Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
2-141
Configuring the ProCurve Wireless Edge Services xl Module
Enabling Secure Network Time Protocol (NTP)
Several organizations on the Internet offer NTP servers at stratums 1
through 3. Some require you to purchase the service, and others grant it for
free. You can configure your Wireless Edge Services xl Module to communi-
cate with one of these servers and then, acting as a server, pass the time on to
clients in your network.
When you configure your Wireless Edge Services xl Module to act as the
master clock, it uses its internal clock to set the time. In this case, you must
set this clock’s stratum. (See “Configuring Secure NTP Options” on page
2-144.)
Secure NTP Enhancements
Knowing the correct time is not only crucial for proper network functioning
but also for security. Most security protocols involve timestamps to prevent
replay attacks. If an attacker can tamper with your networks NTP implemen-
tation, then he or she may be able to circumvent protections built into
otherwise secure protocols. Secure NTP provides several mechanisms for
ensuring that devices receive the time from trusted sources:
ACLs—You can apply ACLs to control the sources from which the Wire-
less Edge Services xl Module accepts particular types of NTP messages.
Authentication—If you configure the module to require authentication,
it accepts the time only from neighbors that prove they are legitimate.
Neighbors authenticate their messages by adding a message authentica-
tion code that is generated using an encryption key. In addition to requir-
ing authentication, the module can authenticate to other NTP hosts.
Encryption for authentication comes in two varieties:
With symmetric keys—You manually set the same key on the mod-
ule and its neighbor or client. Each message exchanged includes a
message authentication code that is generated using this key.
With autokey—The Wireless Edge Services xl Module and the neigh-
bor or client use the public key infrastructure (PKI) algorithm to
automatically generate encryption keys.
The client sends the public key associated with its digital certificate
to the secure NTP server. The server uses a fast algorithm and a
private value to create a cookie, which it encrypts with the client’s
public key and returns to the client. Both the client and the server
then use the cookie to generate a list of keys for creating message
authentication codes.