1.3.1 NTP Authentication

Information

This sequence describes configuring NTP authentication.

Many secure protocols and auditing functions rely on system times being synchronized with a reliable time source, either within or (where security considerations permit) external to the managed network. Network Time Protocol (NTP) is used to synchronize clocks on networked devices, ensuring consistent timestamps for various applications. This is crucial for tasks like accurate logging, security analysis, and reliable operation of distributed systems.

Solution

switch(config)# ntp authentication
switch(config)# ntp authentication-key 1 md5 <ntpauthkey>
switch(config)# ntp server 10.10.10.10 prefer
switch(config)# ntp vrf mgmt

Impact:

NTP authentication support allows the NTP client to verify that servers are in fact known and trusted and not intruders intending accidentally or intentionally to masquerade as a legitimate server.

See Also

https://workbench.cisecurity.org/benchmarks/24202

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SA-15, 800-53|SC-8, 800-53|SC-8(1), 800-53|SC-28, 800-53|SC-28(1), CSCv7|16.4, CSCv7|16.5, CSCv7|18.5

Plugin: ArubaOS

Control ID: 750d1e15550738e78afffece6706d8b96cab52da4887ec5686882b3cf0127066