Os ch10
Os ch10
Introduction
The Network Time Protocol (NTP) is used to synchronize the time of a computer client or
server to another server or reference time source, such as a radio or satellite receiver. It
provides client time accuracies within a millisecond on LANs, and up to a few tens of millisec-
onds on WANs relative to a primary server synchronized to Coordinated Universal Time
(UTC) (via a Global Positioning Service receiver, for example). Typical NTP configurations
utilize multiple redundant servers and diverse network paths in order to achieve high accu-
racy and reliability. Some configurations include cryptographic authentication to prevent acci-
dental or malicious protocol attacks.
It is important for networks to maintain accurate time synchronization between network
nodes. The standard timescale used by most nations of the world is based on a combination
of Universal Coordinated Time (UTC), (representing the Earth's rotation about its axis) and the
Gregorian Calendar (representing the Earth's rotation about the Sun). The UTC timescale is
disciplined with respect to International Atomic Time (TAI) by inserting leap seconds at inter-
vals of about 18 months. UTC time is disseminated by various means, including radio and
satellite navigation systems, telephone modems, and portable clocks.
Special purpose receivers are available for many time-dissemination services, including the
Global Position System (GPS) and other services operated by various national governments.
For reasons of cost and convenience, it is not possible to equip every computer with one of
these receivers. However, it is possible to equip some computers with these clocks, which
then act as primary time servers to synchronize a much larger number of secondary servers
and clients connected by a common network. In order to do this, a distributed network clock
synchronization protocol is required which can read a server clock, transmit the reading to
one or more clients, and adjust each client clock as required. Protocols that do this include
the Network Time Protocol (NTP).
Page 10-1
Stratum
Stratum is the term used to define the relative proximity of a node in a network to a time
source (such as a radio clock). Stratum 1 is the server connected to the time source itself. (In
most cases the time source and the stratum 1 server are in the same physical location.) An
NTP client or server connected to a stratum 1 source would be stratum 2. A client or server
connected to a stratum 2 machine would be stratum 3, and so on, as demonstrated in the
diagram below.
The farther away from stratum 1 a device is, the more likely there will be discrepancies or
errors in the time adjustments done by NTP. A list of stratum 1 and 2 sources available to the
public can be found on the Internet.
♦ Note ♦
It is not required that NTP be connected to an officially
recognized time source (for example, a radio clock).
NTP can use any time source to synchronize time in
the network.
Page 10-2
Time Source
(UTC)
Stratum 1
1a 1b
NTP Peer Association
Servers
Stratum 2
2a 2b
NTP Peer Association
Client/Servers
Stratum 3
3a 3b
NTP Peer Association
Clients
Servers 1a and 1b receive time information from, or synchronize with, a UTC time source
such as a radio clock. (In most cases, these servers would not be connected to the same UTC
source, though it is shown this way for simplicity.) Servers 1a and 1b become stratum 1 NTP
servers and are peered with each other, allowing them to check UTC time information against
each other. These machines support machines 2a and 2b as clients, and these clients are
synchronized to the higher stratum servers 1a and 1b.
Clients 2a and 2b are also peered with each other for time checks, and become stratum 2 NTP
servers for more clients (3a and 3b, which are also peered).
In this hierarchy, the stratum 1 servers synchronize to the most accurate time source avail-
able, then check the time information with peers at the same stratum. The stratum 2 machines
synchronize to the stratum 1 servers, but do not send time information to the stratum 1
machines. Machines 2a and 2b in turn provide time information to the stratum 3 machines.
It is important to consider the issue of robustness when selecting sources for time synchroni-
zation. It is suggested that at least three sources should be available, and at least one should
be “close” to you in terms of network topology. It is also suggested that each NTP client is
peered with at least three other same stratum clients, so that time information crosschecking
will be performed.
Page 10-3
When planning your network, it is helpful to use the following general rules:
• It is usually not a good idea to synchronize a local time server with a peer (in other words,
a server at the same stratum), unless the latter is receiving time updates from a source that
has a lower stratum then from where the former is receiving time updates. This minimizes
common points of failure.
• Peer associations should only be configured between servers at the same stratum level.
Higher Strata should configure lower Strata, not the reverse.
• It is inadvisable to configure time servers in a domain to a single time source. Doing so
invites common points of failure.
In a key file, the first token is the key number ID, the second is the key format, and the third
is the key itself. (The text following a “#” is not counted as part of the key, and is used
merely for description.) There are 4 key formats:
N Indicates a DES key written as a hex number, in NTP standard
format with the high order bit of each octet being the odd
parity bit.
M Indicates an MD5 key written as a 1 to 31 character ASCII string
with each character standing for a key octet.
A Indicates a DES key written as a 1 to 8 character string in 7-bit
ASCII format, where each character stands for a key octet
string.
S Indicates a DES key written as a hex number in the DES stan-
dard format, with the low order bit of each octet being the odd
parity bit.
For information on activating authentication, specifying the location of a key file, and config-
uring key IDs for switches, see the following sections:
• Configuring an NTP Client on page 10-6
• Configuring a New Peer Association on page 10-12
• Configuring a New Server on page 10-13
• Configuring a Broadcast Time Service on page 10-13
Page 10-4
Network Time Protocol Management Menu
Ntconfig. This command accesses the NTP configuration menu, which allows you to config-
ure this NTP device, add or remove peer associations, add an NTP server, configure this NTP
device’s broadcast time, and set or change this NTP device’s fudge factor. See NTP Configura-
tion Menu on page 10-6 for more information on the NTP configuration menu.
