1-10
From the highest NTP service access-control right to the lowest one are
peer
,
server
,
synchronization
, and
query
. When a device receives an NTP request, it will perform an
access-control right match in this order and use the first matched right.
Configuration Prerequisites
Prior to configuring the NTP service access-control right to the local switch for peer devices, you need
to create and configure an ACL associated with the access-control right. For the configuration of ACL,
refer to
ACL Configuration
in
Security Volume
.
Configuration Procedure
Table 1-9
Configure the NTP service access-control right to the local device for peer devices
Operation
Command…
Description
Enter system view
system-view
—
Configure the NTP service
access-control right to the local
switch for peer devices
ntp-service access
{
peer
|
server
|
synchronization
|
query
}
acl-number
Optional
peer
by default
The access-control right mechanism provides only a minimum degree of security protection for the local
switch. A more secure method is identity authentication.
Configuring NTP Authentication
In networks with higher security requirements, the NTP authentication function must be enabled to run
NTP. Through password authentication on the client and the server, the clock of the client is
synchronized only to that of the server that passes the authentication. This improves network security.
Table 1-10
shows the roles of devices in the NTP authentication function.
Table 1-10
Description on the roles of devices in NTP authentication function
Role of device
Working mode
Client in the server/client mode
Client in the broadcast mode
Client in the multicast mode
Client
Symmetric-active peer in the symmetric peer mode
Server in the server/client mode
Server in the broadcast mode
Server in the multicast mode
Server
Symmetric-passive peer in the symmetric peer mode