About System Settings : About date and time settings
  
About date and time settings
System date and time settings are under Settings > System Settings: Date and Time.
You can either set the system date and time by entering it manually or assigning an NTP server to the Core.
Time Zone
Specifies a time zone from the drop-down list. The default value is GMT. If you change the time zone, log messages retain the previous time zone until you reboot.
Change Date
Specifies the date in this format: yyyy/mm/dd
Change Time
Specifies military time in this format: hh:mm:ss
To use Network Time Protocol (NTP) time synchronization, click Use NTP Time Synchronization. As a best practice, configure your own internal NTP servers; however, you can use the Riverbed-provided NTP server and public NTP servers. The hard-coded IP address that is preconfigured into every Core is 208.70.196.25. This IP address and the public NTP servers are enabled by default and appear in the requested NTP server list.
Current NTP server status
NTP server state information appears in these server tables:
Requested NTP server table
Displays all of the configured NTP server addresses.
Connected NTP server table
Displays all of the servers to which the Core is actually connected.
This information appears after an NTP server name:
Authentication information; unauthenticated appears after the server name when it is not using authentication.
When the system has no NTP information about the current server, nothing appears.
NTP servers
By default, the Core uses the Riverbed-provided NTP server IP address 208.70.196.25 and these public NTP servers:
0.riverbed.pool.ntp.org
1.riverbed.pool.ntp.org
2.riverbed.pool.ntp.org
3.riverbed.pool.ntp.org
We recommend synchronizing the Core to an NTP server of your choice.
Hostname or IP Address
Specifies the hostname or IP address for the NTP server. You can connect to an NTP public server pool. For example, 0.riverbed.pool.ntp.org. When you add an NTP server pool, the server is selected from a pool of time servers.
Version
Selects the NTP server version from the drop-down list: 3 or 4.
Enabled/Disabled
Specifies Enabled from the drop-down list to connect to the NTP server, or specifies Disabled to disconnect from the NTP server.
Key ID
Specifies the MD5 or SH1 key identifier to use to authenticate the NTP server. The valid range is from 1 to 65534. The key ID must appear on the trusted keys list.
NTP authentication
NTP authentication verifies the identity of the NTP server sending timing information to the Core. RiOS 8.5 and later support MD5-based Message-Digest Algorithm symmetric keys and Secure Hash Algorithm (SHA1) for NTP authentication. MD5 is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. SHA1 is a set of related cryptographic hash functions. SHA1 is considered to be the successor to MD5.
NTP authentication is optional.
Configuring NTP authentication involves these tasks that you can perform in any order:
Configure a key ID and a secret pair.
Configure the key type.
Configure the NTP server with the key ID.
NTP authentication keys
NTP authentication uses a key and a shared secret to verify the identity of the NTP server sending timing information to the Core. The Core encrypts the shared secret text using MD5 or SHA1, and uses the authentication key to access the secret.
Add a New NTP Authentication Key
Displays the controls to add an authentication key to the key list. Both trusted and untrusted keys appear on the list.
Key ID
Specifies the secret MD5 or SHA1 key identifier for the NTP server. The valid range is from 1 to 65534.
Key Type
Specifies the authentication key type: MD5 or SHA1.
Secret
Specifies the shared secret. You must configure the same shared secret for both the NTP server and the NTP client.
The MD5 shared secret:
is limited to 16 alphanumeric characters or less, or exactly 40 characters hexadecimal.
can’t include spaces or pound signs (#).
can’t be empty.
is case sensitive.
The SHA1 shared secret:
is limited to exactly 40 characters hexadecimal.
can’t include spaces or pound signs (#).
can’t be empty.
is case sensitive.
The secret appears in the key list as its MD5 or SHA1 hash value.
NTP key information
NTP keys appear in a list that includes the key ID, type, secret (displays as the MD5 or SHA1 hash value), and whether the system trusts the key for authentication.
You can only remove a key from the trust list using the CLI command ntp authentication trustedkeys.