Ntinfo. This command accesses the NTP information menu, which allows you to view a list of
all peers for this NTP device, display a list of peers with summary information (in two differ-
ent formats), display detailed information for one or more peers, and display local server
information. See NTP Information Menu on page 10-15 for more information.
Ntstats. This command accesses the NTP statistics menu, which allows you to view the statis-
tics for the loop filter, peer memory usage, I/O subsystem, local server, event time subsystem,
packet counts, leap second state, clock status, monitoring routines data. See NTP Statistics
Menu on page 10-23 for more information.
Ntadmin. This command accesses the NTP administration menu, which allows you to set the
receive timeout, set an encryption delay, specify a remote NTP server, set a password and key
ID for this NTP device, set and clear a system flag, and restart the NTP software. See NTP
Administration Menu on page 10-33 for more information.
Ntaccess. This command accesses the NTP access control menu, which allows you to change
the authentication key ID for request and control messages, reinitalize the key ID list, add a
key ID to or remove a key ID from the trusted list, display the state of the authentication
code, create or remove restrict and add flags to an entry, view a servers restriction list,
remove a restriction entry from this NTP device, and configure, remove or view traps set in
the server. See NTP Access Control Menu on page 10-36 for more information.
Page 10-5
NTP Configuration Menu
Related Menus:
Ntconfig Ntinfo Ntstats Ntadmin Ntaccess
The main menu options are shown in the Related Menus list for quick access if you need to
change menus.
A switch can be configured to act as an NTP client, or an NTP client/server. An NTP client
receives updates from an NTP server without passing on time information to other clients,
while and NTP client/server receives time information from a server, and acts as a server for
other clients in a higher stratum.
1) Response timeout :0
2) Authentication delay : No
3) Authentication key file name : UNSET
4) NTP client mode : Ucast
5) Enable monitor : No
6) Enable NTP server : No
2. Adjust the configurable variables for this NTP client as needed by entering the line
number, and equal sign, and a new value at the system prompt, as shown:
<lineNumber>=<value>
For example, to change the Response timeout to 10, you would enter 1 (the line number
for Response timeout), an equal sign (=), and the number 10 (the new value), as shown:
1=10
After enabling NTP for this switch, you need to configure at least one peer association, unless
you will be supplying time synchronization. In that case, you need to configure a reference
clock.
For information on adding a peer association, see Configuring a New Peer Association on
page 10-12.
Page 10-6
NTP Configuration Menu
Field Descriptions
The following section describes the fields displayed using the ntpconfig command.
1) Response timeout
This field sets the timeout period for responses to server queries. Server queries come from
the server responsible for providing this client with NTP time information. The default is 8000
milliseconds.
2) Authentication delay
This field sets a specified time interval that is added to timestamps included in requests to the
server that required authentication. Typically this delay is needed in cases of long delay paths,
or of servers whose clocks are unsynchronized.
Enter the broadcast of multicast address at the prompt by typing line number 41, and equal
sign (=), and the IP address. For example, to specify a multicast address of 204.0.1.1, you
would enter the following:
41=204.0.1.1
5) Enable monitor
This field turns NTP monitoring on or off. Entering yes activates NTP monitoring, while enter-
ing no deactivates this function. The statistics for monitoring can be viewed using the ntpmon
command in the statistics menu. See NTP Statistics Menu on page 10-23 for more information.
Page 10-7
NTP Configuration Menu
1) Response timeout :0
2) Authentication delay : No
3) Authentication key file name : UNSET
4) NTP client mode : Ucast
5) Enable monitor : No
6) Enable NTP server : No
2. Adjust the configurable variables for this NTP client as needed by entering the line
number, and equal sign, and a new value at the system prompt, as shown:
<lineNumber>=<value>
For example, to change the Response timeout to 10, you would enter 1 (the line number
for Response timeout), an equal sign (=), and the number 10 (the new value), as shown:
1=10
3. Enable the NTP server by entering a 6, an equal sign (=), and yes at the prompt, as
shown:
6=yes
The NTP Startup Configuration menu expands to display new options. The menu now
appears similar to the following:
NTP Startup Configuration
1) Response timeout :0
2) Authentication delay : No
3) Authentication key file name : UNSET
4) NTP client mode : Ucast
5) Enable monitor : No
6) Enable NTP server : No
61) Client limit :3
62) Client limit period : 3600
63) Enable server authentication : No
64) Advertised precision : -7
65) Broadcast delay :0
4. Adjust the configurable variables for this NTP server as needed by entering the line
number, and equal sign, and a new value at the system prompt, as shown:
<lineNumber>=<value>
For example, to change the Client limit to 10, you would enter 61 (the line number for
Client limit), an equal sign (=), and the number 10 (the new value), as shown:
61=10
Page 10-8
NTP Configuration Menu
Field Descriptions
The following section describes the expanded menu options.
