
HTTP
W
EB
GUI
–
W
EB
B
ROWSER
C
ONFIGURATION
I
NTERFACE
4985LAN Large Matrix Display 4985 - V08.00
53 / 84
hopf
Elektronik GmbH
Nottebohmstr. 41
• D-58511 Lüdenscheid • Tel.: +49 (0)2351 9386-86 • Fax: +49 (0)2351 9386-93 • Internet: http://www.hopf.com • E-Mail: [email protected]
The following steps show how restrictions can be configured - should these not be required it
is sufficient to retain the standard settings.
The standard restrictions tell the NTP service how to handle packets of hosts (including remote
time servers) and sub-network which otherwise have no special restrictions.
The NTP configuration can simplify the selection of the correct standard restrictions while
making the required security available.
Before beginning the configuration, the points
user:
5.3.4.7.1 NAT or Firewall
Are incoming connections to the NTP Service blocked by NAT or a Stateful
Inspection Firewall?
No
Proceed to
Chapter 5.3.4.7.2 Blocking Unauthorised Access
Yes
No restrictions are required in this case.
Proceed further to
Chapter 5.3.4.7.4 Internal Client Protection / Local Network
5.3.4.7.2 Blocking Unauthorised Access
Is it really necessary to block all connections from unauthorised hosts if the NTP
Service is openly accessible?
No
Proceed to
Chapter 5.3.4.7.3 Allowing Client Requests
Yes
In this case the following restrictions are to be used:
ignore in the default restrictions
✓
If a standard restriction is selected in this area, exceptions can be declared in
separate lines for each authorised server, client or sub-network. See
Chapter
5.3.4.7.5 Addition of Exceptions to Standard