Skip to content

ntp param

The following operations can be performed on "ntp param":

set| unset| show

set ntp param

p{white-space: pre-wrap;}

Modifies the values for NTP parameters on the Citrix ADC.

Synopsys

set ntp param [-authentication ( YES | NO )] [-trustedkey <positive_integer> ...] [-autokeyLogsec <positive_integer>] [-revokeLogsec <positive_integer>]

Arguments

authentication

Apply NTP authentication, which enables the NTP client (Citrix ADC) to verify that the server is in fact known and trusted.

Possible values: YES, NO

Default value: YES

trustedkey

Key identifiers that are trusted for server authentication with symmetric key cryptography in the keys file.

Minimum value: 1

Maximum value: 65534

autokeyLogsec

Autokey protocol requires the keys to be refreshed periodically. This parameter specifies the interval between regenerations of new session keys. In seconds, expressed as a power of 2.

Default value: 12

Minimum value: 0

Maximum value: 32

revokeLogsec

Interval between re-randomizations of the autokey seeds to prevent brute-force attacks on the autokey algorithms.

Default value: 16

Minimum value: 0

Maximum value: 32

unset ntp param

p{white-space: pre-wrap;}

Use this command to remove ntp param settings.Refer to the set ntp param command for meanings of the arguments.

Synopsys

unset ntp param [-authentication] [-trustedkey] [-autokeyLogsec] [-revokeLogsec]

show ntp param

p{white-space: pre-wrap;}

Displays information about the NTP parameters.

Synopsys

show ntp param

Outputs

authentication

Apply NTP authentication, which enables the NTP client (Citrix ADC) to verify that the server is in fact known and trusted.

trustedkey

Key identifiers that are trusted for server authentication with symmetric key cryptography in the keys file.

autokeyLogsec

Autokey protocol requires the keys to be refreshed periodically. This parameter specifies the interval between regenerations of new session keys. In seconds, expressed as a power of 2.

revokeLogsec

Interval between re-randomizations of the autokey seeds to prevent brute-force attacks on the autokey algorithms.