1) Response timeout :0
2) Authentication delay : No
3) Authentication key file name : UNSET
4) NTP client mode : Ucast
5) Enable monitor : No
6) Enable NTP server : No
Page 10-9
NTP Configuration Menu
2. Adjust the configurable variables for this NTP client as needed by entering the line
number, and equal sign, and a new value at the system prompt, as shown:
<lineNumber>=<value>
For example, to change the Response timeout to 10, you would enter 1 (the line number
for Response timeout), an equal sign (=), and the number 10 (the new value), as shown:
1=10
3. Enable authentication by entering a 3, and equal sign (=), and a key file name at the
prompt, as shown:
3=ntp.keys
The NTP Startup Configuration menu expands to display new options. The menu now
appears similar to the following:
NTP Startup Configuration
1) Response timeout :0
2) Authentication delay : No
3) Authentication key file name : ntp.keys
31) Configuration info authentication key :
32) Control request authentication key :
33) Configuration change authentication key :
4) NTP client mode : Ucast
5) Enable monitor : No
6) Enable NTP server : No
4. Adjust the configurable variables for authentication as needed by entering the line
number, and equal sign, and a new value at the system prompt, as shown:
<lineNumber>=<value>
For example, to change the Configuration info authentication key to 10, you would enter 1
(the line number for Configuration info authentication key), an equal sign (=), and the
number 10 (the new value), as shown:
1=10
Page 10-10
NTP Configuration Menu
Field Descriptions
The following section describes the expanded menu options.
Page 10-11
NTP Configuration Menu
where <address> is the either the domain name or IP address of the peer machine. The
optional configuration items are described below:
<keyId>. An unsigned 32-bit integer key identifier for encryption authentication. The
default is for no key ID.
The version of NTP being used. The options are versions 1, 2, or 3. If no
<version>.
number is entered, it is assumed that version 3 is being used.
<minpol>. The minimum poll interval for time checks to this peer. The number entered is
seconds raised to the power of 2.
prefer. An identifier that marks this peer as a preferred source of time information. In a
situation where multiple peers could provide time information to this client, the preferred
peer is the one that is used.
For example, to add a peer with an address of 1.1.1.1, a key identifier of 5, using version 3 of
NTP, minimum poll of 16 seconds, and marked as a preferred server, you would enter the
following:
ntpaddpeer 1.1.1.1 5 3 4 prefer
When you have finished press <return>. A brief message appears confirming the addition of a
new peer.
Page 10-12
NTP Configuration Menu
where <address> is the either the domain name or IP address of the server. The optional
configuration items are described below:
<keyId>. An unsigned 32-bit integer key identifier for encryption authentication. The
default is no key ID.
The version of NTP being used. The options are versions 1, 2, or 3. If no
<version>.
number is entered, it is assumed that version 3 is being used.
<minpol>. The minimum poll interval for time checks to this server. The number entered is
seconds raised to the power of 2.
prefer. An identifier that marks this peer as a preferred source of time information. In a
situation where multiple peers could provide time information to this client, the preferred
peer is the one that is used.
For example, to add a peer with an address of 1.1.1.1, a key identifier of 5, using version 3 of
NTP, with a poll time of 16, and marked as a preferred server, you would enter the following:
ntpaddpeer 1.1.1.1 5 3 4 prefer
When you have finished press <return>. A brief message appears confirming the addition of a
new server.
where <address> is the either the domain name or the broadcast or multicast address.
♦ Important Note ♦
A multicast address of 224.0.1.1 has been assigned to
NTP. Presently, this is the only address that should be
used for multicast messages.
Page 10-13
NTP Configuration Menu
For example, to add broadcast address 1.1.1.1 with a key identifier of 5, using version 3 of
NTP, and a minimum poll time of 16 seconds, you would enter the following:
ntpbcast 1.1.1.1 5 3 4
When you have finished press <return>. A brief message appears confirming the addition of a
new server.
where <address> is the either the domain name or IP address of the association. For exam-
ple, to remove a peer association with address 1.1.1.1, enter the following:
ntpunconfig 1.1.1.1
When you have finished press <return>. A brief message appears confirming the addition of a
new server.
You can remove multiple addresses at one time by adding additional addresses to the
command. For example, to remove a peer association with address 1.1.1.1 and a reference
clock association with address 1.1.1.2, enter:
ntpunconfig 1.1.1.1 1.1.1.2
When you have finished press <return>. A brief message appears confirming the removal of
the association.
where <interval> is the signed integer in seconds. This number must be between -4 and -20.
For example, to set the server’s advertised precision to -5, you would enter the following:
ntpprec -5
When you have finished press <return>. A brief message appears confirming the change of the
advertised precision.
♦ Note ♦
The determination of a server’s advertised precision in
based largely on the clock type used as the ultimate
time source (stratum 1).
Page 10-14
NTP Information Menu
Related Menus:
Ntconfig Ntinfo Ntstats Ntadmin Ntaccess
The main menu options are shown in the Related Menus list for quick access if you need to
change menus.
The list shows the mode this switch is using in relation to the association, and the address of
the remote association. The address is either a domain name or an IP address. The available
modes are as follows:
Symmetric Active (1) A host in this mode sends periodic messages regardless of the
reachability state of stratum of its peer. By operating in this
mode the host announces its willingness to synchronize and be
synchronized by the peer.
Symmetric Passive (2) This type of association is ordinarily created upon the arrival of
a message from a peer operating in the symmetric active mode
and persists only as long as the peer is reachable and operat-
ing at a stratum level less than or equal to the host; otherwise
the association is dissolved. The association will always persist
until at least one message has been sent in reply. By operating
in this mode the host announces its willingness to synchronize
and be synchronized by the peer.
