Alcatel-Lucent 7210 SAS M Configuration Manual page 359

Service access switch
Hide thumbs Also See for 7210 SAS M:
Table of Contents

Advertisement

Default
none
Parameters
key-id — Configure the authentication key-id that will be used by the node when transmitting or
key — The authentication key associated with the configured key-id, the value configured in this
hash — Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used,
hash2 — Specifies the key is entered in a more complex encrypted form that involves more variables
type — This parameter determines if DES or message-digest authentication is used.
broadcast
Syntax
broadcast [router router-name] {interface ip-int-name} [key-id key-id] [version version]
[ttl ttl]
no broadcast [router router-name] {interface ip-int-name}
Context
config>system>time>ntp
Description
This command configures the node to transmit NTP packets on a given interface. Broadcast and
multicast messages can easily be spoofed, thus, authentication is strongly recommended.
The no form of this command removes the address from the configuration.
Parameters
router — Specifies the router name used to transmit NTP packets. Base is the default.
7210 SAS M, T, X, R6 Basic System Configuration Guide
receiving Network Time Protocol packets.
Entering the authentication-key command with a key-id value that matches an existing
configuration key will result in overriding the existing entry.
Recipients of the NTP packets must have the same authentication key-id, type, and key value in
order to use the data transmitted by this node. This is an optional parameter.
Default
None
Values
1 — 255
parameter is the actual value used by other network elements to authenticate the NTP packet.
The key can be any combination of ASCII characters up to maximum 8 characters in length for
message-digest (md5) or maximum 8 characters in length for des (length limits are unencrypted
lengths). If spaces are used in the string, enclose the entire string in quotation marks (".").
the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in
encrypted form in the configuration file with the hash or hash2 parameter specified.
then the key value alone, this means that hash2 encrypted variable can't be copied and pasted. If
the hash or hash2 parameter is not used, the key is assumed to be in a non-encrypted, clear text
form. For security, all keys are stored in encrypted form in the configuration file with the hash or
hash2 parameter specified.
This is a required parameter; either DES or message-digest must be configured.
Values
des — Specifies that DES authentication is used for this key
message-digest — Specifies that MD5 authentication in accordance with RFC 2104
is used for this key.
System Management
Page 359

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents