Configuration Guide Contivity Secure IP Services Gateway

Size: px
Start display at page:

Download "Configuration Guide Contivity Secure IP Services Gateway"

Transcription

1 Contents Contents... 1 Overview... 1 NTP feature on Contivity... 5 Configuring NTP... 6 Configuration via GUI... 6 Configuration via CLI Event Log messages Checking the status of NTP Checking the status via GUI Checking the status via CLI Sample configuration Setup Configuring NTPS Configuring CES Testing the configuration Sample using authentication Configuring NTPS Configuring CES Testing the configuration Sample multicast NTP Configuring NTPS Configuring CES Testing the configuration Appendix. Sample NTP traces Initial packet to NTP server Server response NTP packet with authentication Broadcast/Multicast NTP packet Overview Network Time Protocol (NTP) is used to synchronize clocks of various devices across networks using a set of distributed clients and servers. NTP is evolved from the Time Protocol and the ICMP Timestamp message, and is specifically designed to maintain accuracy and robustness, even when used over typical Internet paths involving multiple gateways, highly dispersive delays and unreliable networks. CG March 2004 Page: 1 of 47

2 The intent of the service for which this protocol is designed is to connect a few primary reference clocks, synchronized by wire or radio to national standards, to centrally accessible resources such as gateways. These gateways would use NTP between them to cross-check the primary clocks and mitigate errors due to equipment or propagation failures. Some number of local-net hosts, serving as secondary reference clocks, would run NTP with one or more of these gateways. In order to reduce the protocol overhead, these hosts would redistribute time to the remaining local-net hosts (Figure 1). Primary NTP Server Primary NTP Server Secondary NTP Server Figure 1 In the normal configuration a subnetwork of primary and secondary clocks will assume a hierarchical organization with the more accurate clocks near the top and the less accurate below. NTP operates in a client/server mode. In the most common (asymmetrical) mode a client sends an NTP message to one or more servers and processes the replies as they are received. The server interchanges addresses and ports, fills in or overwrites certain fields in the message, recalculates the checksum and returns it immediately. Information included in the NTP message allows each client/server peer to determine the timekeeping characteristics of its other peers, including the expected accuracies of their clocks. Using this information each peer is able to select the best time from possibly several other clocks, update the local clock and estimate its accuracy. CG March 2004 Page: 2 of 47

3 The format of NTP packet (version 4) is depicted in Figure 2 with the explanation of each field followed: LI VN Mode Stratum Poll Precision Root Delay Root Dispersion Reference Identifier Reference Timestamp (64 bits) Originate Timestamp (64 bits) Receive Timestamp (64 bits) Transmit Timestamp (64 bits) Key Identifier (optional) (32 bits) Message Digest (optional) (128 bits) Figure 2 LI Leap Indicator two bit code warning of impending leap-second to be inserted at the end of the last day of the current month. Bits are coded as follows: 00 no warning second (following minute has 61 seconds) 10-1 second (following minute has 59 seconds) 11 reserved for future use VN Version Number, 3 bit integer indicating the NTP version. Mode 3 bit integer indicating the mode of operation with the values as follows: 0 reserved 1 symmetric active 2 symmetric passive 3 client 4 server 5 broadcast 6 reserved for NTP control message 7 reserved for private use In unicast client sets the mode to 3, server to 4. In multicast/broadcast the mode is set to 5 (broadcast). CG March 2004 Page: 3 of 47

4 Stratum 8 bit integer indicating the stratum level of the clock, with values defined as follows: 0 unspecified or unavailable 1 primary reference (for example, radio clock) 2-15 secondary reference reserved Poll poll interval, indicates the maximum interval between the successive messages in seconds to the nearest power of two. Precision 16 bit signed integer in the range +32 to -32 indicating the precision of the local clock, in seconds to the nearest power of two. Root Delay 32 bit fixed-point number indicating a total roundtrip delay to the primary reference source, in seconds. The variable could take both negative and positive values. Root Description 32 bit fixed-point number indicating the nominal error relative to the primary reference source in seconds. Reference Identifier 32 bit code identifying the particular reference clock. In the case of type 1 (primary reference), this is a string identifying the clock, for example: WWVB WWVB radio clock (60 KHz) GOES GOES satellite clock (468 MHz) WWV WWV radio clock (2.5/5/10/15/20 MHz) (and others as necessary) In the case of type 2 (secondary reference) this is the 32-bit Internet address of the reference host. In other cases this field is reserved for future use and should be set to zero. Reference Timestamp 64 bit local timestamp at which the local clock was last set or corrected. Originate Timestamp 64 bit local time at which the request departed the client host for the service host. Receive Timestamp 64 bit local time at which the request arrived at the service host. Transmit Timestamp 64 bit local time at which the reply departed the service host for the client host. Key Identifier and Message Digest optional fields; if NTP authentication is implemented, fields contain the message authentication code (MAC). CG March 2004 Page: 4 of 47

5 For sample NTP packets refer to the Appendix section of this document. For more information on NTP please consult the following RFCs: RFC 2030 SNTP version 4 RFC 1305 NTP version 3 RFC 1059 NTP version 1 RFC 958 NTP NTP feature on Contivity Contivity supports NTP protocol and acts as an NTP client to synchronize its clock to available NTP servers when the feature is enabled. NTP is disabled by default. Unicasts, multicasts or broadcasts could be used to synchronize the clock on Contivity. In unicast mode, Contivity (NTP client) sends periodic query messages to NTP server. The server responds by filling in the required information and returning the message to the client. By measuring the round-trip time and looking at the time stamp in the return message, Contivity computes the server time and correct local clock. Contivity could be configured to send unicast NTP messages to up to 8 NTP servers. In broadcast/multicast modes Contivity will listen for and respond to broadcast/multicast messages. Upon hearing a broadcast/multicast message for the first time, NTP measures the nominal network delay using a brief client/server exchange with the remote server, then enters the broadcast-client/multicast-client mode, in which it listens for and synchronizes to succeeding broadcast/multicast messages. In multicast-client mode, NTP will listen for multicast messages at the group address of the global network. IP multicast address for NTP is that assigned to Note that, in order to avoid accidental or malicious disruption in broadcast/multicast mode, both the client and servers should operate using authentication and the same trusted key and key identifier. NTP packets could be sent via private or public interface. MD5 authentication could be used to secure the synchronization. Contivity supports the optional authentication procedure specified in the RFC When a client/server association runs in authenticated mode, each packet transmitted has appended to it a 32-bit key ID and a 64/128-bit cryptographic checksum of the packet contents computed using Message Digest (MD5) algorithm. With MD5 the receiving peer re-computes the checksum and compares it with the one included in the packet. For this to work, the peers must share at least one MD5 key (Trusted Key) and, furthermore, must associate the shared key with the same key ID. NOTE: NTP uses UDP port 123 for both source and destination, so when NTP is required and firewall is used a care must be taken to allow NTP traffic in order for the NTP to operate successfully. CG March 2004 Page: 5 of 47

6 Configuring NTP NTP on Contivity could be configured via GUI or CLI. Configuration via GUI Navigate System Date & Time to configure NTP client on Contivity. The Date and Time screen appears. Click on the Configure Network Time Protocol link: CG March 2004 Page: 6 of 47

7 The Network Time Protocol screen appears: Check the box next to Enable to enable NTP feature on Contivity: To synchronize Contivity clock to NTP broadcast server, check the box next to Synchronize time with Broadcast Server, this will enable Contivity to listen to broadcast messages: To synchronize Contivity clock to NTP multicast server, check the box next to Synchronize time with Multicast Server, this will enable Contivity to listen to multicast messages: CG March 2004 Page: 7 of 47

8 To specify the NTP servers to be used for unicast click Add under the Servers section. By default no servers are defined: The Add/Edit Server screen appears: Enter an IP Address of NTP Server: Select from which interface the selected NTP server is accessible Private or Public: CG March 2004 Page: 8 of 47

9 If configured, select the Key ID to be used for this server from the drop down list. By default no Key ID is configured and thus no ID is listed: Select if the Bursting should be Enabled or Disabled (default value). When bursting is enabled a burst of 8 packets is sent instead of a usual one packet to speed up the synchronization process: Select the Version of the NTP protocol from the drop-down list, the choices are 1,2,3,4 or Default (Default value is equivalent to version 3): CG March 2004 Page: 9 of 47

10 Once all the appropriate parameters have been set, click OK to save the configuration or Cancel not to: The configured NTP unicast server is listed under the Servers section: CG March 2004 Page: 10 of 47

11 Once configured the NTP server parameters could be edited by clicking the Edit button next to the appropriate server: To delete the server click Delete next to the appropriate NTP server: The confirmation screen appears. Click OK to delete the NTP server definition or Cancel not to: CG March 2004 Page: 11 of 47

12 Another server could be added by clicking the Add button and specifying the appropriate parameters. Up to 8 servers could be added in this manner. Note: Once 8 servers have been added the Add button in the Servers section disappears and no more servers could be configured: Click Add under the Trusted Keys section if configuration requires the use of Trusted Keys for authentication: CG March 2004 Page: 12 of 47

13 The Add/Edit Trusted Key screen appears: Enter the Key ID to be used between Contivity and NTP server (a number between 0 and 65535): Enter and confirm the Password associated with the Key ID: Once the appropriate parameters have been entered click OK to save the configuration or Cancel not to: The configured Key ID is listed under the Trusted Keys section: CG March 2004 Page: 13 of 47

14 Once configured, Key ID could be edited or deleted by clicking the appropriate button next to the key. A new key could be added by clicking on the Add button in the Trusted Keys section. When deleting a confirmation screen appears. Click OK to delete the key or Cancel not to: Once all the appropriate parameters have been set click OK at the bottom of the page. To return to the Date and Time screen click on the Return to the Date and Time page link: CG March 2004 Page: 14 of 47

15 Note, once Contivity has been configured to use NTP the Date and Time sections are updated only via NTP and could not be changed through the Date and Time screen as long as NTP is enabled: Configuration via CLI To configure Contivity using CLI you need to either telnet to Contivity or connect to it through the serial interface -> option L on the menu. Enter the privileged mode: CES>enable Password: Enter configuration mode: CES#configure terminal Enter configuration commands, one per line. End with Ctrl/z. CES(config)# CG March 2004 Page: 15 of 47

