Configuring A Cisco Router To Be An Ntp Server - Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Installation And Configuration Manual

Intrusion detection system appliance and module
Table of Contents

Advertisement

Sensor Initial Configuration Tasks
Step 6
Step 7
Step 8
Step 9

Configuring a Cisco Router to be an NTP Server

Cisco Intrusion Detection System Appliance and Module Installation and Configuration Guide Version 4.1
10-22
Type the NTP server's key ID:
sensor(config-Host-tim-ntp)# keyId
The key ID is a number between 1 and 65535. This is the key ID that you already
set up on the NTP server. See Step 3 of
Server, page
10-22.
For example:
sensor(config-Host-tim-ntp)# keyId 100
Type the NTP server's key value:
sensor(config-Host-tim-ntp)# md5
The key value is text (numeric or character). This is the key value that you already
set up on the NTP server. See Step 3 of
Server, page
10-22.
For example:
sensor(config-Host-tim-ntp)# keyValue
Exit NTP configuration mode:
sensor(config-Host-tim-ntp)# exit
sensor(config-Host-tim)# exit
sensor(config-Host)# exit
Save the changes by typing yes:
Apply Changes:?[yes]
The sensor requires an authenticated connection with an NTP server if it is going
to use the NTP server as its time source. The sensor supports only the MD5 hash
algorithm for key encryption. Use the following procedure to activate a Cisco
router to act as an NTP server and use its internal clock as the time source.
Chapter 10
Configuring the Sensor Using the CLI
key_ID
Configuring a Cisco Router to be an NTP
key-value
Configuring a Cisco Router to be an NTP
attack
78-15597-02

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor and is the answer not in the manual?

Questions and answers

Table of Contents