S o n o m a U s e r M a n u a l
26
C H A P T E R T H R E E
27
S o n o m a U s e r M a n u a l
N E T W O R K T I M E P R O T O C O L ( N T P )
http://support.ntp.org/bin/view/Main/ExternalTimeRelatedLinks
Configure NTP
Directory path names are not given in the instructions below because there are multiple ways to
install
ntpd
and multiple versions of Windows.
After installing
ntpd
, you must edit the
ntp.conf
file by adding a line similar to this:
server 192.168.1.120
This line tells
ntpd.exe
to use the NTP server at address 192.168.1.120 in addition to any other
servers which might also be configured in the
ntp.conf
file.
Restart
ntpd.exe
to have it begin using the Sonoma server. By default, the NTP installation pro-
gram installs
ntpd.exe
as a service called Network Time Protocol, and starts it. You must use the
Services utility in Control Panel to stop the Network Time Protocol service and then restart it.
Use the NTP utility
ntpq.exe
to check that
ntpd.exe
is able to communicate with the Sonoma.
From a console window, after issuing the command
ntpq
you will see the
ntpq.exe
command prompt:
ntpq>
Use the command
peers
to display the NTP peers which your computer is using. One of them should be the Sonoma server
which you have just configured. You should verify that it is being ‘reached’. (You may have to
continue issuing the peers command for a minute or two before you will see the ‘reach’ count incre-
ment.) If you have other peers configured, verify that the offset information for the Sonoma server
peer and your other peers is in agreement to within a few milliseconds, assuming that the other peers
are synchronized to that level of accuracy.
It may also be useful to start the NTP daemon in ‘debug’ mode (
ntpd -d
) to confirm successful con-
figuration. Refer to the NTP documentation for detailed usage of these debug utilities.
Windows: MD5 Authenticated NTP Client Setup
MD5 authenticated setup is relatively simple, if:
• You have been able to successfully communicate with the Sonoma on your network.
• Your Sonoma has been configured to perform authentication either by factory default, or by
running the
ntpconfig
shell script. The example Sonoma authentication configuration shown in
Summary of Contents for Sonoma N12
Page 2: ......
Page 16: ...S o n o m a U s e r M a n u a l This page intentionally left blank...
Page 20: ...S o n o m a U s e r M a n u a l 4 C H A P T E R O N E This page intentionally left blank...
Page 32: ...S o n o m a U s e r M a n u a l 16 C H A P T E R T W O This page intentionally left blank...
Page 48: ...S o n o m a U s e r M a n u a l 32 C H A P T E R T H R E E This page intentionally left blank...
Page 70: ...S o n o m a U s e r M a n u a l 54 C H A P T E R S I X This page intentionally left blank...
Page 82: ...S o n o m a U s e r M a n u a l 66 C H A P T E R S E V E N This page intentionally left blank...
Page 122: ...S o n o m a U s e r M a n u a l 106 A P P E N D I X A This page intentionally left blank...
Page 156: ...S o n o m a U s e r M a n u a l 140 A P P E N D I X E...
Page 158: ...S o n o m a U s e r M a n u a l 142 A P P E N D I X F This page intentionally left blank...
Page 168: ...S o n o m a U s e r M a n u a l 152 A P P E N D I X H...
Page 169: ...153 S o n o m a U s e r M a n u a l S P E C I F I C AT I O N S...
Page 170: ...S o n o m a U s e r M a n u a l 154 A P P E N D I X H This page intentionally left blank...
Page 173: ......