thing I see as different is why are you pointing to multiple pools that are really the same? You run your own ntp server, while sure it should point to some others vs just its gps time.. pfsense really has litte need other than just pointing to your one ntp server that you are running.

                              Why can it not talk to any of those other ntp servers either.. All of those other ones should be available via wan, that it is seems it talking to the 128.138.141.172 box.

                              You cut off your config - are you trying to do auth?

                              If you want to add more later - sure but for troubleshooting I would just point to your 1 local server.. And then sniff do you see an answer?

                              Can we see your other devices that are syncing off this local server? For example I already showed my windows box syncing - here is one of my switches using it

                              sg300-28#sho sntp status
                              
                              Clock is synchronized, stratum 1, reference is 192.168.3.32, unicast
                              
                              Unicast servers:
                              
                              Server            : 192.168.3.32
                                Source          : Static
                                Stratum         : 1
                                Status          : up
                                Last Response   : 17:03:25.0 web Jun 2 2024
                                Offset          : 347.3516068 mSec
                                Delay           : -1000 mSec
                              

                              here is my nas, and printer all pointing to my local ntp - showing working

                              printer.jpg

                              nas.jpg

                              For troubleshooting - I would set the only interface on to be the one interface where your ntp server is. And I would sniff the traffic to validate you see it sending to it, and getting a response on its own accord, not with the ntpdate command, etc.

                              Here is my unifi controller setting, and showing that one of the AP is sync'd etc

                              unifi.jpg

                              edit: oh my nas is using old name, which still resolves - but should change that to home.arpa vs local.lan

                              What are you running for your ntp server? ntp, ntpsec, chrony?

                              edit2: that you are only able to talk to 1 of the many many ntp servers your pointing to is very odd to me.. If there was something wrong with pfsense, why is talking to anything. If there was some disconnect between pfsense and your ntp server, why is it not talking to all the other servers your pointing to?

                              Clearly something is amiss - figuring out what it is the puzzle needed to be solved.

                              Appreciate the reply.

                              I'm not doing NTPv3 authentication.

                              I actually originally had it only pointing to my local server, but when it started acting up, I started adding. I assumed that since I checked "prefer" it would default to that one if it started working.

                              Here's what I get when I delete all the others.

                              NTP 5.jpg

                              I can point anything on the network to my NTP and it seems to work. Here's the windows 10 machine I'm on now.

                              Sync with NTP.jpg

                              Show NTP.jpg

                              Here's a TrueNAS server that I just pointed it to.

                              NTP Truenas.jpg

                              Really, I only need it for my Blue Iris machine because I want all of my security cameras synced. Other than that, it's just nice to have it working.

                              Forgive me, but I'm not sure how do do the ole sniff.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @ARAMP1
                                last edited by johnpoz

                                @ARAMP1 the sniff would be just packet capture under the diagnostic menu.. You can have it only capture the ntp from your IP of your ntp server and port 123.

                                Select the interface used to talk to your ntp server, assuming that is your lan interface.

                                You can then download that capture and we can look at it with say wireshark.

                                The info from your nas is good.. what IP is your nas on, I assume its on this same 192.168.10 network.

                                edit: don't camera's sync their time via ipc?

                                nvr.jpg

                                I don't have ntp setup on my cameras - they sync with the nvr via ipc.. But blue iris could be different for sure. The nvr syncs directly with my ntp server.. Why wouldn't you sync your blue iris and your cameras directly with your ntp server? vs pfsense?

                                That being said - pfsense for sure should be able to sync with your ntp server.. But if you can just sync your camera stuff with your ntp server, then the pfsense time sync isn't as critical, etc. And can figure out what is going on it with it without having to worry about your camera time being off, etc.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                ARAMP1A 1 Reply Last reply Reply Quote 0
                                • ARAMP1A
                                  ARAMP1 @johnpoz
                                  last edited by

                                  @johnpoz said in NTP Issue:

                                  @ARAMP1 the sniff would be just packet capture under the diagnostic menu.. You can have it only capture the ntp from your IP of your ntp server and port 123.

                                  Select the interface used to talk to your ntp server, assuming that is your lan interface.

                                  You can then download that capture and we can look at it with say wireshark.