16 To view all configuration commands for the NTP: CES(config)#ntp? authentication-key broadcast multicast server <cr> The authentication key for Network Time Protocol(NTP) Enables system to listen for and respond to NTP broadcast messages Enables system to listen for and respond to NTP multicast messages Adds a server To enable NTP client on Contivity: CES(config)#ntp To disable the NTP globally: CES(config)#no ntp To enable Contivity to listen to NTP broadcasts: CES(config)#ntp broadcast server To enable Contivity to listen to NTP multicasts: CES(config)#ntp multicast server To specify an NTP server (for example, ) accessible from the private interface (private source) without any key (key none) with disabled bursting and supported version 3: CES(config)#ntp server source private key none bursting disable version 3 To configure the authentication key for NTP with for example, 17 as the key number and, for example, the word secret as a password: CES(config)#ntp authentication-key 17 password secret Exit the configuration menu: CES(config)#exit CES# CG March 2004 Page: 16 of 47

17 Event Log messages The NTP has been globally enabled: 01/06/ :23:41 0 thttpd [33] NTPGlobal.Enable changed from 'FALSE' to 'TRUE' by user ' ' Changes have been applied to the configuration: 01/06/ :23:42 0 thttpd [33] NtpGlobal.ApplyChange changed from 'FALSE' to 'TRUE' by user ' ' NTP daemon version is : 01/06/ :23:42 0 NTP [12] ntpd Tue Feb 9 14:56: (0) NTP precision value used is microseconds: 01/06/ :23:42 0 NTP [11] precision = usec Contivity has been enabled to listen to broadcast messages: 01/06/ :27:21 0 thttpd [33] NTPGlobal.Broadcast changed from 'FALSE' to 'TRUE' by user ' ' Contivity has been enabled to listen to multicast messages: 01/06/ :29:45 0 thttpd [33] NTPGlobal.Multicast changed from 'FALSE' to 'TRUE' by user ' ' NTP daemon has been shut down due to re-initialization or disabling the NTP: 01/06/ :27:21 0 NTP [12] NTP shutdown... NTP server with the IP address of has been created: 01/06/ :32:12 0 thttpd [35] NtpServer[ ] created by user ' ' The default NTP version is used to contact the created server: 01/06/ :32:12 0 thttpd [33] NtpServer[ ].Version changed from '0' to '0' by user ' ' The NTP version has been changed to 2: 01/06/ :38:51 0 thttpd [33] NTPServer[ ].Version changed from '0' to '2' by user ' ' No authentication key has been configured for the server: 01/06/ :32:12 0 thttpd [33] NtpServer[ ].Authkey changed from '0' to '0' by user ' ' CG March 2004 Page: 17 of 47

18 No burst has been enabled: 01/06/ :32:12 0 thttpd [33] NtpServer[ ].Burst changed from 'FALSE' to 'FALSE' by user ' ' The burst has been enabled: 01/06/ :38:51 0 thttpd [33] NTPServer[ ].Burst changed from 'FALSE' to 'TRUE' by user ' ' The public interface will not be used to contact the server: 01/06/ :32:12 0 thttpd [33] NtpServer[ ].public changed from 'FALSE' to 'FALSE' by user ' ' The public interface will be used to contact the server: 01/06/ :38:51 0 thttpd [33] NTPserver[ ].public changed from 'FALSE' to 'TRUE' by user ' ' The default local interface will be used: 01/06/ :32:12 0 thttpd [33] NtpServer[ ].devloc changed from '0' to '0' by user ' ' 01/06/ :32:12 0 thttpd [33] NtpServer[ ].LocInterfaceIP changed from ' ' to ' ' by user ' ' NTP authentication key with ID 17 has been created: 01/06/ :36:14 0 thttpd [35] NtpAuthKey[17] created by user ' ' The password for the key has been set to test : 01/06/ :36:14 0 thttpd [33] NtpAuthKey[17].AuthKey changed from '' to 'test' by user ' ' The Key ID has been deleted: 01/06/ :38:05 0 thttpd [35] NTPAuthKey[17] destroyed by user ' ' The NTP has been globally disabled on Contivity: 01/06/ :42:10 0 thttpd [33] NTPGlobal.Enable changed from 'TRUE' to 'FALSE' by user ' ' The time has been adjusted: 01/06/ :42:53 0 NTP [12] time set s 01/06/ :42:53 0 NTP [11] Clock_Update :- clock step adjusted. Synchronization has been lost: 01/06/ :46:00 0 NTP [11] Clock_Select :- synchronization lost Clocks have been synchronized: 01/07/ :55:07 0 NTP [11] clock synchronized Contivity has received the request for clock adjustments and being a client and not a server drops the request: 01/07/ :20:06 0 NTP [00] drop active mode packet CG March 2004 Page: 18 of 47

