Product Documentation

ntp param

Sep 12, 2016

The following operations can be performed on "ntp param":

set ntp param

Modifies the values for NTP parameters on the NetScaler appliance.

Synopsys

set ntp param [-authentication ( YES | NO )] [-trustedkey <positive_integer> ...] [-autokeyLogsec <positive_integer>] [-revokeLogsec <positive_integer>]

Arguments

authentication

Apply NTP authentication, which enables the NTP client (NetScaler) to verify that the server is in fact known and trusted.

Possible values: YES, NO

Default value: YES

trustedkey

Key identifiers that are trusted for server authentication with symmetric key cryptography in the keys file.

Minimum value: 1

Maximum value: 65534

autokeyLogsec

Autokey protocol requires the keys to be refreshed periodically. This parameter specifies the interval between regenerations of new session keys. In seconds, expressed as a power of 2.

Default value: 12

Minimum value: 0

Maximum value: 32

revokeLogsec

Interval between re-randomizations of the autokey seeds to prevent brute-force attacks on the autokey algorithms.

Default value: 16

Minimum value: 0

Maximum value: 32

unset ntp param

Use this command to remove ntp param settings.Refer to the set ntp param command for meanings of the arguments.

Synopsys

unset ntp param [-authentication] [-trustedkey] [-autokeyLogsec] [-revokeLogsec]

show ntp param

Displays information about the NTP parameters.

Synopsys

show ntp param

Outputs

authentication

Apply NTP authentication, which enables the NTP client (NetScaler) to verify that the server is in fact known and trusted.

trustedkey

Key identifiers that are trusted for server authentication with symmetric key cryptography in the keys file.

autokeyLogsec

Autokey protocol requires the keys to be refreshed periodically. This parameter specifies the interval between regenerations of new session keys. In seconds, expressed as a power of 2.

revokeLogsec

Interval between re-randomizations of the autokey seeds to prevent brute-force attacks on the autokey algorithms.