Client (3) A host operating in this mode sends periodic messages regard-
less of the reachability state of stratum of its peer. By operating
in this mode the host, usually a LAN workstation, announces its
willingness to be synchronized, but not to synchronize the
peer.
Page 10-15
NTP Information Menu
♦ Note ♦
The mode of the switch in relation to the remote asso-
ciation is determined when you create the association.
See NTP Configuration Menu on page 10-6 for more
information on creating NTP associations.
The symbols at the very left of this table note the relationship (mode) of the switch to the
remote association. The section below is a key for interpreting these symbols:
+ The switch is in symmetric active mode.
- The switch is in symmetric passive mode.
= The switch is in client mode.
^ The switch is broadcasting to this address.
~ The switch is receiving broadcasts from this address.
* The switch is currently synchronizing with this address.
Page 10-16
NTP Information Menu
Field Descriptions
The following sections describe the fields displayed using the ntppeers command
Remote. The IP address of the remote association.
Local. The local interface address assigned by NTP to the remote association. If this address is
0.0.0.0, then the local address has yet to be determined.
St.The stratum level of the remote peer. If this number is 16, the remote peer has not been
synchronized.
Poll. The polling interval, in seconds.
Reach. The reachability register of the remote association, in octal format. This number is
determined by the NTP algorithm.
Delay. The currently estimated delay of this remote association, in seconds. This time is deter-
mined by the NTP algorithm.
Offset. The currently estimated offset of this remote association, in seconds. This time is deter-
mined by the NTP algorithm.
Disp. The currently estimated dispersion of this remote association, in seconds. This time is
determined by the NTP algorithm.
This table is identical to the ntppeers command except for the symbols displayed on the far
left side. A key for the symbols is provided below:
. Indicates that the remote association was cast aside during the false ticker
detection.
+ Indicates that the remote association was accepted and not discarded by
the false ticker detection.
* Indicates the remote association the switch is currently synchronizing with.
Page 10-17
NTP Information Menu
where <address> is the either the domain name or IP address of the remote association. For
example, to show information for a peer with IP address 1.1.1.4, enter:
ntpshowpeer 1.1.1.4
It is possible to display information from more than one remote association by adding more
addresses when entering the ntpshowpeer command. For example, to display information on a
peer with IP address 1.1.1.4 and a peer with IP address 1.1.1.5, enter:
ntpshowpeer 1.1.1.4 1.1.1.5
Field Descriptions
The following section describes the fields displayed using the ntpshowpeer command.
Remote. The IP address of the remote association.
Local. The local interface address assigned by NTP to the remote association. If this address is
0.0.0.0, then the local address has yet to be determined.
Hmode. The host mode of this remote association. There are five possible modes: symmetric
active, symmetric passive, client, server, and broadcast. The displayed mode is assumed if this
association becomes the switch’s host NTP server. For a description of the modes, see Display
List of Peers the Server Knows About on page 10-15. For a description of how to set a switch
host NTP server, see Specify the Host Whose NTP Server We Talk To on page 10-34.
Pmode. The peer mode of this remote association. There are five possible modes: symmetric
active, symmetric passive, client, server, and broadcast. The displayed mode is assumed if this
association becomes the switch’s host NTP server. For a description of the modes, see Display
List of Peers the Server Knows About on page 10-15. For a description of how to configure a
peer, see Configuring a New Peer Association on page 10-12
Stratum. The stratum level of the remote peer. If this number is 16, the remote peer has not
been synchronized.
Page 10-18
NTP Information Menu
Precision.The advertised precision of this association, which is a number from -4 to -20. For
information on setting the advertised precision, see Configuring an NTP Client on page 10-6
and Set the Server’s Advertised Precision on page 10-14.
Leap. The status of leap second insertion for this association. Leap seconds are seconds that
are added to the timestamp of an NTP entity to correct accumulated time errors. The possible
values are:
00 No warning.
01 Last minute has 61 seconds.
10 Last minute has 59 seconds.
11 Alarm condition (clock not synchronized).
Refid. This is a 32-bit code identifying the particular reference clock. In the case of stratum 0
(unspecified) or stratum 1 (primary reference source), this is a four-octet, left-justified, zero-
padded ASCII string. In the case of stratum 2 and greater (secondary reference) this is the
four-octet Internet address of the peer selected for synchronization.
Rootdistance. This is a signed fixed-point number indicating the total roundtrip delay to the
primary reference source at the root of the synchronization subnet, in seconds. Note that this
variable can take on both positive and negative values, depending on clock precision and
skew.
Rootdispersion. This is a signed fixed-point number indicating the maximum error relative to
the primary reference source at the root of the synchronization subnet, in seconds. Only posi-
tive values are possible.
Ppoll.The poll time for this association when it is a peer. This number is the minimum inter-
val between transmitted messages, in seconds as a power of two. For instance, a value of six
indicates a minimum interval of 64 seconds.
Hpoll.The poll time for this association when it is a host. This number is the minimum inter-
val between transmitted messages, in seconds as a power of two. For instance, a value of six
indicates a minimum interval of 64 seconds.
KeyID.This is an integer identifying the cryptographic key used to generate the message
authentication code.
Version. The version of NTP this association is using; the options are 1, 2, or 3.
Association. The number of seconds since this NTP entity was associated with the switch.
Valid.This is an integer counter indicating the valid samples remaining in the filter register. It
is used to determine the reachability state of an association, and when the poll interval should
be increased or decreased.