19 Checking the status of NTP The status of the NTP could be verified via GUI or CLI. Checking the status via GUI Navigate Status Health Check to check the status of NTP. Scroll down to Network Time Protocol. The Status section shows the status of NTP and the Description section explains the meaning of the status. If everything is configured properly and there are no problems with NTP the OK status is displayed. The Network Time Protocol link in the More Information section leads to the NTP configuration screen: If there are problems or changes the warning is displayed with the explanation of the warning in the Description field. For example, when NTP has just been enabled but the clock has not been synchronized yet the following message appears: CG March 2004 Page: 19 of 47

20 The statistics for the NTP could be checked by navigating Status Statistics and clicking on NTP Stats button: CG March 2004 Page: 20 of 47

21 The Statistics NTP Stats screen appears showing the statistics for the NTP: Checking the status via CLI To view the status of NTP via CLI you need to either telnet into Contivity or connect to it through the serial interface -> option L on the menu. The statistics could be viewed in normal or privileged mode; the same commands apply for both modes. Enter the privileged mode: CES>enable Password: CG March 2004 Page: 21 of 47

22 To view the configuration for the NTP: CES#show ntp NTP: enable Synchronize time with Broadcast Server: enable Synchronize time with Multicast Server: enable Servers: Server IP Address Interface Private Key ID 0 Bursting Disabled Version 3 Authentication keys: 17 To view NTP associations: CES#show ntp associations NTP Servers: (* active server) remote local st poll reach delay offset disp ====================================================================== To view the current time and time source: CES#show clock detail 16:54:19 EST Wed Jan Time source is NTP CG March 2004 Page: 22 of 47

23 To view NTP statistics: CES#show status statistics system ntp-stats Date 01/08/2004 Time 14:09:27 NTP Servers: (* active server) remote local st poll reach delay offset disp ======================================================================= * NTP packet: Packet received: 9 Packet processed: 9 Packet sent: 21 Packet not sent: 0 Packet dropped: 0 Packet ignored: 0 Bad stratum: 0 Bad authentication: 0 Bad length: 0 Old version: 9 New version: 0 CG March 2004 Page: 23 of 47

24 Sample configuration Setup /24 CES NTPS CES, NTP client, management IP /24, private IP /24; NTPS Linux RedHat 9 with NTP daemon ntp installed, IP address /24 The goal of the configuration is to configure CES to use NTP to synchronize its clock with NTPS (NTP Server). Configuring NTPS This configuration assumes that ntpd software has been successfully installed on the Linux box. For the information on NTP daemon please consult the official NTP web site The root privileges are required for the configuration: $su Password: [root@linux user]# Configure the IP address for the Ethernet interface ( /24): [root@linux user]# /sbin/ifconfig eth netmask CG March 2004 Page: 24 of 47

25 To automatically assign the Ethernet interface the IP address at reboot, modify the /etc/sysconfig/network-scripts/ifcfg-eth0 file: more /etc/sysconfig/network-scripts/ifcfg-eth0 DEVICE=eth0 IPADDR= NETMASK= NETWORK= BROADCAST= ONBOOT=yes NAME=eth0 Make sure interface is properly configured: user]# /sbin/ifconfig a eth0 Link encap:ethernet HWaddr 00:50:56:42:81:C5 inet addr: Bcast: Mask: UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:552 errors:0 dropped:0 overruns:0 frame:0 TX packets:412 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:39756 (38.8 Kb) TX bytes:34087 (33.2 Kb) Interrupt:11 Base address:0x1080 lo Link encap:local Loopback inet addr: Mask: UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:12 errors:0 dropped:0 overruns:0 frame:0 TX packets:12 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:838 (838.0 b) TX bytes:838 (838.0 b) [root@linux user]# Modify the NTP configuration file to allow requests. By default all request are denied. Open the /etc/ntp.conf file for editing: [root@linux ntp]# vi /etc/ntp.conf Comment in the restrict default ignore parameter, uncommented this parameter ignores NTP requests: #restrict default ignore Comment in the authentication parameter as we are not using authentication in this example: #authenticate yes CG March 2004 Page: 25 of 47

26 Comment in the keys location parameter as we are not using keys in this example: #keys /etc/ntp/keys This would leave only the following parameters uncommented: restrict server # local clock fudge stratum 10 driftfile /etc/ntp/drift broadcastdelay Save the /etc/ntp.conf file. Verify the drift file contains the default drift value of 0.0: [root@linux ntp]# more /etc/ntp/drift 0.0 [root@linux ntp] Note: In this configuration Linux box is synchronized to itself, not to other NTP servers. Add the server for synchronization to the /etc/ntp.conf file to synchronize Linux box to it in the real life setup. Consult the default /etc/ntp.conf file and help available at for more information on NTP configuration file. Check the time on Linux machine: [root@linux ntp]# date Tue Jan 6 14:50:30 EST 2004 Set the correct time if necessary, for example to set the time to 15:08: [root@linux ntp]# date -s 1508 Tue Jan 6 15:08:00 EST 2004 Start the NTP daemon. There are several ways to start the NTP daemon. We will use the following: [root@linux ntp]# /etc/init.d/ntpd start Starting ntpd: [ OK ] CG March 2004 Page: 26 of 47

