NTP Authentication

ImageLesson 3: NTP Authentication

ImageLesson 3: NTP

ImageNTP Theory

Imagine that you are reviewing device logs collected in a router’s buffer and are attempting to correlate the events in the device logs with an issue that you are troubleshooting. To make that correlation, the logged events need to have accurate timestamps.

Although you could individually set the clock on each of your routers, those clocks might drift over time and not agree. ...

Get CCNP Routing and Switching ROUTE 300-101 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.