Reach. This is a shift register used to determine the reachability status of this peer. The NTP
algorithm uses this when determining timestamp information.
Unreach. The number of times this NTP entity was unreachable.
Flash. This field displays the number of error bits from the packet procedure.
Boffset. This field displays the default broadcast delay in seconds.
TTL/mode. This fields displays the Time-to-Live (TTL) time in seconds and the mode (unicast,
multicast, or broadcast) of NTP messages sent to a broadcast address. For information on
configuring an NTP broadcast address, see Configuring a Broadcast Time Service on page 10-
13.
Timer. Shows the number of seconds until the next NTP message is sent to an association.
Page 10-19
NTP Information Menu
Flags Config.This counter lists what flags have been configured for this NTP entity. For more
information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page
10-35.
Reference Time. This is the local time, in timestamp format, when the local clock was last
updated. If the local clock has never been synchronized, the value is zero.
Originate Timestamp.This is the local time, in timestamp format, of the peer when its last NTP
message was sent. If the peer becomes unreachable the value is set to zero.
Receive Timestamp. This is the local time, in timestamp format, when the latest NTP message
from the peer arrived. If the peer becomes unreachable the value is set to zero.
Transmit Timestamp. This is the local time, in timestamp format, when the last NTP message
was sent from this association.
Filter delay. NTP comes with various filter routines as part of the algorithm that determines
timestamp information. This field shows the delay in seconds the NTP algorithm uses to
correct for delays caused by messages traversing through the NTP filters.
Filter offset.
NTP comes with various filter routines as part of the algorithm that determines
timestamp information. This counter indicates the offset of the peer clock relative to the local
clock due to filters.
Filter order. The order in which NTP messages pass through filters.
Delay. The currently estimated delay of this remote association, in seconds. This number indi-
cates the roundtrip delay of the peer clock relative to the local clock over the network path
between them, in seconds. Note that this variable can take on both positive and negative
values, depending on clock precision and skew-error accumulation. This time is determined
by the NTP algorithm.
Offset. The currently estimated offset of this remote association, in seconds. This counter indi-
cates the offset of the peer clock relative to the local clock. This time is determined by the
NTP algorithm.
Disp. The currently estimated dispersion of this remote association, in seconds. This counter
indicates the maximum error of the peer clock relative to the local clock over the network
path between them, in seconds. Only positive values greater than zero are possible. This time
is determined by the NTP algorithm.
Page 10-20
NTP Information Menu
Field Descriptions
The following section explains the fields shown using the ntpinfo command.
System peer. The IP address of the switch.
System peer mode. The peer mode of this remote association. There are five possible modes:
symmetric active, symmetric passive, client, server, and broadcast. The displayed mode is
assumed if this association becomes the switch’s host NTP server. For a description of the
modes, see Display List of Peers the Server Knows About on page 10-15. For a description of
how to configure a peer, see Configuring a New Peer Association on page 10-12
Leap indicator. The status of leap second insertion for this association. Leap seconds are
seconds that are added to the timestamp of an NTP entity to correct accumulated time errors.
The possible values are:
00 No warning.
01 Last minute has 61 seconds.
10 Last minute has 59 seconds.
11 Alarm condition (clock not synchronized)
Stratum. The stratum level of the remote peer. If this number is 16, the remote peer has not
been synchronized.
Precision. The advertised precision of the switch. It will be a number between -4 and -20.
Root distance. This is a signed fixed-point number indicating the total roundtrip delay to the
primary reference source at the root of the synchronization subnet, in seconds. Note that this
variable can take on both positive and negative values, depending on clock precision and
skew.
Rootdispersion. This is a signed fixed-point number indicating the maximum error relative to
the primary reference source at the root of the synchronization subnet, in seconds. Only posi-
tive values are possible.
Reference ID. This is a 32-bit code identifying the particular reference clock. In the case of
stratum 0 (unspecified) or stratum 1 (primary reference source), this is a four-octet, left-justi-
fied, zero-padded ASCII string. In the case of stratum 2 and greater (secondary reference) this
is the four-octet Internet address of the peer selected for synchronization.
Page 10-21
NTP Information Menu
Reference time. This is the local time at which the local clock was last set or corrected.
System Flags.This counter lists what flags have been configured for this NTP entity. For more
information about setting flags, see Set a System Flag (Auth, Bclient, Monitor, Stats) on page
10-35.
Frequency. A number indicating the local clock’s frequency in relation to a reference clock’s
Pulse per Second (PPS). If the clock is running in perfect synchronization, this number should
be 1. Otherwise, it will be slightly lower or higher in order to compensate for the time differ-
ence.
Stability. The residual frequency error (in seconds) remaining after the system frequency
correction is applied.
Broadcastdelay. The broadcast delay, in seconds, of this association. For information on how
to set the broadcast delay, see Configuring a Broadcast Time Service on page 10-13.
Authdelay. The authentication delay, in seconds, of this association. For information on how to
set the authentication delay, see Set the Delay Added to Encryption Time Stamps on page 10-
33.
Page 10-22
NTP Statistics Menu
Related Menus:
Ntconfig Ntinfo Ntstats Ntadmin Ntaccess
The main menu options are shown in the Related Menus list for quick access if you need to
change menus.