27 Configuring CES Configure the IP address ( /24) for the management and private ( /24) interfaces: CG March 2004 Page: 27 of 47

28 Navigate System Date & Time. Click on the Configure Network Time Protocol link: CG March 2004 Page: 28 of 47

29 The Network Time Protocol screen appears. Check the box next to Enable. Click Add under the Server section: CG March 2004 Page: 29 of 47

30 The Add/Edit Server appears. Enter the IP Address of the NTPS ( ), make sure the Private interface is selected as the NTPS is located on the private side in this example. Leave the Key ID to None, select Enable for the Bursting to speed up the synchronization and leave the Default value for the Version. Click OK to save the configuration: CG March 2004 Page: 30 of 47

31 The configured server is listed under the Servers section. Click OK at the bottom of the page. Follow the link at the bottom of the page to return to the Date and Time screen: CG March 2004 Page: 31 of 47

32 Note the Date and Time fields are not configurable at this point. Select the correct Time Zone the CES is located in, US Eastern in this example and click OK: At this point the configuration of the CES is complete. Testing the configuration Once both NTP server and NTP client has been configured, check the Health Check on CES. Navigate Status Health Check. Scroll to the Network Time Protocol and check the status. Note the warning next to the NTP as the clock has not been synchronized yet: CG March 2004 Page: 32 of 47

33 Check the date on CES: Check the date on NTPS: ntp]# date Tue Jan 6 15:36:18 EST 2004 Note the difference in dates. Wait for the synchronization to complete and check the dates again. Note: The process of synchronization and time adjustments may take several minutes to complete. Check the dates again: [root@linux ntp]# date Tue Jan 6 15:59:22 EST 2004 The time has been synchronized. Note: The difference in seconds in the example is due to latency in collecting the data only. Check the log on CES: 01/06/ :56:31 0 NTP [12] time set s 01/06/ :56:31 0 NTP [11] Clock_Update :- clock step adjusted. Once fully synchronized the following message appears in the log on CES: 01/07/ :58:07 0 NTP [11] clock synchronized CG March 2004 Page: 33 of 47

34 Check the status of the NTP on CES. Scroll down to the Network Time Protocol on the Status Health Check screen and verify the status is OK clock is synchronized: Sample using authentication The configuration is based on the previous example. Only the differences in the configuration will be pointed out. The goal of the configuration is to configure CES to synchronize its time to NTPS and use authentication. Configuring NTPS Configure NTPS to use authentication for the CES. For this to work, CES should be specified as a peer of NTPS and a key should be selected for the authentication. Open /etc/ntp.conf file in the editor. Let s say we decided to use key ID 77 (any number in range of will do) to authenticate CES. Adding the following line into the /etc/ntp.conf file will associate key ID 77 with peer (CES): peer key 77 The selected key will be trusted, so we ll add the following line into the NTP config file: trustedkey 77 Now we need to tell NTP daemon where it should look for a password associated with this Key ID, so we add the following line specifying the location of the keys file (/etc/ntp/keys in this example): keys /etc/ntp/keys CG March 2004 Page: 34 of 47

35 Save the /etc/ntp.conf file. The /etc/ntp.conf will now contain the following config: restrict server # local clock fudge stratum 10 driftfile /etc/ntp/drift broadcastdelay peer key 77 trustedkey 77 keys /etc/ntp/keys Modify the keys file to contain the password for the selected key. Open the keys file in text editor: [root@linux ntp]# vi /etc/ntp/keys Add the following line to keys file to associate password (test) with the key ID (77) and to use MD5 (M): 77 M test Save the /etc/ntp/keys file. Restart the NTP daemon: [root@linux ntp]# /etc/init.d/ntpd restart Shutting down ntpd: [ OK ] Starting ntpd: [ OK ] CG March 2004 Page: 35 of 47

36 Configuring CES Add a Trusted Key on the Network Time Protocol screen; click Add under the Trusted Keys section: Enter the Key ID (the same ID configured on NTPS, 77), Password (same password as on NTPS, test), confirm the password and click OK: CG March 2004 Page: 36 of 47

37 The configured key ID is displayed under the Trusted Keys section. Edit the configured NTP server, click Edit next to server: Select the configured Key ID (77) from the drop down box and click OK: CG March 2004 Page: 37 of 47

38 CES will use the configured Key ID for the authentication with NTPS: Testing the configuration Check the time on CES: CES#show clock 09:33:59 EST Thu Jan Check the time on NTPS: ntp]# date Thu Jan 8 09:38:08 EST 2004 Note: If the times are the same use the date command and shift the time a bit to note the synchronization, for example to set the time to 9:20 AM: [root@linux ntp]# date -s 0920 Thu Jan 8 09:20:08 EST 2004 Wait for the synchronization to complete and check the time again. Note: It may take several minutes for time to adjust. Check the log on CES: 01/08/ :40:43 0 NTP [12] time set s 01/08/ :40:43 0 NTP [11] Clock_Update :- clock step adjusted. 01/08/ :43:14 0 NTP [11] clock synchronized CG March 2004 Page: 38 of 47

