Configuring NTP Authentication
377
Configuration Procedure
Configuring NTP authentication on the client
n
NTP authentication requires that the authentication keys configured for the server
and the client be the same. Besides, the authentication keys must be trusted keys.
Otherwise, the clock of the client cannot be synchronized with that of the server.
Configuring NTP authentication on the server
Table 291
Configure NTP authentication on the client
Operation
Command
Description
Enter system view
system-view
-
Enable the NTP authentication
function
ntp-service authentication
enable
Required
Disabled by default.
Configure the NTP
authentication key
ntp-service
authentication-keyid
key-id
authentication-model md5
value
Required
By default, no NTP
authentication key is
configured.
Configure the specified key as
a trusted key
ntp-service reliable
authentication-keyid
key-id
Required
By default, no trusted key is
configured.
Associate
the
specified
key with
the
correspo
nding
NTP
server
Configure on the
client in the
server/client mode
ntp-service unicast-server
{
remote-ip
|
server-name
}
authentication-keyid
key-id
Required
For the client in the NTP
broadcast/multicast mode,
you just need to associate the
specified key with the client
on the corresponding server.
Configure on the
symmetric-active
peer in the
symmetric peer
mode
ntp-service unicast-peer
{
remote-ip | peer-name }
authentication-keyid
key-id
Table 292
Configure NTP authentication on the server
Operation
Command
Description
Enter system view
system-view
-
Enable NTP authentication
ntp-service authentication
enable
Required
Disabled by default.
Configure an NTP
authentication key
ntp-service
authentication-keyid
key-id
authentication-mode md5
value
Required
By default, no NTP
authentication key is
configured.
Configure the specified key as
a trusted key
ntp-service reliable
authentication-keyid
key-id
Required
By default, no trusted
authentication key is
configured.
Enter VLAN interface view
interface Vlan-interface
vlan-id
-
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...