Alcatel Carrier Internetworking Solutions Switch/Router ユーザーズマニュアル

ページ / 1100
NTP Access Control Menu
Page 12-38
Remove One or More Key ID's from the Trusted List
The trusted list in the key file is a list of all keys that are considered authentic and uncompro-
mised. Messages from an 
NTP
 entity using one of these keys are accepted and acted upon. It 
is possible to remove a key from the trusted list.
To remove a key ID from the trusted list, enter the 
ntpdkey
 command as shown:
ntpdkey <value>
where 
<value>
 is the new key 
ID
 to be remove from the trusted list. For example, to remove 
key 
ID
 5 from the trusted list, enter the following:
ntpdkey 5
A brief message is displayed confirming the operation. 
 Note 
Removing a key 
ID
 using the 
ntpdkey
 command 
removes the key from the working version of the key 
file in the switch’s 
RAM
. If you reset the switch or re-
initialize 
NTP
, the removed key is reinstated.
Display the State of the Authentication Code
The 
ntpauth
 command allows you to look at the statistics of the authentication routine. These 
statistics consist of counters for various functions of the authentication code.
To view the statistics of the authentication code, enter the 
ntpauth
 command at the system 
prompt. A screen similar to the following is shown:
time since reset:
0
key lookups:
0
keys not found:
0
uncached keys:
0
encryptions:
0
decryptions:
0
Field Descriptions
The following sections explains the fields displayed using the 
ntpauth
 command.
time since reset
. The number of seconds since the last restart of the switch.
key lookups
. The number of times the switch has examined the key file to find a key.
keys not found
. The number of times the switch failed to find a key in its key file.
uncached keys
. The number of keys added to the key file using the 
ntpckey
 command.
encryptions
. The number of times the switch sent 
NTP
 messages or information out in 
encrypted form.
decryptions
. The number of times the switch received 
NTP
 messages of information that was 
encrypted, and successfully decrypted the information.