39 Sample multicast NTP The configuration is based on previous example. Only the differences in the configuration will be noted. The goal of the configuration is to configure CES to adjust to multicast NTP server. Configuring NTPS Open /etc/ntf.conf file for editing: ntp]# vi /etc/ntp.conf Comment in the association between the peer and the key : #peer key 77 Enable NTP daemon to send multicast messages secured by key ID (key id 77 is used as in previous example) by adding the following line: broadcast key 77 Save the file. The file contains now the following config: restrict server # local clock fudge stratum 10 driftfile /etc/ntp/drift broadcastdelay broadcast key 77 trustedkey 77 keys /etc/ntp/keys We need to specify the routing for the multicast messages. So we tell Linux (NTPS) to use its Ethernet interface ( ) to send out the messages: [root@linux ntp]# /sbin/route add -net /4 gw Verify the routing table on NTPS: [root@linux ntp]# netstat -nr Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface U eth U lo UG eth0 CG March 2004 Page: 39 of 47

40 Restart the NTP daemon: ntp]# /etc/init.d/ntpd restart Shutting down ntpd: [ OK ] Starting ntpd: [ OK ] Configuring CES Delete the defined NTP server on the Network Time Protocol screen: CG March 2004 Page: 40 of 47

41 Once NTP server is deleted, check the box next to Synchronize time with Multicast Server box and click OK at the bottom of the screen: Testing the configuration Wait for the synchronization to complete and check the log on CES: 01/09/ :37:48 0 NTP [12] time set s 01/09/ :37:48 0 NTP [11] Clock_Update :- clock step adjusted. 01/09/ :42:42 0 NTP [11] clock synchronized CG March 2004 Page: 41 of 47

42 Check the statistics on NTP by navigating Status Statistics and clicking NTP stats button: NTP statistics is displayed, note the NTP sever is active: CG March 2004 Page: 42 of 47

43 Appendix. Sample NTP traces Initial packet to NTP server Below is a sample NTP trace of clock not synchronized condition. Note the NULL value for the Originate, Receive and Reference Time Stamps and client Mode (3), this indicates that this is an initial packet of synchronization: CG March 2004 Page: 43 of 47

44 Server response Below is a sample NTP trace of server answer to the client. Note the server Mode (4), no warnings in Leap indicator, the clock stratum is set to secondary reference (11). Note the Reference Clock ID ( as in the sample configuration NTP server was consulting its system clock for the synchronization), the clocks are updated: CG March 2004 Page: 44 of 47

45 NTP packet with authentication Below is a sample of NTP server packet with authentication section, note the presence of Key ID and Message Authentication Code parameters: CG March 2004 Page: 45 of 47

46 Broadcast/Multicast NTP packet Below is a trace for the NTP broadcast message sent by server. Note the broadcast Mode and broadcast address. The difference between broadcast and multicast packet is in the Destination Address field, compare to the snapshots below: CG March 2004 Page: 46 of 47

47 Sample multicast packet: Copyright 2005 Nortel Networks Limited - All Rights Reserved. Nortel, Nortel Networks, the Nortel logo, Globemark, and Contivity are trademarks of Nortel Networks Limited. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks Limited. To access more technical documentation, search our knowledge base, or open a service request online, please visit Nortel Networks Technical Support on the web at: If after following this guide you are still having problems, please ensure you have carried out the steps exactly as in this document. If problems still persist, please contact Nortel Networks Technical Support (contact information is available online at: We welcome you comments and suggestions on the quality and usefulness of this document. If you would like to leave a feedback please send your comments to: CRCONT@nortel.com Author: Kristina Senkova CG March 2004 Page: 47 of 47

BASIC TCP/IP NETWORKING

BASIC TCP/IP NETWORKING ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires

More information

Introduction to NetGUI

Introduction to NetGUI Computer Network Architectures gsyc-profes@gsyc.escet.urjc.es December 5, 2007 (cc) 2007. Algunos derechos reservados. Este trabajo se entrega bajo la licencia Creative Commons Attribution-ShareAlike.

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Linux TCP/IP Network Management

Linux TCP/IP Network Management Linux TCP/IP Network Management Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok, Thailand.

More information

Alteon Basic Firewall Load Balancing. Sample Configuration

Alteon Basic Firewall Load Balancing. Sample Configuration T e c h n i c a l T i p TT-0411406a -- Information -- 29-Nov-2004 Contents: Contents:...1 Introduction:...1 Associated Products:...1 Sample Configuration...2 Setup...2 Configuring PC...3 Configuring CES1...3

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015

Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - alvaro@nsrc.org Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands

More information

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

Ethernet Port Quick Start Manual

Ethernet Port Quick Start Manual Ethernet Port Quick Start Manual THIS MANUAL CONTAINS TECHNICAL INFORMATION FOR THE ETHERNET PORT OF EDI SIGNAL MONITORS with Ethernet Version 1.5 firmware. DETAILS OF THE ECCOM OPERATION ARE DESCRIBED

More information

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works.

