During the configuration of NTP authentication, pay attention to the following rules:
–
Configure NTP authentication on both the client and the server; otherwise, the
authentication does not take effect.
–
If NTP authentication is enabled, a reliable key needs to be configured at the same time.
–
The authentication key configured on the server and that on the client should be
consistent.
–
In NTP peer mode, the symmetric active end equals the client, and the symmetric passive
end equals the server.
Pre-configuration Tasks
Before configuring NTP security mechanisms, complete the following tasks:
l
Configuring the link layer protocol on the interface
l
Configuring the network layer address and routing protocol to make the server and client
reachable
l
Configuring ACL rules if the access authority is configured
Data Preparation
To configure NTP security mechanisms, you need the following data.
No.
Data
1
ACL rules
2
Shared key and its ID that are used in NTP authentication
3
NTP primary clock and its stratum
4
Interfaces that send and receive NTP packets
5
NTP version
5.3.2 Setting NTP Access Authorities
When receiving an access request packet, the NTP server matches the request packet with the
access authority in descending order (from peer, server, synchronization to query). The first
matched authority takes effect.
Context
Do as follows on the router.
Procedure
Step 1
Run:
system-view
The system view is displayed.
Huawei AR150&200 Series Enterprise Routers
Configuration Guide - Network Management
5 NTP Configuration
Issue 02 (2012-03-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
120