Page 10-23
NTP Statistics Menu
Field Descriptions
The following section describes the fields displayed using the ntpstat command.
system uptime. The number of seconds the local NTP server has been associated with the
switch.
time since reset. The number of seconds since the last time the local NTP server was restarted.
bad stratum in packet. The number of NTP packets received that had a corrupted stratum bit in
the data of the packet.
old version packets. The number of NTP packets received that were of an older version of NTP
(either version 1 or 2).
new version packets. The number of NTP packets received that were version 3 of NTP.
unknown version number.
The number of NTP packets received for which the version was
unknown (most likely due to packet corruption).
bad packet length. The number of NTP packets received that did not fit the NTP packet struc-
ture (most likely due to packet corruption).
packets processed. The total number of NTP packets processed.
bad authentication. The number of NTP packets rejected because they did not meet authentica-
tion standards.
limitation rejects.
The number of NTP packets rejected because there were restrictions set on
their point of origin. For information on setting restrictions, see Create Restrict Entry/Add Flags
to Entry on page 10-39.
where <ipAddress> is the address of the peer for which you want to view statistics. For exam-
ple, to view statistics for a peer with IP address 131.218.18.4, enter the following:
ntppstat 131.216.18.4
Page 10-24
NTP Statistics Menu
Field Descriptions
The following section describes the fields displayed using the ntppstat command.
remote host. The IP address of the host whose statistics you are viewing.
local interface. The local interface address assigned by NTP to the remote association. If this
address is 0.0.0.0, then the local address has yet to be determined.
time last received. The number of seconds since the last NTP message packet was received
from another NTP entity in the network.
time until next send. The number of seconds until this NTP peer sends out an NTP message
packet.
reachability change. This field displays the number of times this client/server’s reachability has
changed.
packets sent. The number of NTP message packets this peer has sent out.
packets received. The number of NTP message packets this peer has received.
bad authentication. The number NTP message packets this peer has rejected due to failed
authentication.
bogus origin.The number of times a response packet from another NTP entity doesn’t match
the request packet sent out by this client/server.
duplicate. The number of identical NTP message packets this peer has received.
bad dispersion. The number of packets that were discarded due to overly large error disper-
sions.
bad reference time.
The number of packets that were discarded because the contained refer-
ence time didn’t match the local peer expectation.
candidate order. A number that represents this client/server’s synchronization order. A lower
number represents a reliable synchronization source.
Page 10-25
NTP Statistics Menu
Field Descriptions
The following section describes the fields displayed using the ntploop command.
offset. The currently estimated offset of this remote association, in seconds. This counter indi-
cates the offset of the peer clock relative to the local clock.
frequency. A number indicating the local clock’s frequency in relation to a reference clock’s
Pulse per Second (PPS). If the clock is running in perfect synchronization, this number should
be 1. Otherwise, it will be slightly lower or higher in order to compensate for the time
discrepancy between the reference clock and the local clock.
poll adjust. The number of times the poll time has been adjusted to conform to the network.
watchdog timer. The number of seconds since the local clock for this client/server was last
adjusted.
Field Descriptions
The following section describes the fields displayed using the ntpmem command.
time since reset. The number of seconds since the last reset of NTP (usually a reboot of the
switch).
total peer memory. The total number of NTP associations possible for this switch.
free peer memory. The number of available spots on this switch for NTP associations.
Page 10-26
NTP Statistics Menu
calls to findpeer.
The number of times the switch sent an NTP packet of any kind to a config-
ured NTP association.
new peer allocations. The number of new NTP associations created since the last restart.
peer demobilizations. The number NTP associations lost since the last restart.
hash table counts. The number of peer tables hashed to the index.
Field Descriptions
The following section describes the fields displayed using the ntpio command.
time since reset. The number of seconds since the last restart of NTP.
receive buffers. The number of switch receive buffers currently allocated by this NTP entity.
free receive buffers. The number of free receive buffers.
used receive buffers. The number of receive buffers being used.
low water refills. The number of times memory has been added.
dropped packets. The number of packets discarded due to lack of resources (i.e., memory).
ignored packets. The number of packets ignored by this client/server.
received packets. The total number of NTP packets received by the switch.
packets sent. The total number of NTP packets sent by the switch.
packets not sent.
The number of NTP packets generated but not sent due to restrictions. For
information on NTP restrictions, see Create Restrict Entry/Add Flags to Entry on page 10-39.
interrupts handled.The number of times NTP information was interrupted in the process of
transmitting or receiving.
received by int. The number of packets received by interrupts.
Page 10-27
NTP Statistics Menu
Field Descriptions
The following section describes the fields displayed using the ntptimer command.
time since reset. The number of seconds since the last reset of NTP.
alarms handled.The number of NTP alarms generated by this switch. NTP alarms occur when
the NTP algorithm determines that an NTP entity is out of synchronization.
alarm overruns. The number of times the NTP alarm routine was backed up.
calls to transmit. The number of requests from other NTP entities for information, either config-
uration, statistical, or timestamp.
