PowerProtect 和 IDPA:偵測到安全性漏洞掃描 NTP 模式 6 掃描器
Summary: PowerProtect Data Protection (DP) 系列裝置和 IDPA:安全性漏洞掃描在 ACM/Search 上偵測到「網路時間通訊協定 (NTP) 模式 6 掃描器」
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Instructions
若要解決「NTP 模式 6 掃描器」的安全漏洞,請更新如下所示的 NTP 配置檔以禁用 NTP 模式 6:
預設值 /etc/ntp.conf 應該是:
server xx.xx.xx.xx iburst
若要停用 NTP 模式 6,請在/etc/ntp.conf:
server xx.xx.xx.xx iburst
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
然後重新啟動 NTP 服務:
# service ntpd stop
# service ntpd start
Additional Information
此漏洞的啟用頁面:
https://www.tenable.com/plugins/nessus/97861 (外部連結)
Affected Products
PowerProtect DP4400, PowerProtect DP5300, PowerProtect DP5800, PowerProtect DP8300, PowerProtect DP8800, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software
, PowerProtect DP5900, PowerProtect DP8400
...
Products
PowerProtect DP8900Article Properties
Article Number: 000199855
Article Type: How To
Last Modified: 28 Jul 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.