                                  The info from your nas is good.. what IP is your nas on, I assume its on this same 192.168.10 network.

                                  My windows machine is on the 10.10.50 network and that truenas machine is on the 192.168.60 network but I have rules on each of those VLANs to access 192.168.10.120 for NTP (the 192.168.10 network is my management network with all my switches, access points, etc).

                                  For cameras, here's the rules I have in place.

                                  Cameras Port 123.jpg

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @ARAMP1
                                    last edited by johnpoz

                                    @ARAMP1 well that is interesting.. So the devices on different networks sync fine - but the pfsense on the same network is not able to reach it??

                                    Your not doing anything with ethernet filtering, nor any floating rules for outbound filtering?

                                    As a test - your truenas can act as ntp server I would assume.. Can you point pfsense to it?

                                    Example - just pointed pfsense to my nas.

                                    nasntp.jpg

                                    notice it shows the 9.10 address of my nas, and it shows its ref as my pi ntp server the 3.32 IP

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    ARAMP1A 1 Reply Last reply Reply Quote 0
                                    • ARAMP1A
                                      ARAMP1
                                      last edited by

                                      Here's a short run of the packet capture...

                                      00:56:11.413566 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:56:11.413612 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:56:11.414620 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:56:11.414652 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:57:17.413522 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:57:17.413531 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:57:17.414624 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:57:17.414659 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:58:23.373022 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:58:23.373061 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:58:23.373684 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:58:23.373718 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:58:42.477178 IP 10.10.50.230.44863 > 192.168.10.120.123: UDP, length 48
                                      00:58:42.477281 IP 10.10.50.230.44863 > 192.168.10.120.123: UDP, length 48
                                      00:58:42.477576 IP 192.168.10.120.123 > 10.10.50.230.44863: UDP, length 48
                                      00:58:42.477597 IP 192.168.10.120.123 > 10.10.50.230.44863: UDP, length 48
                                      00:58:43.586214 IP 10.10.50.230.50913 > 192.168.10.120.123: UDP, length 48
                                      00:58:43.586317 IP 10.10.50.230.50913 > 192.168.10.120.123: UDP, length 48
                                      00:58:43.586555 IP 192.168.10.120.123 > 10.10.50.230.50913: UDP, length 48
                                      00:58:43.586560 IP 192.168.10.120.123 > 10.10.50.230.50913: UDP, length 48
                                      00:58:45.604892 IP 10.10.50.230.41040 > 192.168.10.120.123: UDP, length 48
                                      00:58:45.605003 IP 10.10.50.230.41040 > 192.168.10.120.123: UDP, length 48
                                      00:58:45.605557 IP 192.168.10.120.123 > 10.10.50.230.41040: UDP, length 48
                                      00:58:45.605580 IP 192.168.10.120.123 > 10.10.50.230.41040: UDP, length 48
                                      00:58:47.636203 IP 10.10.50.230.54265 > 192.168.10.120.123: UDP, length 48
                                      00:58:47.636249 IP 10.10.50.230.54265 > 192.168.10.120.123: UDP, length 48
                                      00:58:47.636552 IP 192.168.10.120.123 > 10.10.50.230.54265: UDP, length 48
                                      00:58:47.636578 IP 192.168.10.120.123 > 10.10.50.230.54265: UDP, length 48
                                      00:58:49.778857 IP 10.10.50.230.56448 > 192.168.10.120.123: UDP, length 48
                                      00:58:49.778967 IP 10.10.50.230.56448 > 192.168.10.120.123: UDP, length 48
                                      00:58:49.779532 IP 192.168.10.120.123 > 10.10.50.230.56448: UDP, length 48
                                      00:58:49.779552 IP 192.168.10.120.123 > 10.10.50.230.56448: UDP, length 48
                                      00:58:51.786147 IP 10.10.50.230.36563 > 192.168.10.120.123: UDP, length 48
                                      00:58:51.786273 IP 10.10.50.230.36563 > 192.168.10.120.123: UDP, length 48
                                      00:58:51.786525 IP 192.168.10.120.123 > 10.10.50.230.36563: UDP, length 48
                                      00:58:51.786529 IP 192.168.10.120.123 > 10.10.50.230.36563: UDP, length 48
                                      00:58:53.816726 IP 10.10.50.230.58706 > 192.168.10.120.123: UDP, length 48
                                      00:58:53.816798 IP 10.10.50.230.58706 > 192.168.10.120.123: UDP, length 48
                                      00:58:53.817676 IP 192.168.10.120.123 > 10.10.50.230.58706: UDP, length 48
                                      00:58:53.817681 IP 192.168.10.120.123 > 10.10.50.230.58706: UDP, length 48
                                      00:58:54.780841 IP 10.10.50.230.56213 > 192.168.10.120.123: UDP, length 48
                                      00:58:54.780910 IP 10.10.50.230.56213 > 192.168.10.120.123: UDP, length 48
                                      00:58:54.781525 IP 192.168.10.120.123 > 10.10.50.230.56213: UDP, length 48
                                      00:58:54.781533 IP 192.168.10.120.123 > 10.10.50.230.56213: UDP, length 48
                                      00:58:56.791962 IP 10.10.50.230.46158 > 192.168.10.120.123: UDP, length 48
                                      00:58:56.792080 IP 10.10.50.230.46158 > 192.168.10.120.123: UDP, length 48
                                      00:58:56.792530 IP 192.168.10.120.123 > 10.10.50.230.46158: UDP, length 48
                                      00:58:56.792551 IP 192.168.10.120.123 > 10.10.50.230.46158: UDP, length 48