This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Assalam-u-alaikum, This howto is also a bit old now. But I thought of uploading it in the howtos section, as it still works. Created : Mid 2007 Last updated: Mid 2007 The following link is very nice tutorial

More information

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch By Falko Timme Published: 2009-01-11 19:32 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With Perlbal/Heartbeat On Debian Etch Version 1.0 Author: Falko Timme

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

Ethernet Routing Switch 5000 Series Software Release 6.2.8

Ethernet Routing Switch 5000 Series Software Release 6.2.8 Ethernet Routing Switch 5000 Series Software Release 6.2.8 1. Release Summary Release Date: April 21, 2014 Purpose: Software patch release to address customer and internally found software issues. 2. Important

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Canopy Wireless Broadband Platform

Canopy Wireless Broadband Platform 1 Canopy Wireless Broadband Platform Frequently Asked Questions Software Ordering and License Fulfillment Process May 2007 CONTENTS GENERAL SOFTWARE ORDERING PROCESS...2 USING THE LICENSING PORTAL...5

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel This document describes the procedures required to configure an IPSec VPN tunnel between a WatchGuard SOHO or SOHO tc and a Check Point FireWall-1.

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

High Availability in Linux Firewalls using VRRP

High Availability in Linux Firewalls using VRRP Translated Document ( from Spanish original) High Availability in Linux Firewalls using VRRP Original by Sancho Lerena 15 Abril 2002 Translated by Ben Terry 10 June 2002. It is prohibited

More information

FortiManager - Secure DNS Guide VERSION 5.4.1

FortiManager - Secure DNS Guide VERSION 5.4.1 FortiManager - Secure DNS Guide VERSION 5.4.1 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

VoIP Laboratory B How to re flash an IP04

VoIP Laboratory B How to re flash an IP04 VoIP Laboratory B How to re flash an IP04 (cc) Creative Commons Share Alike Non Commercial Attribution 3 This lab guides you through the process of re flashing an IP04. To re flash a unit is useful when

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Accordingly, it is useful to explore alternative access strategies using simpler software appropriate for less stringent accuracy expectations.

Accordingly, it is useful to explore alternative access strategies using simpler software appropriate for less stringent accuracy expectations. 1. Introduction The Network Time Protocol (NTP) Version 3 specified in RFC-1305 [9] is widely used to synchronize computer clocks in the global Internet. It provides comprehensive mechanisms to access

More information

How To Install Openstack On Ubuntu 14.04 (Amd64)

How To Install Openstack On Ubuntu 14.04 (Amd64) Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Wireless LAN Apple Bonjour Deployment Guide

Wireless LAN Apple Bonjour Deployment Guide Wireless LAN Apple Bonjour Deployment Guide Document ID: 113443 Contents Introduction Prerequisites Requirements Components Used Conventions Deployment Considerations Configure the Controller to Support

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

FileCruiser. VA2600 SR1 Quick Configuration Guide

FileCruiser. VA2600 SR1 Quick Configuration Guide FileCruiser VA2600 SR1 Quick Configuration Guide Contents About this guide 1 Setup FileCruiser 2 Get IP address 2 Login to the Administration Portal 3 Basic configuration with Setup Wizard 4 Step 1: Configure

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

bigbluebutton Open Source Web Conferencing

bigbluebutton Open Source Web Conferencing bigbluebutton Open Source Web Conferencing My favorites Project Home Downloads Wiki Issues Source Search Current pages for BigBlueButtonVM Download and setup your own BigBlueButton 0.81 Virtual Machine

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

CELLTRACKS ANALYZER II. Networking Guide J40169EN

CELLTRACKS ANALYZER II. Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide J40169EN CELLTRACKS ANALYZER II Networking Guide LBL50902 2014-01-01 J40169EN Proprietary Notice This document discloses subject matter in which Janssen Diagnostics,

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

1.0 Basic Principles of TCP/IP Network Communications

1.0 Basic Principles of TCP/IP Network Communications Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems

More information

Cloud Storage Quick Start Guide

Cloud Storage Quick Start Guide Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

The basic mode for adjusting a time zone clock are primarily: 21, 24 and 51-1 (51-1 is for Alpha Characters) Entering Mode Programming

The basic mode for adjusting a time zone clock are primarily: 21, 24 and 51-1 (51-1 is for Alpha Characters) Entering Mode Programming Adjusting Time Zone Clocks The basic mode for adjusting a time zone clock are primarily: The basic mode for adjusting a time zone clock are primarily: 21, 24 and 51-1 (51-1 is for Alpha Characters) Mode

More information

Nortel VPN Router Software Release V6_05.300

Nortel VPN Router Software Release V6_05.300 Nortel VPN Router Software Release V6_05.300 1. Release Summary Release Date: November 10, 2008 Purpose: Software Maintenance release to address customer found software issues. 2. Important Notes Before

More information

Fireware How To Authentication

Fireware How To Authentication Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-10524-05 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,

More information

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console System s web management can also be accesses via WAN port as long as the administrator uses an IP address listed in Management IP Address List setting. If both WAN and LAN ports are unable to reach web

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER 3 CHAPTER This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: Information About NTP, page 3-1 Licensing Requirements

More information

Network Management Card. User Manual

Network Management Card. User Manual User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1

More information

Network Management and Debugging. Jing Zhou

Network Management and Debugging. Jing Zhou Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

