User's Manual

3-9
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Chapter 3 Administering the WMIC
Managing the System Time and Date
Configuring NTP
WMICs do not have a hardware-supported clock, and they cannot function as an NTP master clock to
which peers synchronize themselves when an external NTP source is not available. These bridges also
have no hardware support for a calendar. As a result, the ntp update-calendar and the ntp master global
configuration commands are not available.
Default NTP Configuration
Table 3-2 shows the default NTP configuration.
NTP is disabled by default.
Configuring NTP Authentication
This procedure must be coordinated with the administrator of the NTP server; the information you
configure in this procedure must be matched by the servers used by the WMIC to synchronize its time
to the NTP server.
Beginning in privileged EXEC mode, follow these steps to authenticate the associations (communications
between devices running NTP that provide for accurate timekeeping) with other devices for security
purposes:
Table 3-2 Default NTP Configuration
Feature Default Setting
NTP authentication Disabled. No authentication key is specified.
NTP peer or server associations None configured.
NTP broadcast service Disabled; no interface sends or receives NTP broadcast packets.
NTP access restrictions No access control is specified.
NTP packet source IP address The source address is determined by the outgoing interface.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ntp authenticate Enable the NTP authentication feature, which is disabled by
default.
Step 3
ntp authentication-key number md5 value Define the authentication keys. By default, none are defined.
For number, specify a key number. The range is 1 to
4294967295.
md5 specifies that message authentication support is provided
by using the message digest algorithm 5 (MD5).
For value, enter an arbitrary string of up to eight characters for
the key.
The WMIC does not synchronize to a device unless both have one
of these authentication keys, and the key number is specified by the
ntp trusted-key key-number command.