                                      00:58:58.467266 IP 10.10.50.230.54383 > 192.168.10.120.123: UDP, length 48
                                      00:58:58.467305 IP 10.10.50.230.54383 > 192.168.10.120.123: UDP, length 48
                                      00:58:58.467569 IP 192.168.10.120.123 > 10.10.50.230.54383: UDP, length 48
                                      00:58:58.467574 IP 192.168.10.120.123 > 10.10.50.230.54383: UDP, length 48
                                      00:59:00.508052 IP 10.10.50.230.44608 > 192.168.10.120.123: UDP, length 48
                                      00:59:00.508113 IP 10.10.50.230.44608 > 192.168.10.120.123: UDP, length 48
                                      00:59:00.508564 IP 192.168.10.120.123 > 10.10.50.230.44608: UDP, length 48
                                      00:59:00.508568 IP 192.168.10.120.123 > 10.10.50.230.44608: UDP, length 48
                                      00:59:02.576259 IP 10.10.50.230.54479 > 192.168.10.120.123: UDP, length 48
                                      00:59:02.576371 IP 10.10.50.230.54479 > 192.168.10.120.123: UDP, length 48
                                      00:59:02.576552 IP 192.168.10.120.123 > 10.10.50.230.54479: UDP, length 48
                                      00:59:02.576558 IP 192.168.10.120.123 > 10.10.50.230.54479: UDP, length 48
                                      00:59:04.587321 IP 10.10.50.230.34257 > 192.168.10.120.123: UDP, length 48
                                      00:59:04.587386 IP 10.10.50.230.34257 > 192.168.10.120.123: UDP, length 48
                                      00:59:04.587550 IP 192.168.10.120.123 > 10.10.50.230.34257: UDP, length 48
                                      00:59:04.587556 IP 192.168.10.120.123 > 10.10.50.230.34257: UDP, length 48
                                      00:59:06.612532 IP 10.10.50.230.37136 > 192.168.10.120.123: UDP, length 48
                                      00:59:06.612592 IP 10.10.50.230.37136 > 192.168.10.120.123: UDP, length 48
                                      00:59:06.613552 IP 192.168.10.120.123 > 10.10.50.230.37136: UDP, length 48
                                      00:59:06.613578 IP 192.168.10.120.123 > 10.10.50.230.37136: UDP, length 48
                                      00:59:08.641801 IP 10.10.50.230.33174 > 192.168.10.120.123: UDP, length 48
                                      00:59:08.641915 IP 10.10.50.230.33174 > 192.168.10.120.123: UDP, length 48
                                      00:59:08.642548 IP 192.168.10.120.123 > 10.10.50.230.33174: UDP, length 48
                                      00:59:08.642570 IP 192.168.10.120.123 > 10.10.50.230.33174: UDP, length 48
                                      00:59:29.381935 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:59:29.381971 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      00:59:29.382608 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      00:59:29.382641 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:00:13.721904 IP 10.10.50.230.48115 > 192.168.10.120.123: UDP, length 48
                                      01:00:13.722019 IP 10.10.50.230.48115 > 192.168.10.120.123: UDP, length 48
                                      01:00:13.722520 IP 192.168.10.120.123 > 10.10.50.230.48115: UDP, length 48
                                      01:00:13.722524 IP 192.168.10.120.123 > 10.10.50.230.48115: UDP, length 48
                                      01:00:38.413534 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:00:38.413568 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:00:38.414569 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:00:38.414598 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:00:52.473322 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                      01:00:52.473549 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48
                                      01:00:55.450351 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                      01:00:55.450552 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48
                                      01:01:00.525365 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                      01:01:00.525543 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48
                                      01:01:18.317945 IP 10.10.50.230.38268 > 192.168.10.120.123: UDP, length 48
                                      01:01:18.318057 IP 10.10.50.230.38268 > 192.168.10.120.123: UDP, length 48
                                      01:01:18.318613 IP 192.168.10.120.123 > 10.10.50.230.38268: UDP, length 48
                                      01:01:18.318635 IP 192.168.10.120.123 > 10.10.50.230.38268: UDP, length 48
                                      01:01:47.398970 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:01:47.399009 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:01:47.399617 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:01:47.399650 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:02:05.525345 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                      01:02:05.525544 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48
                                      01:02:22.690101 IP 10.10.50.230.44520 > 192.168.10.120.123: UDP, length 48
                                      01:02:22.690213 IP 10.10.50.230.44520 > 192.168.10.120.123: UDP, length 48
                                      01:02:22.690525 IP 192.168.10.120.123 > 10.10.50.230.44520: UDP, length 48
                                      01:02:22.690546 IP 192.168.10.120.123 > 10.10.50.230.44520: UDP, length 48
                                      01:02:54.378938 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:02:54.378974 IP 192.168.60.251.123 > 192.168.10.120.123: UDP, length 48
                                      01:02:54.379592 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:02:54.379623 IP 192.168.10.120.123 > 192.168.60.251.123: UDP, length 48
                                      01:03:09.525230 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                      01:03:09.525545 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48
                                      01:03:27.350112 IP 10.10.50.230.52709 > 192.168.10.120.123: UDP, length 48
                                      01:03:27.350221 IP 10.10.50.230.52709 > 192.168.10.120.123: UDP, length 48
                                      01:03:27.350617 IP 192.168.10.120.123 > 10.10.50.230.52709: UDP, length 48
                                      01:03:27.350637 IP 192.168.10.120.123 > 10.10.50.230.52709: UDP, length 48

