NOTES:
Duplicate key IDs are not permitted. NTP requests received by that do not contain an
authenticator containing a valid Key ID and MD5 message digest pair will be responded
to, but no authentication will be performed. An NTP request with valid authenticators
results in a valid NTP response with its own valid authenticator using the same Key ID
provided in the NTP request.
You may define the trusted Symmetric Keys that must be entered on both VelaSync,
and any network client with which VelaSync is to communicate. Only those keys for
which the “Trusted” box has been checked will appear in the dropdown menus on the
NTP References
screen.
2.10.10 NTP Access Restrictions
Next to encrypted authentication by means of Symmetric Keys, NTP supports a list-
based means of access restriction, the use of which is also recommended to prevent
fraudulent or inadvertent manipulation of a time server.
To configure NTP Access Restrictions:
1.
Navigate to
MANAGEMENT > NETWORK: NTP Setup
.
2.
In the
Actions
panel, click
Access Restrictions
:
84
CHAPTER
2
•
VelaSync User's Manual Rev. 3
2.10 Configuring NTP
Summary of Contents for VelaSync 1225
Page 2: ......
Page 4: ...Blank page II VelaSync User s Manual...
Page 12: ...BLANK PAGE X VelaSync User s Manual TABLE OF CONTENTS...
Page 28: ...16 CHAPTER 1 VelaSync User s Manual Rev 3 1 7 The VelaSync Web UI...
Page 34: ...BLANK PAGE 1 9 Regulatory Compliance 22 CHAPTER 1 VelaSync User s Manual Rev 3...
Page 104: ...BLANK PAGE 2 11 Configuring PTP 92 CHAPTER 2 VelaSync User s Manual Rev 3...
Page 251: ...Server management System specifications VelaSync User s Manual 239 APPENDIX...
Page 267: ...VelaSync User s Manual 255 APPENDIX...