• io
• sys
• mem
• timer
• auth
• allpeers
A brief message is displayed confirming the command.
where <address> is the either the domain name or IP address of the remote association. For
example, to reset statistics for a peer with IP address 1.1.1.4, enter:
ntppreset 1.1.1.4
Page 10-28
NTP Statistics Menu
It is possible to reset the statistics for more than one NTP association at a time by adding
more than one address to the command. For example, to reset statistics for a peer with IP
address 1.1.1.4 and a peer with IP address 1.1.1.5, you would enter:
ntppreset 1.1.1.4 1.1.1.5
Field Descriptions
The following section describes the fields displayed using the ntpctlstat command.
time since reset. The number of seconds since the last reset of NTP (usually a switch reboot).
requests received. The number of NTP requests received from any NTP association.
responses sent. The number of NTP messages sent from this switch in response to NTP associ-
ation requests.
fragments sent.The number of NTP messages sent from this switch that did not contain all
appropriate NTP data. This can occur if timestamp information from other NTP entities is
judged by this switch to be incorrect.
async messages sent. The number of async trap packets sent.
error msgs sent. The number of error messages sent from the switch to other NTP entities
because the switch was not able to respond to the NTP entity’s request.
total bad pkts. The total number of packets received that NTP was not able to read.
packet too short.The number of packets received that NTP rejected because the packet was
the incorrect length.
response on input.
The number of packets received that required the switch to respond to the
sender with an NTP message.
fragment on input.
The number of packets received that the switch that did not contain
complete NTP data.
error set on input. The number of input control packets received with the error bit set.
Page 10-29
NTP Statistics Menu
bad offset on input. The number of NTP timestamps received that the switch disallowed
because the added time offset parameter appeared to be incorrect. This can occur if an NTP
entity becomes unsynchronized and generates false timestamp information.
bad version packets.The number of packets received where the version number of NTP was
undefinable. This is usually caused by packet corruption.
data in pkt too short. The number of packets received that NTP rejected because the packet
information was incomplete.
unknown op codes. The number of NTP packets received that contained an unreadable request
or information. This is usually caused by packet corruption.
Field Descriptions
The following section describes the fields displayed using the ntpleap command.
sys.leap. The current status of the leap second monitor. There are four possible codes:
00 No warning.
01 Last minute has 61 seconds.
10 Last minute has 59 seconds.
11 Alarm condition (clock not synchronized)
leap.indicator. The number of leap seconds that occurred during the current day.
leap.warning. The number of leap seconds that will occur in the current month.
leap.bits. The number of leap bits set within the last hour.
time to next leap interrupt.
A leap interrupt occurs when the NTP algorithm examines the topol-
ogy of the network and determines if a leap second is needed (it may or may not be neces-
sary at the time of the interrupt). This counter displays seconds until the next interrupt.
date of next leap interrupt.
The time, in standard date notation, of the next leap interrupt after
the most current leap interrupt is finished.
calls to leap process. The number of times a leap second has been added or subtracted.
leap more than month away. A scheduled leap second insertion more than a month away.
Page 10-30
NTP Statistics Menu
leap less than month away. A scheduled leap second insertion less than a month away.
leap less than day away. A scheduled leap second insertion less than a day away.
leap in less than 2 hours. A scheduled leap second insertion less than two hours away.
leap happened. The date of the last leap second insertion.
where <on:off> is the status of the monitoring facility. For example, to turn the facility on,
enter:
ntpmon on
This table is useful in establishing which entity is associated with the switch, and if entities
have formed associations independent of administrator configuration (for example, if a user
sets up an association with NTP without notifying the network administrator).
Page 10-31
NTP Statistics Menu
Field Descriptions
The following section describes the fields displayed using the ntpmlist command.
remote address. The IP address of the remote association.
port.The port the association was learned on and on which the association communicates
with the switch.
♦ Note ♦
This is the TCP and UDP definition of a port, not a
switch interface port.
local address.The local interface address for this association as created by the NTP configura-
tion on the switch.
count. The number of NTP packets received from this association.
m. The mode the NTP associations uses in relation to the switch.
ver. The version of NTP the association is using (1,2, or 3)
drop. The number of NTP packets received from this association that were dropped (due to
restrictions, bad packet data, etc.).
last. The number of seconds since the last NTP message was received from this association.
first. The number of seconds since the first NTP message was received from this association.
Page 10-32
NTP Administration Menu
Related Menus:
Ntconfig Ntinfo Ntstats Ntadmin Ntaccess
The main menu options are shown in the Related Menus list for quick access if you need to
change menus.
where <value> is the number of milliseconds of the new timeout length. For example, to set
the timeout value to 3000 milliseconds, enter the following:
ntptimeo 3000
To view the current timeout setting with out changing it, enter the ntptimeo command with no
value. A message similar to the following is shown:
primary timeout is 6000 ms
where <value> is the number of milliseconds of the new delay time length. For example, to
set the delay value to 30 milliseconds, enter the following:
ntpdelay 30
To view the current delay setting with out changing it, enter the ntpdelay command with no
value. A message similar to the following is shown:
delay 30 ms
Page 10-33
NTP Administration Menu
where <address> is the either the domain name or IP address of the NTP server. For exam-
ple, to configure the switch to use an NTP server with an IP address of 1.1.1.4, enter:
ntphost 1.1.1.4
To view the current NTP server used by the switch, enter the ntphost command at the prompt
with no address. A message similar to the following is shown:
current host is 1.1.1.4
where <value> is the new key ID number. For example, to set the key ID to 2, you would
enter the following:
ntpkeyid 2
To view the currently configured key ID, enter the ntpkeyid command at the prompt and
press <return>. A message similar to the following is shown:
keyid is 2
Page 10-34
NTP Administration Menu
where <value> is either DES or MD5. For example, to set the key type to MD5, you would
enter:
ntpkeytype MD5
To view the currently specified key type, enter the ntpkeytype command at the system
prompt, and press <return>. A message similar to the following is displayed:
keytype is MD5
where <flag> is the type of flag the server will receive. There are six flag types that can be set:
auth This flag causes the server to synchronize with unconfigured
peers only if the peer has been correctly authenticated using a
trusted key and key identifier. The default for this flag is
disabled (off).
bclient This flag causes the server to listen for a message from a broad-
cast or multicast server, following which an association is auto-
matically instantiated for that server. The default for this flag is
disabled (off).
monitor This flag enables the monitoring facility. The default for this flag
is disabled (off).
stats This flag enables the statistics facility file generator. The default
for this flag is enable (on).