                                      johnpozJ 1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @ARAMP1
                                        last edited by

                                        @ARAMP1 said in NTP Issue:

                                        01:02:05.525345 IP 192.168.10.1.123 > 192.168.10.120.123: UDP, length 48
                                        01:02:05.525544 IP 192.168.10.120.123 > 192.168.10.1.123: UDP, length 48

                                        I take it that is your pfsense IP at 10.1 - can you download that and attach the pcap.. For example - here is pcap I did earlier

                                        packetcapture-igb3-20240602095409.pcap

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 0
                                        • ARAMP1A
                                          ARAMP1 @johnpoz
                                          last edited by

                                          @johnpoz said in NTP Issue:

                                          @ARAMP1 well that is interesting.. So the devices on different networks sync fine - but the pfsense on the same network is not able to reach it??

                                          Your not doing anything with ethernet filtering, nor any floating rules for outbound filtering?

                                          As a test - your truenas can act as ntp server I would assume.. Can you point pfsense to it?

                                          Example - just pointed pfsense to my nas.

                                          nasntp.jpg

                                          notice it shows the 9.10 address of my nas, and it shows its ref as my pi ntp server the 3.32 IP

                                          Just tried pointing it to a couple truenas servers I have on different VLANs. Both are Unreach/Pending.

                                          The floating rules I have in place only have to do with CoDel traffic limiter and pfBlocker.

                                          ARAMP1A 1 Reply Last reply Reply Quote 0
                                          • ARAMP1A
                                            ARAMP1 @ARAMP1
                                            last edited by

                                            packetcapture-ix1-20240602201708.pcap

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.