of day and date is obtained when the router boots. The
server
statement identifies the
NTP server used for periodic time synchronization. The
authentication-key
statement
specifies that an HMAC-Message Digest 5 (MD5) scheme should be used to hash the
key value for authentication, which prevents the router or switch from synchronizing with
an attacker’s host posing as the time server.
[edit]
system {
ntp {
authentication-key 2 type md5 value "$9$aH1j8gqQ1gjyjgjhgjgiiiii"; # SECRET-DATA
boot-server 10.1.4.1;
server 10.1.4.2;
}
}
Related
Documentation
NTP Overview on page 3
•
•
Understanding NTP Time Servers on page 5
•
authentication-key
•
boot-server
•
server
•
show ntp associations on page 48
•
show ntp status on page 50
Configuring NTP Authentication Keys
Time synchronization can be authenticated to ensure that the local router or switch
obtains its time services only from known sources. By default, network time
synchronization is unauthenticated. The system will synchronize to whatever system
appears to have the most accurate time. We strongly encourage you to configure
authentication of network time services.
To authenticate other time servers, include the
trusted-key
statement at the
[edit system
ntp]
hierarchy level. Only time servers transmitting network time packets that contain
one of the specified key numbers and whose key matches the value configured for that
key number are eligible to be synchronized to. Other systems can synchronize to the local
router without being authenticated.
[edit system ntp]
trusted-key [ key-numbers ];
Each key can be any 32-bit unsigned integer except 0. Include the
key
option in the
peer
,
server
, or
broadcast
statements to transmit the specified authentication key when
transmitting packets. The key is necessary if the remote system has authentication
enabled so that it can synchronize to the local system.
To define the authentication keys, include the
authentication-key
statement at the
[edit
system ntp]
hierarchy level:
Copyright © 2014, Juniper Networks, Inc.
18
Time Management Administration Guide for Routing Devices
Содержание Dynabug 57810
Страница 6: ...Copyright 2014 Juniper Networks Inc vi Time Management Administration Guide for Routing Devices...
Страница 13: ...PART 1 Overview Time Management Overview on page 3 1 Copyright 2014 Juniper Networks Inc...
Страница 14: ...Copyright 2014 Juniper Networks Inc 2 Time Management Administration Guide for Routing Devices...
Страница 20: ...Copyright 2014 Juniper Networks Inc 8 Time Management Administration Guide for Routing Devices...
Страница 54: ...Copyright 2014 Juniper Networks Inc 42 Time Management Administration Guide for Routing Devices...
Страница 56: ...Copyright 2014 Juniper Networks Inc 44 Time Management Administration Guide for Routing Devices...
Страница 57: ...CHAPTER 4 Operational Commands set date 45 Copyright 2014 Juniper Networks Inc...
Страница 59: ...CHAPTER 5 Monitoring Commands show ntp associations show ntp status 47 Copyright 2014 Juniper Networks Inc...
Страница 64: ...Copyright 2014 Juniper Networks Inc 52 Time Management Administration Guide for Routing Devices...
Страница 65: ...PART 4 Index Index on page 55 53 Copyright 2014 Juniper Networks Inc...
Страница 66: ...Copyright 2014 Juniper Networks Inc 54 Time Management Administration Guide for Routing Devices...