15
•
If the specified ACL does not exist, or the specified ACL does not contain any rule, any device
can use the key ID for authentication.
•
If a VPN instance is specified in an ACL rule, the rule applies only to the packets of the VPN
instance. If no VPN instance is specified in an ACL rule, the rule applies only to the packets on
the public network.
To ensure a successful NTP authentication, configure the same key ID, authentication algorithm, and
key on the time server and client.
After you specify an NTP authentication key, use the
ntp-service reliable
authentication-keyid
command to configure the key as a trusted key. The key automatically
changes to untrusted after you delete the key. In this case, you do not need to execute the
undo
ntp-service reliable authentication-keyid
command.
The security strength of the five algorithms, in descending order, is HMAC-SHA-512,
HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-1, and MD5.
You can set a maximum of 128 authentication keys by executing the command.
Examples
# Set a plaintext MD5 authentication key, with the key ID of
10
and key value of
BetterKey
.
<Sysname> system-view
[Sysname] ntp-service authentication enable
[Sysname] ntp-service authentication-keyid 10 authentication-mode md5 simple BetterKey
Related commands
ntp-service authentication enable
ntp-service reliable authentication-keyid
ntp-service broadcast-client
Use
ntp-service broadcast-client
to configure the device to operate in NTP broadcast
client mode and use the current interface to receive NTP broadcast packets.
Use
undo ntp-service broadcast-client
to remove the configuration.
Syntax
ntp-service
broadcast-client
undo
ntp-service
broadcast-client
Default
The device does not operate in any NTP association mode.
Views
Interface view
Predefined user roles
network-admin
Usage guidelines
After you configure the command, the device listens to NTP messages sent by the NTP broadcast
server and is synchronized based on the received NTP messages.
If you have configured the device to operate in broadcast client mode on an interface with the
command, do not add the interface to any aggregate group. To add the interface to an aggregate
group, remove the configuration of the command.
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...