Typical NTP Configuration Examples
505
Configure
Authentication-enabled
NTP Server Mode
Network Requirements
Switch 1 sets the local clock as the NTP master clock at stratum 2. Switch 2 sets
Switch 1 as its time server in server mode and itself in client mode and enables
authentication. (Note that Switch 1 must support setting local clock as the NTP
master clock.)
Networking Diagram
See Figure 132.
Configuration Procedure
1
Configure Switch 1:
a
Enter System View.
<switch1>
system-view
b
Set the local clock as the NTP master clock at stratum 2.
[switch1]
ntp-service refclock-master 2
2
Configure Switch 2:
a
Enter System View.
<switch2>
system-view
b
Set Switch 1 as time server.
[switch2]
ntp-service unicast-server 1.0.1.11
c
Enable authentication.
[switch2]
ntp-service authentication enable
d
Set the key.
[switch2]
ntp-service authentication-keyid 42 authentication-mode md5
aNiceKey
e
Set the key as reliable.
[switch2]
ntp-service reliable authentication-keyid 42
The above examples synchronized Switch 2 by Switch 1. Since Switch 1 has not been
enabled authentication, it cannot synchronize Switch 2. And now let us do the
following additional configurations on Switch 1:
1
Enable authentication.
[switch1]
ntp-service authentication enable
2
Set the key.
[switch1]
ntp-service authentication-keyid 42 authentication-mode md5
aNiceKey
3
Configure the key as reliable.
[switch1]
ntp-service reliable authentication-keyid 42
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...