Disabling a Specified Interface from Receiving NTP Packets
Context
- An unreliable clock server exists on the interface. After the NTP function is enabled, all interfaces can receive NTP packets by default. However, an unreliable clock source makes NTP clock data inaccurate.
- The NTP clock data is modified when the interface is attacked.
Procedure
- Run system-view
The system view is displayed.
- Run interface interface-type interface-number
The interface for receiving NTP packets is specified.
- On an Ethernet interface, run undo portswitch
The interface is switched to Layer 3 mode.
By default, an Ethernet interface works in Layer 2 mode.
The mode switching function takes effect when the interface only has attribute configurations (for example, shutdown and description configurations). Alternatively, if configuration information supported by both Layer 2 and Layer 3 interfaces exists (for example, mode lacp and lacp system-id configurations), no configuration that is not supported after the working mode of the interface is switched can exist. If unsupported configurations exist on the interface, delete the configurations first and then run the undo portswitch command.
NOTE:
If many Ethernet interfaces need to be switched to Layer 3 mode, run the undo portswitch batch interface-type { interface-number1 [ to interface-number2 ] } &<1-10> command in the system view to switch these interfaces to Layer 3 mode in batches.
- Run ntp [ ipv6 ] receive disable
The interface is disabled from receiving NTP packets.
- Run commit
The configuration is committed.