Configuring Ntp Access Restrictions - Cisco Nexus 3548 series Configuration Manual

Nx-os system management, release 7.x
Hide thumbs Also See for Nexus 3548 series:
Table of Contents

Advertisement

Configuring NTP
Step 6
Step 7
Step 8
Example
This example shows how to configure the device to synchronize only to time sources that provide
authentication key 42 in their NTP packets:
switch# config t
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# ntp authentication-key 42 md5 aNiceKey
switch(config)# ntp trusted-key 42
switch(config)# ntp authenticate
switch(config)# copy running-config startup-config
[########################################] 100%
switch(config)#

Configuring NTP Access Restrictions

You can control access to NTP services by using access groups. Specifically, you can specify the types of
requests that the device allows and the servers from which it accepts responses.
If you do not configure any access groups, NTP access is granted to all devices. If you configure any access
groups, NTP access is granted only to the remote device whose source IP address passes the access list criteria.
Procedure
Step 1
Step 2
Command or Action
switch(config)# [no] ntp authenticate
(Optional) switch(config)# show ntp
authentication-status
(Optional) switch(config)# copy
running-config startup-config
Command or Action
switch# configure terminal
switch(config)# [no] ntp access-group {peer
| serve | serve-only | query-only}
access-list-name
Cisco Nexus 3548 Switch NX-OS System Management Configuration Guide, Release 7.x
Configuring NTP Access Restrictions
Purpose
Enables or disables the NTP authentication
feature. NTP authentication is disabled by
default.
Displays the status of NTP authentication.
Saves the change persistently through reboots
and restarts by copying the running
configuration to the startup configuration.
Purpose
Enters global configuration mode.
Creates or removes an access group to control
NTP access and applies a basic IP access list.
The access group options are scanned in the
following order, from least restrictive to most
restrictive. However, if NTP matches a deny
ACL rule in a configured peer, ACL processing
stops and does not continue to the next access
group option.
• The peer keyword enables the device to
receive time requests and NTP control
27

Advertisement

Table of Contents
loading

Table of Contents