No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE20E-S2 V800R010C10SPC500 Configuration Guide - System Management 01

This is NE20E-S2 V800R010C10SPC500 Configuration Guide - System Management
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring NTP Security Mechanisms

Configuring NTP Security Mechanisms

This section describes how to ensure the security of NTP sessions through NTP security mechanisms.

Usage Scenario

NTP supports two security mechanisms: access authority and NTP authentication.

  • Access authority

    Access authority is a type of simple security method provided by the NE20E to protect local NTP services.

  • NTP authentication

    NTP authentication is required in some networks with high security demands.

    The configuration of NTP authentication involves configuring NTP authentication on both, the client and the server.

    During the configuration of NTP authentication, pay attention to the following rules:

    • Configure NTP authentication on both the client and the server. Otherwise, the authentication does not take effect.

    • If NTP authentication is enabled, a reliable key needs to be configured at the client side.

    • The authentication key configured on the server and that on the client must be consistent.

    • In NTP peer mode, the symmetric active end equals the client, and the symmetric passive end equals the server.

Pre-configuration Tasks

Before configuring NTP security mechanisms, complete the following tasks:

  • Configure the link layer protocol for the interface.

  • Configure the link layer protocol and routing protocol to make the server and client reachable.

  • Configure ACL rules if the access authority is configured.

Configuration Procedures

Figure 5-2 Flowchart for configuring NTP security mechanisms

Updated: 2019-01-02

Document ID: EDOC1100055400

Views: 20247

Downloads: 30

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next