22 - Implementing Network Services Flashcards
__ is used to synchronize timekeeping among a set of distributed time servers and clients. __ uses UDP port __ as both source and destination, which in turn runs over IP
NTP, NTP, 123
An NTP client makes a __ with its server over its polling interval (_ to __ seconds) which dynamically changes over time depending on network conditions.
transaction, 64, 1024
It is not possible to adjust the NTP __ on a router.
poll interval
NTP can be configured to use __ messages instead. This reduces configuration complexity; however, the accuracy of timekeeping is marginally reduced because the flow is one way.
broadcast
NTPv4 is an extension of NTPv3 and provides the following capabilities
- Supports IPv6
- Security is improved
- Using specific multicast groups, NTPv4 can automatically calculate its time-distribution hierarchy through an entire network
- In NTPv4 for IPv6, IPv6 multicast messages instead of IPv4 broadcast messages are used to send and received clock updates
NTP uses the concept of a __ to describe how many NTP hops away a machine is from an authoritative time source.
stratum
NTP mode: provides accurate time information to clients
server
NTP mode: synchronises its time to the server
client
NTP mode: exchange time synchronisation information.
peer
NTP mode: Special “push” mode of NTP server.
broadcast/multicast
You can secure NTP operation by using __ and __.
authentication, access lists
Cisco devices support only __ authentication for NTP
MD5
To configure NTP authentication:
- Define the NTP authentication key with the ntp authentication-key command.
- Enable NTP authentication by using the ntp authenticate command
- Tell the device which keys are valid by using the ntp trusted-key command.
- Specify the NTP server that requires authentication by using the ntp server ip_address key key_number command
__ on the NTP server ensure that only authorised clients can synch with it. A lot of NTP synchronisation requests from the internet might overwhelm your NTP server devices. An attacker could use NTP queries to discover servers to which your device is synchronised and then, through an attack such as DNS cache poisoning, redirect your device to a system under its control.
access lists
How do you configure NTP to peer with only a specified IP address?
- Access-list 1 permit host 10.1.0.15
* Ntp access-group peer 1
How do you configure NTP to answer synch request from only 10.1.0.0/16 subnet devices?
- Access-list 1 permit 10.1.0.0 0.0.255.255
* Ntp access-group serve-only 1
Where can Cisco devices display syslog messages or be configured to capture them in a log?
- Console – by default, logging is enabled on the console port
- AUX and VTY ports – to receive syslog messages, type the terminal monitor command.
- Memory buffer – logging to memory logs message to an internal buffer. The buffer is circular in nature so new messages overwrite older messages after the buffer is filled. The buffer size can be change but to prevent router from running out of memory, do not make the buffer size too large. Use the logging buffered command. To display messages that are logged in the buffer, use the show logging command.
- Syslog server – to log system messages to a remote host, use the logging host command.
- Flash memory – Logging to buffer poses an issue when trying to capture debugs for an intermittent issue or during high traffic. When the buffer is full, older messages are overwritten. And when the device reboots, all messages are lost. Using persistent logging allows to write logged messages to files on the routers flash disk. To log messages to flash, use the logging persistent command.