This article describes how to block non-NTP traffic on FortiGate devices. It provides a step-by-step guide on configuring custom application control signatures to drop non-legitimate NTP traffic.
FortiGate.
To ensure that only legitimate NTP (Network Time Protocol) traffic passes through port 123 and all other traffic is blocked, FortiGate firewalls can be configured with custom application signatures. The procedure below outlines the configuration steps.
On the FortiGate, navigate to Policy & Objects -> Application Control -> Application Signatures.
Create a new custom signature for TCP traffic on port 123 with the following parameters:
F-SBID( --name "Non.NTP.Custom.1"; --app_cat 12; --protocol tcp; --flow from_client; --dst_port 123; )
Repeat the process to create a second custom signature for UDP traffic on port 123 using these parameters:
F-SBID( --name "Non.NTP.Custom.2"; --app_cat 12; --protocol udp; --flow from_client; --dst_port 123; )
These signatures enable the identification of non-NTP traffic attempting to use the NTP port.
In the Application Control section under Security Profiles, create an application control profile and add both custom signatures to this profile under Application and Filter Overrides and set the Action to Block.
Open Policy & Objects -> Firewall Policy and edit the policy governing NTP traffic. In the Application Control section, select the profile to which the signatures are added and select the SSL inspection profile as deep-inspection.
Set the priority of the custom signatures lower than the built-in NTP signature provided by FortiGuard in the application control profile to ensure that genuine NTP traffic is allowed to continue. In contrast, non-NTP traffic on port 123 is blocked.
Because these signatures are custom, they are not distributed by FortiGuard automatically and must be created or imported manually on each FortiGate device where the restriction is required.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.