EasyManuals Logo

Cisco NCS 5000 Series User Manual

Cisco NCS 5000 Series
188 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #163 background imageLoading...
Page #163 background image
PurposeCommand or Action
Example:
RP/0/RP0/CPU0:router(config-ntp)# end
exiting(yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the running
configuration file, exits the configuration session, and returns
the router to EXEC mode.
or
RP/0/RP0/CPU0:router(config-ntp)#
commit
Entering no exits the configuration session and returns the
router to EXEC mode without committing the configuration
changes.
Entering cancel leaves the router in the current configuration
session without exiting or committing the configuration
changes.
Use the commit command to save the configuration changes to
the running configuration file and remain within the configuration
session.
Configuring NTP Authentication
This task explains how to configure NTP authentication.
No specific command enables NTP; the first NTP configuration command that you issue enables NTP.Note
The encrypted NTP authentication scheme should be used when a reliable form of access control is required.
Unlike the access-list-based restriction scheme that is based on IP addresses, the encrypted authentication
scheme uses authentication keys and an authentication process to determine if NTP synchronization packets
sent by designated peers or servers on a local network are deemed as trusted, before the time information that
it carries along is accepted.
The authentication process begins from the moment an NTP packet is created. A message authentication code
(MAC) is computed using the MD5 Message Digest Algorithm and the MAC is embedded into an NTP
synchronization packet. The NTP synchronization packet together with the embedded MAC and key number
are transmitted to the receiving client. If authentication is enabled and the key is trusted, the receiving client
computes the MAC in the same way. If the computed MAC matches the embedded MAC, the system is
allowed to sync to the server that uses this key in its packets.
After NTP authentication is properly configured, your networking device only synchronizes with and provides
synchronization to trusted time sources.
System Management Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.2.x
153
Implementing NTP
Configuring NTP Authentication

Table of Contents

Other manuals for Cisco NCS 5000 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco NCS 5000 Series and is the answer not in the manual?

Cisco NCS 5000 Series Specifications

General IconGeneral
BrandCisco
ModelNCS 5000 Series
CategoryNetwork Router
LanguageEnglish

Related product manuals