NETWORK ADMINISTRATION

NETWORK ADMINISTRATION NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,

More information

GS510TP and GS110T Gigabit Smart Switches

GS510TP and GS110T Gigabit Smart Switches GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of

More information

Ruckus Wireless ZoneDirector Command Line Interface

Ruckus Wireless ZoneDirector Command Line Interface Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

HIGH AVAILABILITY (HA) WITH OPENSIPS

HIGH AVAILABILITY (HA) WITH OPENSIPS HIGH AVAILABILITY (HA) WITH OPENSIPS Setting up the HA Environment Norm Brandinger SIP Transport SIP is able to be transmitted using Multiple Protocols such as: UDP, TCP, or TCP with TLS (SSL) encryption

More information

Optimization in a Secure Windows Environment

Optimization in a Secure Windows Environment WHITE PAPER Optimization in a Secure Windows Environment A guide to the preparation, configuration and troubleshooting of Riverbed Steelhead appliances for Signed SMB and Encrypted MAPI September 2013

More information

3.7. Clock Synch hronisation

3.7. Clock Synch hronisation Chapter 3.7 Clock-Synchronisation hronisation 3.7. Clock Synch 1 Content Introduction Physical Clocks - How to measure time? - Synchronisation - Cristian s Algorithm - Berkeley Algorithm - NTP / SNTP -

More information

Ethernet Radio Configuration Guide

Ethernet Radio Configuration Guide Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834

More information

Configuring Infoblox DHCP

Configuring Infoblox DHCP Copyright 2008 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Chapter 5 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Flowlink Pro Server Software Installation Guide

Flowlink Pro Server Software Installation Guide Flowlink Pro Server Software Installation Guide Part #69-2543-274 ii Flowlink Pro Server Installation Guide COPYRIGHT 2006, 2014 Teledyne Isco, Inc. 4700 Superior St., Lincoln, Nebraska, U.S.A. 68504 Phone:

More information

SonicWALL Global Management System Configuration Guide Standard Edition

SonicWALL Global Management System Configuration Guide Standard Edition SonicWALL Global Management System Configuration Guide Standard Edition Version 2.3 Copyright Information 2002 SonicWALL, Inc. All rights reserved. Under copyright laws, this manual or the software described

More information

Asterisk SIP Trunk Settings - Vestalink

Asterisk SIP Trunk Settings - Vestalink Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing

More information

RF550VPN and RF560VPN

RF550VPN and RF560VPN RF550VPN and RF560VPN FQDN & DDNS Examples Reference Guide How-To: RF550VPN/RF560VPN FQDN & DDNS Examples Copyright 2003 This publication may not be reproduced, in whole or in part, without prior expressed

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

AlienVault. Unified Security Management 5.x Configuring a VPN Environment AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Local Caching Servers (LCS) February 2015

Local Caching Servers (LCS) February 2015 Local Caching Servers (LCS) February 2015 1.1 Chapter 1: Welcome to LCS The Kansas Interactive Testing Engine (KITE ) is used to deliver standardized tests via testing machines like desktop, laptop, and

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Nortel VPN Router Software Release V8_05.100

Nortel VPN Router Software Release V8_05.100 Nortel VPN Router Software Release V8_05.100 1. Release Summary Release Date: May 21, 2009 Purpose: Software Maintenance release to address customer found software issues. 2. Important Notes Before Upgrading

More information

Change Log. 2 per vices corporation

Change Log. 2 per vices corporation P E R V I C E S C O R P O R AT I O N C R I M S O N Q U I C K S TA R T G U I D E 2 per vices corporation Change Log 2015-01-06: Rev A: Initial Release 2015-01-12: Rev B: Added SFP+ configuration information.

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

NTP Configuration and Synchronization for Unified Wireless Network Devices

NTP Configuration and Synchronization for Unified Wireless Network Devices NTP Configuration and Synchronization for Unified Wireless Network Devices Document ID: 82471 Contents Introduction Prerequisites Requirements Components Used Conventions Daylight Savings Time NTP Configuration

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Digi Port Authority- Remote. Setup Guide 92000308_A

Digi Port Authority- Remote. Setup Guide 92000308_A Digi Port Authority- Remote Setup Guide 92000308_A Digi International Inc. 2002. All Rights Reserved The Digi logo is a trademark of Digi International Inc. All other brand and product names are the trademarks

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL

TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL w w w. c d v g r o u p. c o m CA-ETHR-A: TCP/IP Module Installation Manual Page Table of Contents Introduction...5 Hardware Components... 6 Technical Specifications...

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

Chapter 3 Using Access Control Lists (ACLs)

Chapter 3 Using Access Control Lists (ACLs) Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol

More information

Copyright and Trademarks. How to Use this Guide. Phone Adapter with Router

Copyright and Trademarks. How to Use this Guide. Phone Adapter with Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

More information

Time Synchronization & Timekeeping

Time Synchronization & Timekeeping 70072-0111-14 TECHNICAL NOTE 06/2009 Time Synchronization & Timekeeping Time synchronization lets you synchronize the internal clocks of all networked PowerLogic ION meters and devices. Once synchronized,

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information