B.11 NTP/PTP Server
173
NTP Authentication
Authentication involves advanced configuration for NTP, and used to prevent tampering with the timestamps
on the logs generated by devices. You can configure a device to authenticate the time sources to which the
local clock is synchronized. When you enable NTP authentication, the device synchronizes to a time source
only if the source carries one of the authentication keys specified by the ntp trusted-key command. The
device drops any packets that fail the authentication check and prevents them from updating the local clock.
NTP authentication is disabled by default.
Computer Name -- ssh clockoption@(IP address) -- 80x24
Time Protocol Server
ARBITER
SYSTEMS
[ NTP ]
PTP
SNMP
Clock
Network
System
Support
Logout
Status Configure [ Authentication ]
[X] Enable Authentication
Key Table
ID Format Key Trusted
[ ] [M] [ ] [ ]
[ ] [M] [ ] [ ]
[ ] [M] [ ] [ ]
[ ] [M] [ ] [ ]
[ ] [M] [ ] [ ]
Apply Reset
Figure B.37: NTP Authentication Page Using SSH
There are four authentication formats (S, N, A, M) with different rules for each of the keys. For example,
a type M format (MD5) allows the key to have up to 31 ASCII characters like a password. The key ID is an
integer and identifies the NTP server key. If authentication is enabled, the client will only synchronize with
the server if it is trusted. Therefore, you must select the ”Trusted” check box on the authentication page.