Defining A Ntp Neighbor Configuration - Motorola RFS Series Reference Manual

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

Key Value
Trusted Key
4. Select an existing key and click the
5. Click the
Add
button to create a new Symmetric Key that can be used by the switch.
CAUTION: After an NTP synchronization using a Symmetric Key, the NTP status will not
automatically be updated.
.
6. Enter a Key ID between 1-65534. The
multiple passwords.
This makes password migration easier and more secure between the switch and its NTP resource.
7. Enter an authentication
time to the switch.
8. Select the
Trusted Key
A trusted key should be used when a public key is known, but cannot be securely obtained. Adding a
trusted key allows data to be considered secure between the switch and its SNTP resource.
9. Refer to the
Status
The Status is the current state of the requests made from the applet. Requests are any "SET/GET"
operation from the applet. The Status field displays error messages if something goes wrong in the
transaction between the applet and the switch.
10.Click
OK
to save and add the changes to the running configuration and close the dialog.
11.Click
Cancel
to close the dialog without committing updates to the running configuration.

5.3.3 Defining a NTP Neighbor Configuration

The switch's NTP association can be either a neighboring peer (the switch synchronizes to another
associated device) or a neighboring server (the switch synchronizes to a dedicated SNTP server resource).
Refer to the
NTP Neighbor
Displays the authentication value used to secure the credentials of the server
providing system time to the switch.
If a checkmark appears, a trusted key has been associated with a domain name. A
trusted key is added when a public key is known, but cannot be securely obtained.
Adding the trusted key allows information from the server to be considered secure.
The authentication procedures requires both the local and remote servers share the
same key and key identifier. Therefore, using key information from a trusted source
is important.
Delete
button to permanently remove it from the list of Key IDs.
Key ID
Key Value
used to secure the credentials of the NTP server providing system
checkbox to use a trusted key.
field.
tab to assess the switch's existing configurations (both peer and server) and, if
is a Key abbreviation allowing the switch to reference
5-27
Switch Services

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ws5100 3.3Rfs6000 3.3Rfs7000 1.3

Table of Contents