Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Anchor
bookmark829
bookmark829
Figure 8.1 Infoblox Appliances as NTP Servers

...

Drawio
bordertrue
viewerToolbartrue
fitWindowfalse
diagramName8.1
simpleViewerfalse
width
revision1


Anchor
Authenticating NTP
Authenticating NTP
Anchor
bookmark830
bookmark830
Anchor
bookmark831
bookmark831
Authenticating NTP
To prevent intruders from interfering with the time services on your network, you can authenticate communications between a NIOS appliance and a public NTP server, and between a NIOS appliance and external NTP clients. NTP communications within the Grid go through an encrypted VPN tunnel, so you do not have to enable authentication between members in a Grid.
NTP uses symmetric key cryptography, where the server and the client use the same algorithm and key to calculate and verify a MAC (message authentication code). The MAC is a digital thumbprint of the message that the receiver uses to verify the authenticity of a message.
As shown in Figure 8.2 , the NTP client administrator must first obtain the secret key information from the administrator of the NTP server. The server and the client must have the same key ID and data. Therefore, when you configure the NIOS appliance as an NTP client and want to use authentication, you must obtain the key information from the administrator of the external NTP server and enter the information on the NIOS appliance. When you configure a NIOS appliance as an NTP server, you must create a key and send the key information to clients in a secure manner. A key consists of the following:

...