29.04.2019 Views

OS6860(E)_AOS_8.1.1.R01_Switch_Management_Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring NTP<br />

Configuring Network Time Protocol (NTP)<br />

Using Authentication<br />

Authentication is used to encrypt the NTP messages sent between the client and server. The NTP server<br />

and the NTP client must both have a text file containing the public and secret keys. (This file should be<br />

obtained from the server administrator. For more information on the authentication file, see “Authentication”<br />

on page 11-8.)<br />

Once both the client and server share a common MD5 encryption key, the MD5 key identification for the<br />

NTP server must be specified on and labeled as trusted on the client side.<br />

The Omniswitch will use MD5 authentication. Key files reside in /flash/network/ntp.keys.<br />

In order to generate a key file, access to a Solaris/Unix environment is required. Also required is the ntpkeygen<br />

utility in Unix to generate the key file.<br />

Setting the Key ID for the NTP Server<br />

Enabling authentication requires the following steps:<br />

1 Make sure the key file is located in the /networking directory of the switch. This file must contain the<br />

key for the server that provides the switch with its timestamp information.<br />

2 Make sure the key file with the NTP server’s MD5 key is loaded into the switch memory by issuing the<br />

ntp key load command, as shown:<br />

-> ntp key load<br />

3 Set the server authentication key identification number using the ntp server command with the key<br />

keyword. This key identification number must be the one the server uses for MD5 encryption. For example,<br />

to specify key identification number 2 for an NTP server with an IP address of 1.1.1.1, enter:<br />

-> ntp server 1.1.1.1 key 2<br />

4 Specify the key identification set above as trusted. A key that has been labeled as trusted is ready for<br />

use in the authentication process. To set a key identification to be trusted, enter the ntp key command with<br />

the key identification number and trusted keyword. For example, to set key ID 5 to trusted status, enter<br />

the following:<br />

-> ntp key 5 trusted<br />

Untrusted keys, even if they are in the switch memory and match an NTP server, will not authenticate<br />

NTP messages.<br />

5 A key can be set to untrusted status by using the ntp key command with the untrusted keyword. For<br />

example, to set key ID 5 to untrusted status, enter the following:<br />

-> ntp key 5 untrusted<br />

page 11-12 Omni<strong>Switch</strong> <strong>AOS</strong> Release 8 <strong>Switch</strong> <strong>Management</strong> <strong>Guide</strong> May 2014

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!