Contents
Using Secure Shell ........................................................................................................2-12
Verifying Login Settings ...............................................................................................2-24
Chapter 3
In This Chapter ................................................................................................................3-1
NTP Specifications ..........................................................................................................3-2
NTP Defaults Table .........................................................................................................3-2
NTP Quick Steps .............................................................................................................3-3
NTP Overview ................................................................................................................3-5
Configuring NTP .............................................................................................................3-9
In This Chapter ................................................................................................................4-1
CMM Specifications .......................................................................................................4-2
CMM Files ......................................................................................................................4-3
Secure Shell Components .......................................................................................2-12
Secure Shell Interface ......................................................................................2-12
Authentication Phase .......................................................................................2-14
Connection Phase ............................................................................................2-15
Stratum .....................................................................................................................3-6
Using NTP in a Network ..........................................................................................3-6
Authentication ..........................................................................................................3-8
NTP Servers ...........................................................................................................3-10
Using Authentication ..............................................................................................3-12
.......................................................... 3-1
........................................................................ 4-1
December 2007
v