- play_arrow Overview
- play_arrow Precision Time Protocol
- play_arrow Precision Time Protocol Overview
- play_arrow Precision Time Protocol Clocks
- PTP Boundary Clock Overview
- Example: Configure PTP Boundary Clock
- Example: Configure PTP Boundary Clock With Unicast Negotiation
- Configure PTP TimeTransmitter Clock
- Configure PTP TimeReceiver Clock
- Example: Configure Ordinary TimeReceiver Clock With Unicast-Negotiation
- Example: Configure Ordinary TimeReceiver Clock Without Unicast-Negotiation
- PTP Transparent Clocks
- Configure PTP Transparent Clock
- play_arrow Precision Time Protocol Profiles
- play_arrow PHY Timestamping
- play_arrow Precision Time Protocol over Ethernet
- PTP over Ethernet Overview
- Guidelines to Configure PTP over Ethernet
- Configure PTP Dynamic Ports for Ethernet Encapsulation
- Configure PTP Multicast TimeTransmitter and TimeReceiver Ports for Ethernet Encapsulation
- Example: Configure PTP over Ethernet for Multicast TimeTransmitter, TimeReceiver, and Dynamic Ports
- play_arrow Precision Time Protocol Additional Features
- Precision Time Protocol (PTP) over Link Aggregation Group (LAG)
- Precision Time Protocol (PTP) Trace Overview
- Line Card Redundancy for PTP
- Timing Defects and Event Management on Routing Platforms
- SNMP MIB for Timing on Routing Platforms
- PTP Passive Port Performance Monitoring on PTX10004 and PTX10008 Devices
-
- play_arrow Global Navigation Satellite System (GNSS)
- play_arrow GPS Systems on Routing Platforms
- play_arrow Integrated GNSS on Routing Platforms
- play_arrow GNSS Configuration for Routers Using External GNSS Receiver
- play_arrow Assisted Partial Timing Support (APTS) on Routing Platforms
-
- play_arrow Synchronous Ethernet
- play_arrow Synchronous Ethernet Overview
- play_arrow Synchronous Ethernet on 10-Gigabit Ethernet MIC
-
- play_arrow Clock Synchronization
- play_arrow Clock Synchronization Concepts
- play_arrow Clock Synchronization for ACX Series Routers
- play_arrow Clock Synchronization for MX Series Routers
- play_arrow Clock Synchronization for PTX Series Routers
- play_arrow Centralized Clocking
-
- play_arrow Hybrid Mode
- play_arrow Hybrid Mode Overview
- play_arrow Hybrid Mode and ESMC Quality-Level Mapping
- Configure Hybrid Mode and ESMC Quality-Level Mapping Overview
- Configure Hybrid Mode with Mapping of the PTP Clock Class to the ESMC Quality-Level
- Configure Hybrid Mode with a User-Defined Mapping of the PTP Clock Class to the ESMC Quality-Level
- Example: Configure Hybrid Mode and ESMC Quality-Level Mapping on ACX Series Router
- Example: Configure Hybrid Mode and ESMC Quality-Level Mapping on MX240 Router
-
- play_arrow Configuration Statements and Operational Commands
- play_arrow Appendix
Example: Configure NTP as a Single Time Source for Router and Switch Clock Synchronization
We strongly recommend using the Network Time Protocol (NTP) to synchronize the system clocks of routers, switches, and other network equipment. This topic lists a sample configuration.
Debugging and troubleshooting are much easier when the timestamps in the log files of all the routers or switches are synchronized, because events that span the network can be correlated with synchronous entries in multiple logs. We strongly recommend using the Network Time Protocol (NTP) to synchronize the system clocks of routers, switches, and other network equipment.
By default, NTP operates in an entirely unauthenticated manner. If a malicious attempt to influence the accuracy of a router or switch’s clock succeeds, it could have negative effects on system logging, make troubleshooting and intrusion detection more difficult, and impede other management functions.
The following sample configuration synchronizes all the routers or switches in the network to
a single time source. We recommend using authentication to make sure that the NTP peer is
trusted. The boot-server
statement identifies the server from which the
initial time of day and date is obtained when the router boots. The server
statement identifies the NTP server used for periodic time synchronization. The
source-address
statement enables you to specify one source address per
family for each routing instance, The authentication-key
statement specifies
that an HMAC-Message Digest 5 (MD5) scheme should be used to hash the key value for
authentication, which prevents the router or switch from synchronizing with an attacker’s host
posing as the time
server.
[edit] system { ntp { authentication-key 2 type md5 value "$ABC123"; # SECRET-DATA boot-server 10.1.4.1; server 10.1.4.2 key 2; source-address 10.1.4.3 routing-instance ntp-instance; trusted key 2; } }