298
C
HAPTER
35: NTP C
ONFIGURATION
Configuring NTP
Authentication
Configuring NTP authentication on the client
■
NTP authentication requires that the authentication keys configured for the server
and the client are the same. Besides, the authentication keys must be trusted keys.
Otherwise, the client cannot be synchronized with the server.
■
In NTP server mode and NTP peer mode, you need to associate the specified key
with the corresponding NTP server/active peer on the client/passive peer. In these
two modes, multiple servers/active peers may be configured for a client/passive
peer, and a client/passive choose the server/active peer to synchronize to by the
authentication key.
Table 259
Configure NTP authentication on the client
Operation
Command
Description
Enter system view
system-view
—
Enable NTP
authentication globally
ntp-service authentication enable
Required
By default, the NTP authentication
is disabled.
Configure the NTP
authentication key
ntp-service
authentication-keyid
key-id
authentication-model
md5
value
Required
By default, the NTP authentication
key is not configured.
Configure the specified
key to be a trusted key
ntp-service reliable
authentication-keyid
key-id
Required
By default, no trusted
authentication key is configured.
Associate the specified
key with the
corresponding NTP
server
NTP server mode:
ntp-service
unicast-server
remote-ip
authentication-keyid
key-id
■
In NTP server mode and
NTP peer mode, you need
to associate the specified
key with the corresponding
NTP server on the client.
■
You can associate the NTP
server with the
authentication key while
configuring the switch to
operate in a specific NTP
mode. You can also
associate them using this
command after configuring
the NTP mode where the
switch is to operate in.
Peer mode:
ntp-service
unicast-peer
remote-ip
authentication-keyid
key-id
Summary of Contents for 4200G 12-Port
Page 10: ...8 CONTENTS...
Page 14: ...4 ABOUT THIS GUIDE...
Page 46: ...32 CHAPTER 5 LOGGING IN THROUGH WEB BASED NETWORK MANAGEMENT SYSTEM...
Page 48: ...34 CHAPTER 6 LOGGING IN THROUGH NMS...
Page 60: ...46 CHAPTER 9 VLAN CONFIGURATION...
Page 64: ...50 CHAPTER 10 MANAGEMENT VLAN CONFIGURATION...
Page 80: ...66 CHAPTER 13 GVRP CONFIGURATION...
Page 98: ...84 CHAPTER 15 LINK AGGREGATION CONFIGURATION...
Page 112: ...98 CHAPTER 18 MAC ADDRESS TABLE MANAGEMENT...
Page 126: ...112 CHAPTER 19 LOGGING IN THROUGH TELNET...
Page 162: ...148 CHAPTER 20 MSTP CONFIGURATION...
Page 274: ...260 CHAPTER 29 IGMP SNOOPING CONFIGURATION...
Page 276: ...262 CHAPTER 30 ROUTING PORT JOIN TO MULTICAST GROUP CONFIGURATION...
Page 298: ...284 CHAPTER 33 SNMP CONFIGURATION...
Page 304: ...290 CHAPTER 34 RMON CONFIGURATION...
Page 338: ...324 CHAPTER 36 SSH TERMINAL SERVICES...
Page 356: ...342 CHAPTER 38 FTP AND TFTP CONFIGURATION...
Page 365: ...Information Center Configuration Example 351 S4200G terminal logging...
Page 366: ...352 CHAPTER 39 INFORMATION CENTER...
Page 378: ...364 CHAPTER 40 BOOTROM AND HOST SOFTWARE LOADING...
Page 384: ...370 CHAPTER 41 Basic System Configuration and Debugging...
Page 388: ...374 CHAPTER 43 NETWORK CONNECTIVITY TEST...
Page 406: ...392 CHAPTER 45 CONFIGURATION OF NEWLY ADDED CLUSTER FUNCTIONS...