Users Guide

Table Of Contents
10.16.150.185 10.16.151.123 16 1024 0 0.00000 0.000000 3.99217
OS10# show ntp associations
remote local st poll reach delay offset disp
=======================================================================
10.16.150.185 10.16.151.123 16 1024 0 0.00000 0.000000 3.99217
Broadcasts
Receive broadcasts of time information and set interfaces within the system to receive NTP information through broadcast.
NTP is enabled on all active interfaces by default. If you disable NTP on an interface, the system drops any NTP packets sent to
that interface.
1. Set the interface to receive NTP packets in INTERFACE mode.
ntp broadcast client
2. Disable NTP on the interface in INTERFACE mode.
ntp disable
Configure NTP broadcasts
OS10(config)# interface ethernet 1/1/10
OS10(conf-if-eth1/1/10)# ntp broadcast client
Disable NTP broadcasts
OS10(config)# interface ethernet 1/1/10
OS10(conf-if-eth1/1/10)# ntp disable
Source IP address
Configure one interface IP address to include in all NTP packets. The source address of NTP packets is the interface IP address
the system uses to reach the network by default.
Configure a source IP address for NTP packets in CONFIGURATION mode.
ntp source interface
ethernet node/slot/port[:subport]Enter the Ethernet interface information.
port-channel channel-idEnter the port-channel ID, from 1 to 128.
vlan vlan-idEnter the VLAN ID number, from 1 to 4093.
loopback idEnter the Loopback interface ID number, from 0 to 16383.
mgmt node/slot/portEnter the physical port interface for the Management interface. The default is 1/1/1.
Configure the source IP address
OS10(config)# ntp source ethernet 1/1/10
View the source IP configuration
OS10(config)# do show running-configuration | grep source
ntp source ethernet1/1/1
Authentication
NTP authentication and the corresponding trusted key provide a reliable exchange of NTP packets with trusted time sources.
NTP authentication begins with creating the first NTP packet after the key configuration. NTP authentication uses the message
digest 5 (MD5), SHA-1, and SHA2-256 algorithms. The key is embedded in the synchronization packet that is sent to an NTP
time source.
194
System management