NTP Authentication

ImageLesson 3: NTP Authentication

ImageLesson 3: NTP

ImageNTP Theory

Imagine that you are reviewing device logs collected in a router’s buffer and are attempting to correlate the events in the device logs with an issue that you are troubleshooting. To make that correlation, the logged events need to have accurate timestamps.

Although you could individually set the clock on each of your routers, those clocks might drift over time and not agree. ...

Get CCNP Routing and Switching ROUTE 300-101 Official Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.