In peer mode, the two peers synchronize clocks with each other. One end can send the clock synchronization request message to the other and respond to the clock synchronization request message from the peer.
The system view is displayed.
The NTP authentication key is set.
Using the HMAC-SHA256 algorithm for NTP authentication is recommended.
The system automatically verifies the strength of an entered key. Only the key that meets the strength requirements can be configured. To disable key strength check, run the ntp authentication-password complexity-check disable command.
Disabling the key strength check function causes security risks. Therefore, you are advised not to run this command.
The source interface for sending NTP packets is specified.
If step 2 is performed, and source-interface is specified in both Step 2 and Step 3, use the source interface specified in Step 3 preferentially.
ip-address is the NTP peer IP address. It can be a host address, but not a broadcast address, a multicast address, or the IP address of the reference clock.
After the NTP peer is specified, the local router runs in symmetric active mode. The symmetric passive end does not need to be configured.
The configuration is committed.
The system view is displayed.
The NTP authentication key is set.
Using the HMAC-SHA256 algorithm for NTP authentication is recommended.
The system automatically verifies the strength of an entered key. Only the key that meets the strength requirements can be configured. To disable key strength check, run the ntp authentication-password complexity-check disable command.
Disabling the key strength check function causes security risks. Therefore, you are advised not to run this command.
The source interface for sending NTP packets is specified.
Commonly, specify the IP address of the NTP symmetric passive on the symmetric active. The symmetric active and symmetric passive can then exchange NTP packets using this IP address.
The configuration is committed.