DOC 6501_Release V
ATS-6501 Users Guide
71
identifier used in the server and peer configuration commands. Next is the key type for the
message digest algorithm, which in in this case is for the MD5 message digest algorithm. If
compatibility with FIPS 140-2 is required, the key type must be either SHA or SHA1. The key
type can be changed using an ASCII text editor.
An MD5 key consists of a printable ASCII string less than or equal to 16 characters and
terminated by whitespace or a # character. The SHA1 key consists of a hex-encoded ASCII
string of 40 characters.
more /etc/ntp/ntp.keys
# ntpkey_MD5key_6501B_62.3684771467
# Thu Oct 6 19:37:47 2016
1 MD5 J0aA!;qO9?6B`Y4O@0z( # MD5 key
2 MD5 i,~KD0\C{|(lz,1;`j5T # MD5 key
3 MD5 nSXy^+(hS|(agn'xLuhi # MD5 key
4 MD5 YiccY0NFL~>A*,YaSZ1F # MD5 key
5 MD5 _dG?l(U8GiP'm$_v".X@ # MD5 key
6 MD5 y2ff^%_t-w&\-d^%ue6v # MD5 key
7 MD5 Y)(`z(hr>nk;ZotT=)sT # MD5 key
8 MD5 w}9A$\a`Iiz(q{U*z\VD # MD5 key
9 MD5 E:>3b]n%k=>'cC|Sf)Ix # MD5 key
10 MD5 hV_fZQ|Fr]})lq{GDHW3 # MD5 key
11 SHA1 5b0b5f803e8666e25109d372306194cc6c098fbb # SHA1 key
12 SHA1 c9cc0db97e14153a5996b387d00ad3c3f3200658 # SHA1 key
13 SHA1 5a82ff1f9f10f90c55afe02cc23c0f140b0f820f # SHA1 key
14 SHA1 25db69fff5a89a644f170b605bc35ce6faef9624 # SHA1 key
15 SHA1 010a71ad5d3a0f286927df6a02324c27417702be # SHA1 key
16 SHA1 8f0b9906bd1318c9f4cfd3799fcf260fdd451c4f # SHA1 key
17 SHA1 fd92f8261305d869335afa536133d28cc4b778e5 # SHA1 key
18 SHA1 36b12bbed0b4d5d2a610e4e778d1e13d3a216910 # SHA1 key
19 SHA1 2bac8b2e21af996fc2c5023c9e1f5ffdc63a6ad2 # SHA1 key
20 SHA1 50cc8f2997848c44a10968317e9f986f8b05abfc # SHA1 key
Select the desired key type and line as the key # for the next two steps.
3.4.5.2 NTP Server
To have an ATS-6501 use the keys and serve as a trusted ntp source, modify the ntp.conf file.
• Log into the unit (tsc/tsc)
• Switch to root (
su
)
• Make the file system writeable (
mount –uw /)
• Edit the /etc/ntp/conf file and add/edit the following:
o
keys /etc/ntp/ntp.keys
o
trustedkey (line # from above)
• Save the file
• Restart ntpd by rebooting the system.
You can test the unauthenticated NTP connections with the ntpdate command:
ntpdate -q -d <ip address of host>
6501B_62# ntpdate -q -d 192.168.150.60
6 Oct 19:47:47 ntpdate[3708]: ntpdate 4.2.8p4@1.3265-o Wed Jun 29 22:51:49 UTC 2016 (1)
Looking for host 192.168.150.60 and service ntp
host found : 192.168.150.60