When you have finished specifying a flag, press <enter>. A brief message appears to confirm
the operation.
where <flag> is the type of flag the server will receive. There are six flag types that can be set
and removed. The flags are described in the section Set a System Flag (Auth, Bclient, Monitor,
Stats) on page 10-35.
Page 10-35
NTP Access Control Menu
Related Menus:
Ntconfig Ntinfo Ntstats Ntadmin Ntaccess
The main menu options are shown in the Related Menus list for quick access if you need to
change menus.
where <value> is the new key ID. Press <return>, and a brief message is displayed confirming
the operation.
♦ Note ♦
The authentication key ID must match in both the
switch sending the message and the switch receiving
the message.
Page 10-36
NTP Access Control Menu
where <value> is the new key ID. Press <return>, and a brief message is displayed confirming
the operation.
♦ Note ♦
The authentication key ID must match in both the
switch sending the message, and the switch receiving
the message.
where <value> is the new key ID to be added to the trusted list. For example, to add key ID 5
to the trusted list, enter the following:
ntpckey 5
♦ Note ♦
Adding a key ID using the ntpckey command adds the
key to the working version of the key file in the
switch’s RAM. If you reset the switch or re-initialize
NTP, the added key is lost.
Page 10-37
NTP Access Control Menu
where <value> is the new key ID to be remove from the trusted list. For example, to remove
key ID 5 from the trusted list, enter the following:
ntpdkey 5
♦ Note ♦
Removing a key ID using the ntpdkey command
removes the key from the working version of the key
file in the switch’s RAM. If you reset the switch or re-
initialize NTP, the removed key is reinstated.
Field Descriptions
The following sections explains the fields displayed using the ntpauth command.
time since reset. The number of seconds since the last restart of the switch.
key lookups. The number of times the switch has examined the key file to find a key.
keys not found. The number of times the switch failed to find a key in its key file.
uncached keys. The number of keys added to the key file using the ntpckey command.
encryptions.The number of times the switch sent NTP messages or information out in
encrypted form.
decryptions. The number of times the switch received NTP messages of information that was
encrypted, and successfully decrypted the information.
Page 10-38
NTP Access Control Menu
where <address> is the IP address of the NTP entity, <mask> is the entity’s subnet mask, and
<restriction> is the specific flag you want to place on the entity. For example to put an ignore
restriction on an entity with address 1.1.1.1 and a subnet mask of 255.255.0.0, enter the
following:
ntpcres 1.1.1.1 255.255.0.0 ignore
Page 10-39
NTP Access Control Menu
Field Descriptions
The following section describes the fields displayed with the ntpvres command.
address. The IP address of the NTP entity for which flags have been configured.
mask. The subnet mask of the NTP entity for which flags have been configured.
count. The number of NTP messages from the NTP entity that have been affected by the
configured flags.
flags. The flags configured for this NTP entity. For a description of all possible flags, see
Create Restrict Entry/Add Flags to Entry on page 10-39.
Page 10-40
NTP Access Control Menu
where <address> is the IP address of the NTP entity, <mask> is the entity’s subnet mask, and
<restriction> is the specific flag you want to remove from the entity. For example, to remove
an ignore restriction from an entity with address 1.1.1.1 and a subnet mask of 255.255.0.0,
enter the following:
ntpmres 1.1.1.1 255.255.0.0 ignore
where <address> is the IP address of the NTP entity, and <mask> is the entity’s subnet mask.
For example to remove an entity with address 1.1.1.1 and a subnet mask of 255.255.0.0, enter
the following:
ntpdres 1.1.1.1 255.255.0.0
This entity will no longer be listed in the restriction list and has no restriction flags placed on
messages it sends to the switch.
where address is the IP address of the switch. There are two optional items you can specify:
port The port on the switch used for sending NTP messages. If no
port is specified, a default port of 18447 is used.
♦ Note ♦
This is the TCP and UDP definition of a port, not a
switch interface port.
interface The local interface address for this NTP entity. If no interface is
specified, the interface for the local NTP entity is used. For
more information on interface addresses, see Display Peer
Summary Information on page 10-16.
Page 10-41
NTP Access Control Menu
Field Descriptions
The following section describes the fields shown with the ntpvtrap command.
address. The address of the server where the trap was set.
port. The port on which the server is listening for NTP messages.
♦ Note ♦
This is the TCP and UDP definition of a port, not a
switch interface port.
where address is the IP address of the switch. There are two optional items you can specify:
port The port on the switch used for sending NTP messages.
♦ Note ♦
This is the TCP/IP and UDP definition of a port, not a
switch interface port.
interface The local interface address for this NTP entity. For more infor-
mation on interface addresses, see Display Peer Summary Infor-
mation on page 10-16.
Page 10-42