PowerProtect e IDPA: Verificação de vulnerabilidade de segurança detectada Scanner de modo NTP 6
Summary: Equipamentos PowerProtect Data Protection (DP) Series e IDPA: A verificação de vulnerabilidades de segurança detectou "Network Time Protocol (NTP) Mode 6 Scanner" no ACM/Search
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Instructions
Para resolver a vulnerabilidade de segurança do "NTP Mode 6 Scanner", atualize o arquivo de configuração do NTP conforme abaixo para desativar o modo NTP 6:
O padrão /etc/ntp.conf deve ser:
server xx.xx.xx.xx iburst
Para desativar o modo NTP 6, adicione duas linhas/etc/ntp.conf:
server xx.xx.xx.xx iburst
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
Em seguida, reinicie o serviço NTP:
# service ntpd stop
# service ntpd start
Additional Information
Página habilite para esta vulnerabilidade:
https://www.tenable.com/plugins/nessus/97861 (Link externo)
Affected Products
PowerProtect DP4400, PowerProtect DP5300, PowerProtect DP5800, PowerProtect DP8300, PowerProtect DP8800, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, Integrated Data Protection Appliance Software
, PowerProtect DP5900, PowerProtect DP8400
...
Products
PowerProtect DP8900Article Properties
Article Number: 000199855
Article Type: How To
Last Modified: 28 Jul 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.