Sponsored Content
Full Discussion: NTP Configuration file
Operating Systems Linux Red Hat NTP Configuration file Post 302779339 by verdepollo on Tuesday 12th of March 2013 02:01:23 PM
Old 03-12-2013
"restrict" always expects an IP address (and optionally a netmask) and a flag. If no flags are specified it means there are no restrictions to the access you're providing (full access).

So, the first two lines means you are giving full unrestricted access to localhost with both IPv4 and IPv6 addresses.

The second line gives access to the whole subnet 192.168.1.0/24, with the exception of modifying the time (nomodify) or querying the ntpq subsystem (notrap) which is used in some cases to get logging information from the remote hosts; everything else is allowed.

Take a look at man ntp.conf for detailed info.

Last edited by verdepollo; 03-12-2013 at 03:29 PM..
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

ntp configuration

Hi all, I'm sure this question was asked before but I couldn't find what I was looking for in the 2 threads I found on here. Here's my question/problem: I have an isolated (no connection to outside world at all) Unix network. I want to have time sync between my other non-PC based system... (0 Replies)
Discussion started by: mariobernier
0 Replies

2. Solaris

ntp server and ntp client

All, How do you set a Solaris 9 server which received ntp updates from a ntp server to broadcast them on a local subnet. I have created a /etc/inet/ntp.conf file to receive the updates from a server on network and need to make this server become like a ntp relay from the main server. Any... (1 Reply)
Discussion started by: bubba112557
1 Replies

3. Shell Programming and Scripting

Extracting data from text file based on configuration set in config file

Hi , a:) i have configuration file with pattren <Range start no>,<Range end no>,<type of records to be extracted from the data file>,<name of the file to store output> eg: myfile.confg 9899000000,9899999999,DATA,b.dat 9899000000,9899999999,SMS,a.dat b:) Stucture of my data file is... (3 Replies)
Discussion started by: suparnbector
3 Replies

4. Red Hat

NTP Configuration on RHEL 5.4

Hi, I'm trying to configure NTP client, however it failes to sync correctly. Even after I manually set the time, once it connects with the NTP server, it pushes the time ahead by 4 hours. We have set an AIX host as NTP server. It works fine for other AIX hosts, however fails on RHEL 5.4 ... (4 Replies)
Discussion started by: max_min
4 Replies

5. Solaris

ntp server configuration

hi Please give me the configuration steps for NTP server. How do i sync other servers with this NTP server thanks to all (1 Reply)
Discussion started by: sijocg
1 Replies

6. Linux

How often does Linux NTP server update its time with the external NTP server?

All here, thank you for listening. Now I've set up a Linux NTP server by adding a external windows NTP server in /etc/ntp.conf. Then I start the ntpd daemon. But how often does the Linux NTP server update its time with the external NTP server? I've looked up everywhere but found no information... (1 Reply)
Discussion started by: MichaelLi
1 Replies

7. UNIX for Dummies Questions & Answers

NTP configuration issue..

hello Guys, I have an NTP problem on my SUN N240 server. External NTP server is being used for this box and when i run 'ntpq -p' i get connection refused message; ntpq -p ntpq: read: Connection refused Here this is the ntp.conf file: cat /etc/ntp.conf # BEGIN NTP SERVERS server... (6 Replies)
Discussion started by: dyavuzy1
6 Replies

8. HP-UX

Setting up NTP HP-UX clients from solaris NTP server

Hi I wonder if its possible to setup NTP clients running HP-UX o.s. from a solaris 10 NTP server? FR (3 Replies)
Discussion started by: fretagi
3 Replies

9. Solaris

ntp client configuration error

hi all ntp client side configuration file is done but in # ntpq -p remote refid st t when poll reach delay offset disp ============================================================================== ntpserver .INIT. 16 u - 64 0 0.00 0.000... (5 Replies)
Discussion started by: nikhil kasar
5 Replies

10. Red Hat

Ntp client sync with local over ntp server

Hi, I have two ntp servers in my cluster and I want all the nodes in my cluster to sync with either of the ntp servers or just one. Unfortunately it keep rotating the sync, between my ntp server 1, ntp server 2 and local. Is there anyway I can change the sync to avoid local? # ntpq -p ... (3 Replies)
Discussion started by: pjeedu2247
3 Replies
securenets(4)							   File Formats 						     securenets(4)

NAME
securenets - configuration file for NIS security SYNOPSIS
/var/yp/securenets DESCRIPTION
The /var/yp/securenets file defines the networks or hosts which are allowed access to information by the Network Information Service ("NIS"). The format of the file is as follows: o Lines beginning with the ``#'' character are treated as comments. o Otherwise, each line contains two fields separated by white space. The first field is a netmask, the second a network. o The netmask field may be either 255.255.255.255 (IPv4), ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff (IPv6) , or the string ``host'' indi- cating that the second field is a specific host to be allowed access. Both ypserv(1M) and ypxfrd(1M) use the /var/yp/securenets file. The file is read when the ypserv(1M) and ypxfrd(1M) daemons begin. If /var/yp/securenets is present, ypserv(1M) and ypxfrd(1M) respond only to IP addresses in the range given. In order for a change in the /var/yp/securenets file to take effect, you must kill and restart any active daemons using ypstop(1M) and ypstart(1M). An important thing to note for all the examples below is that the server must be allowed to access itself. You accomplish this either by the server being part of a subnet that is allowed to access the server, or by adding an individual entry, as the following: hosts 127.0.0.1 EXAMPLES
Example 1: Access for Individual Entries If individual machines are to be give access, the entry could be: 255.255.255.255 192.9.1.20 or host 192.0.1.20 Example 2: Access for a Class C Network If access is to be given to an entire class C network, the entry could be: 255.255.255.0 192.9.1.0 Example 3: Access for a Class B Network The entry for access to a class B network could be: 255.255.0.0 9.9.0.0 Example 4: Access for an Invidual IPv6 Address Similarly, to allow access for an individual IPv6 address: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff fec0::111:abba:ace0:fba5e:1 or host fec0::111:abba:ace0:fba5e:1 Example 5: Access for all IPv6 Addresses Starting with fe80 To allow access for all IPv6 addresses starting with fe80: ffff:: fe80:: FILES
/var/yp/securenets Configuration file for NIS security. SEE ALSO
ypserv(1M), ypstart(1M), ypstop(1M), ypxfrd(1M) NOTES
The Network Information Service (NIS) was formerly known as Sun Yellow Pages (YP). The functionality of the two remains the same; only the name has changed. The name Yellow Pages is a registered trademark in the United Kingdom of British Telecommunications plc, and may not be used without permission. SunOS 5.10 26 Apr 1999 securenets(4)
All times are GMT -4. The time now is 05:27 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy