HTTP/HTTPS
W
EB
GUI
–
W
EB
B
ROWSER
C
ONFIGURATION
I
NTERFACE
8030HEPTA/GPS GPS - NTP Time Server with 2x 10/100/1000 MBit LAN Interface - V04.00
84 / 178
hopf
Elektronik GmbH
Nottebohmstr. 41
• D-58511 Lüdenscheid • Tel.: +49 (0)2351 9386-86 • Fax: +49 (0)2351 9386-93 • Internet: http://www.hopf.com • E-Mail: [email protected]
8.3.3.7.2 Blocking Unauthorised Access
Is it really necessary to block all connections from unauthorised hosts if the NTP
Service is openly accessible?
No
Proceed to
Chapter 8.3.3.7.3 Allowing Client Requests
Yes
In this case the following restrictions are to be used:
ignore in the default restrictions
✓
If a standard restriction is selected in this area, exceptions can be declared in
separate lines for each authorised server, client or sub-network. See
Chapter
8.3.3.7.5 Addition of Exceptions to Standard Restrictions
8.3.3.7.3 Allowing Client Requests
Are clients to be allowed to see the server status information when they receive the
time information from the NTP service (even if this is information about the module,
operating system and NTPD version)?
No
In this case select from the following standard restrictions:
See
Chapter 8.3.3.7.6 Access Control Options
kod
✓
notrap
✓
nopeer
✓
noquery
.
✓
Yes
In this case select from the following standard restrictions:
See
Chapter 8.3.3.7.6 Access Control Options
kod
✓
notrap
✓
nopeer
✓
If a standard restriction is selected in this area, exceptions can be de-
clared in separate lines for each authorised server, client or sub-net-
work. See
Chapter 8.3.3.7.5 Addition of Exceptions to Standard Re-
8.3.3.7.4 Internal Client Protection / Local Network Threat Level
How much protection from internal network clients is required?
Yes
The following restrictions can be enabled if greater security settings than the in-
stalled authentication are required in order to protect the NTP service from the
clients
see
Chapter 8.3.3.7.6 Access Control Options
kod
✓
notrap
✓
nopeer
✓