Corrective Action

Enhanced PTP User Guide (UG1602)

Document ID
UG1602
Release Date
2022-10-18
Revision
1.0 English
  1. Use systemctl to identify the NTP configuration file being used by the NTP service:
    # systemctl status ntp
    ntp.service - Network Time Service
     Loaded: loaded (/lib/systemd/system/ntp.service; enabled; vendor preset: enabled)
     Active: active (running) since Fri 2019-03-22 12:28:10 GMT; 6min ago
     Docs: man:ntpd(8)
     Process: 14222 ExecStart=/usr/lib/ntp/ntp-systemd-wrapper (code=exited, status=0/SUCCESS)
     Main PID: 14230 (ntpd)
      Tasks: 2 (limit: 4915)
      CGroup: /system.slice/ntp.service
      14230 /usr/sbin/ntpd -p /var/run/ntpd.pid -g -c /run/ntp.conf.dhcp -u 107:113

    In the above example, the NTP service is using the /run/ntp.conf.dhcp configuration file.

  2. Edit the file to enable the required NTP authentication:
    keys <path the ntp keys file i.e. /etc/ntp/keys or /etc/ntp.keys>
    trustedkey <value>
    requestkey <value>
    enable mode7
    Note: There is no space between ‘mode’ and ‘7’. Ensure the keys file contains authentication values identical to those in the sfptpd config file.
  3. Restart the NTP service:
    # systemctl restart ntp
  4. Restart sfptpd.

    Always check the output in the sfptpd message_log and stats_log when sfptpd starts up, looking for any warning entries or error entries.