Symmetricom S100 Users Manual S100v1.3
S100 to the manual 8e63e1d7-8b78-4dc2-a6b5-f6829605674f
2015-02-02
: Symmetricom Symmetricom-S100-Users-Manual-490663 symmetricom-s100-users-manual-490663 symmetricom pdf
Open the PDF directly: View PDF .
Page Count: 166
Download | |
Open PDF In Browser | View PDF |
Chapter 1 S100 User Guide SyncServer S100 User Guide Installation, Configuration, and Operation for the SyncServer S100 - OS Version 1.3 Part #: S100 User Guide, Rev. D, June 2005 1 2 S100 User Guide – Rev. D – June 2005 Table of Contents 1 Chapter 1 Introduction and Overview 1 Conventions Used 2 Product Details 3 Time Standards 3 Global Positioning System (GPS) 3 Stratum Levels 4 Time Synchronization and Business 4 How the S100 Solves the Problem 5 National Measurement Institutes 5 Special Safety Instructions Lithium Battery Disposal Instructions Electrical Safety Instructions 6 6 6 2 3 Chapter 2 S100 Technology 7 Overview S100 Product Overview Sources of Time On the Network Web-based Access 7 7 7 7 8 Time Distribution Model 9 5 How the S100 Works 9 S100 and Time Distribution 10 S100 and Client Software 10 S100 and NTP v4’s Security Features 10 S100 and the Global Positioning System 11 Chapter 3 Installation and Configuration 13 Overview 13 Getting Up and Running 13 Unpacking Your S100 13 S100 User Guide – Rev. D – June 2005 i SyncServer S100 1 Your CD-ROM Using the Software PuTTY Folder Details PUTTY.EXE PSCP.EXE PSFTP.EXE PLINK.EXE PAGEANT.EXE PUTTYGEN.EXE 15 16 16 16 16 17 17 17 18 Installing Your S100 19 Rack Mounting 19 Primary Power Connection 19 Important Safety Instructions! 19 Making All Connections: An Overview 20 Setting Up the Hardware On the S100 Front Panel On the S100 Rear Panel 21 21 22 Installing the GPS Antenna Choosing an Antenna Location Installing the GPS antenna Connecting the Rubidium Option Establishing A Serial Connection 23 23 24 24 24 Setting Up the IP Address Testing Network Functionality Turning Off Your S100 26 28 29 How to Acquire Time Logging On Administrator Log-In Next Step 30 30 31 32 The Configuration Wizard Choose Your Time Source GPS NTP Configuring NTP IRIG-B (v.120,122,123) 32 33 35 42 45 45 Using SymmTime™ Installing SymmTime To Synchronize SymmTime: 49 49 51 Next: Use the Web-Based Interface 51 Chapter 4 The Web-Based Interface ii 53 Overview 53 Interface: Screen Reference 53 S100 User Guide – Rev. D – June 2005 Logging In 54 Administrative Interface 54 Admin Interface: Base Menu 55 Administrative Menu: Expanded 56 System Status 57 Timing Configuration 57 NTP Relationships NTP Time Source Test NTP Dialup NTP Restart NTP Status Advanced: ntp.conf Advanced: Keys/Certificates 58 60 60 61 61 63 64 Timing Engine Main Settings Timecode Settings 65 65 66 GPS Information GPS Health GPS Signal Strength GPS Time GPS Position 67 67 68 69 69 Other Information Engine Time Clock Settings Control Settings Model Information 70 70 70 71 72 Networking TCP/IP ifconfig Output Ping Traceroute 72 72 74 74 75 Administration Shutdown/Reboot Admin Users Restart Web Interface Time Zone System Log Configuration SNMP Configuration SNMP Edit Alarms 76 76 77 77 78 78 79 79 80 Configuration Wizard Logs NTP Log Boot Log System Log Config Log HTTP Log 80 81 81 82 82 83 83 Help 84 S100 User Guide – Rev. D – June 2005 1 2 3 5 iii SyncServer S100 SyncServer Help NTPD Help Search NTPD Manual 1 84 84 84 Logging Off 85 Chapter 5 Operations & Time-Protocols 87 S100: Operations and Time Protocols 87 Sysplex Timer 87 Time Protocol (RFC 868) 89 Daytime Protocol (RFC 867) 89 Simple Network Time Protocol (RFC 2030) 90 Network Time Protocol (RFC 1305) 90 NTP Authentication Authentication: NTP v3 Authentication: NTP v4 Autokey Public Domain NTP Package 93 93 94 94 Typical NTP Configuration Considerations 94 Other NTP Considerations Clients Basic NTP Configuration Peers Security 95 95 96 103 103 ACTS Interface: Dial-up ACTS Operation 103 104 SNMP (Simple Network Management Protocol) Version 1 105 Version 3 106 104 Chapter 6 Frequently Asked Questions 109 Questions 109 How can we obtain NTP client software to use with the S100? 109 What are the main differences between SNTP and NTP clients? 109 Is there a way to get GPS time instead of UTC time from the S100? 109 What outputs are available on the S100? 109 How does the S100 handle Leap Second? 110 What signal strengths are required by the S100 receiver to start tracking? 110 How do I check versions of the software in the S100? 110 What is the maximum number of computers that can be networked to the S100? 110 iv S100 User Guide – Rev. D – June 2005 How many satellites are necessary for me to operate the S100? 111 How do I know if the satellite signal strength is good? 111 What is the maximum antenna cable length for use with the S100? 111 What are the available antenna cable lengths and antenna requirements? 111 What are some guidelines for correctly cutting the cable, using splitters, and using cable connectors? 111 How many NTP requests can be processed by the S100 each second? 112 Does the S100 support NTP v4? 112 Can the S100 utilize a certificate from an external CA? 112 How is the interface to the S100 secured? 112 What security functions are provided with the S100? 112 Does the S100 support any functions to restrict user access to NTP service? Can the S100 set up clients' IP address to be connected? 112 What is the bandwidth utilization (TCP/IP) each time an NTP client gets a time update from the NTP server? 112 Is NTP v4 compatible with Network Address Translation (NAT) gateways? 113 How does the S100 clock behave when a leap second is introduced? 113 2 3 How-to’s and Tips 113 How to install NTP v4 on a UNIX system 114 How to configure an NTP v4 client to connect to an NTP v4 server with the autokey scheme 114 How to verify NTP v4 autokey client connectivity with an NTP v4 server 114 How to install your S100 114 How to get time using dial-up 114 How to get time using GPS 114 How to install your GPS antenna 115 How to acquire and install SymmTime™ 115 Use the quick “How to” guide 115 How to change the root password 115 How to get information about NTP 116 Solutions 116 The S100 does not respond to ping command 116 The S100 does not respond to NTP queries 116 I cannot establish a serial connection with the S100 116 My S100 won’t track satellites 117 5 Appendix A S100 Specifications S100 Data Sheet Specifications Pin Descriptions S100 User Guide – Rev. D – June 2005 119 119 120 v 1 SyncServer S100 Appendix B 1 Time Glossary 121 Appendix D Customer Assistance 137 US Assistance Center Customer Service Technical Support 137 137 137 EMEA Assistance Center Customer Service Technical Support 137 138 138 Appendix C Appendix E vi Antenna Replacement 141 Index 143 S100 User Guide – Rev. D – June 2005 Chapter 1 1 Introduction and Overview The S100 provides computers and network devices secure synchronization to UTC time using Network Time Protocol (NTP). The S100 can use the Global Positioning System (GPS), NIST's Automated Computer Time Service (ACTS), or another NTP server as a time reference. 2 3 Figure 1-1: The S100 This User Guide describes the installation and operation of the S100. It is written for network administrators familiar with network configuration and operations. The chapters and appendices address topics including: • Installation, configuration, and operation • The User Interface 5 • How the S100 works • FAQ and Solutions Here are shortcuts to those sections that answer frequently-asked “how to” or “How do I...?” questions. How to... Go here for the answer Acquire time “How to Acquire Time” on page 30 Choose and configure your time source “Choose Your Time Source” on page 33 Determine the default User Name and Password “Setting Up the IP Address” on page 26 Get Technical Support “Appendix D” on page 137 Get time from ACTS dial-up “Dialup Settings dialog” on page 38 Get time from GPS “GPS” on page 35 S100 User Guide – Rev. D – June 2005 1 SyncServer S100 1 How to... Go here for the answer Install the GPS antenna “Installing the GPS Antenna” on page 23 Install my S100 “Installing Your S100” on page 19 Install SymmTime “Installing SymmTime” on page 49 Learn how the S100 works “How the S100 Works” on page 9 Establish an IP address and other settings “Setting Up the IP Address” on page 26 Set up the optimal operating environment for my S100 “S100 Specifications” on page 119 Set up all hardware connections “Making All Connections: An Overview” on page 20 Synchronize SymmTime “To Synchronize SymmTime:” on page 51 Test for NTP functionality “Testing Network Functionality” on page 28 Use the web-based interface “The Web-Based Interface” on page 53 Conventions Used The most common conventions used here are: Table 1: Type Conventions Term Definition Bold Boldface type is used for menu and command names; field, tab, and button labels; and special terms. Courier The Courier typeface is used to designate file names, folder names, code, and URLs. The warning symbol alerts the user to information that if improperly used could be harmful to people, equipment, or data. 2 S100 User Guide – Rev. D – June 2005 Product Details 1 Details about the physical description and operating environment of the S100 are found in Appendix A, “S100 Specifications” on page 119 of this User Guide. Details about S100 operations are in “The Web-Based Interface” on page 53, as well as “Chapter 3” on page 13, and “Operations & Time-Protocols” on page 87. 2 Time Standards The international time standard is called Coordinated Universal Time or, more commonly, UTC. This standard was agreed upon in 1972 by worldwide representatives within the International Telecommunications Union; today, the Internet Engineering Task Force (IETF) sets standards based on the 1972 work. Today UTC is coordinated by the world’s International Bureau of Weights and Measures, or BIPM. (The designations “UTC” and “BIPM” were chosen as a compromise among all the countries’ abbreviations for the terms.) 3 The global availability and precision of UTC time makes it the ideal source of time for Time. The S100 uses UTC as its time standard. Global Positioning System (GPS) The U.S. Department of Defense Global Positioning System (GPS) is a constellation of approximately 29 satellites that orbit Earth twice a day. Their orbits are inclined 56 degrees to the equator. The GPS satellites signals are used by a GPS receiver to precisely determine its own position and time. 5 The orbits of these satellites and the offset (relative to international standard time, UTC) of their on-board Cesium atomic clocks is precisely tracked by the U.S. Air Force control network. Position and time correction information is uplinked from the ground control stations and maintained in the satellites in what are termed ephemeris tables, or tables of data that describe the satellite’s position when compared to specified coordinates. Each satellite transmission reports the satellite’s current position, GPS time, and the offset of the satellite’s clock relative to UTC, international standard time. The “S100 GPS” model uses GPS to obtain time. (The “S100 ACTS” model obtains time by dialing NIST's Automated Computer Time Service (ACTS).) S100 User Guide – Rev. D – June 2005 3 SyncServer S100 Stratum Levels 1 The Internet Engineering Task Force (IETF) established standards for Network Time Protocol (NTP) in IETF RFC 1305. These hold that the source of time for each server is defined by a number called its stratum. The highest level is 0; Stratum 0 devices, such as GPS or radio clocks, are connected to a primary time reference, such as the national atomic clock. Each level “away” from this primary time reference adds on another number. The Stratum of a primary server, which gets its time from the GPS system, for example, is assigned as 1. Devices that get their time from a Stratum 1 primary server through NTP are Stratum 2, Stratum 3, and so forth. A Stratum 2 or 3 server simultaneously acts as a client, deriving its time from an NTP process with a Stratum 1 (or 2) Server, and acts as a server for clients further down the hierarchy. Here is a summary: Table Intro-1: Stratum Levels: Summary Stratum Level Significance Stratum 0 Connected to a primary time reference, this device—usually a GPS or radio clock—is synchronized to national standard time. Stratum 1 A Stratum 1 time server derives time from a Stratum 0 time source Stratum 2...n A Stratum 2 (and so on) device derives its time from a Stratum 1 server, or other Stratum 2...n device from NTP. Obviously, the further away a network is from the primary source, the higher the possibility of time degradation because of variations in communication paths and the stability of the local clock. The S100 can be a Stratum 1 device, as well as Stratum 2 or 3. Time Synchronization and Business Reliable time synchronization is essential for doing business today. Ensuring that all components of a network are synchronized to the global UTC time standard is critical for accurate time stamps, operational logs, and security applications. Many complex data processing tasks are dependent upon precise event sequences and accurate time stamping of events. Not using a dedicated time server can give rise to the following problems: • Security risks: Users who retrieve time from an outside source, such as the Internet, are going outside your firewall. 4 S100 User Guide – Rev. D – June 2005 • Bandwidth consumption: Synchronizing the time over a WAN (wide area network) consumes expensive bandwidth and degrades time accuracy (versus synchronizing over a LAN). 1 • Lost time: If your network synchronization relies on a time reference outside your network, your network can be seriously compromised if the one connection to that outside time reference is lost. 2 How the S100 Solves the Problem The S100 provides your network with a single unbiased time reference based on one or more external time references. Should all external time references become unavailable, the S100 uses its own high-performance crystal oscillator to keep time. 3 The S100, using its internal GPS receiver, operates as a Stratum 1 time server, with accuracy to the nearest microsecond relative to UTC as maintained by the U.S. Naval Observatory, one of the National Measurement Institutes (NMIs) in the U.S. Time is distributed using the Network Time Protocol (NTP), and between multiple sites. The result is that with the S100, network users can get time from within your firewall. Full specifications are found in “S100 Specifications” on page 119. National Measurement Institutes The S100 synchronizes to UTC. This time standard is maintained by the International Bureau of Weights and Measures (BIPM). By international agreement, each country’s National Measurement Institute (NMI) maintains audit records of their synchronization with BIPM UTC, thus providing verifiable sources of UTC within their countries. NMI clocks are disciplined to be within nanoseconds of UTC time. 5 Country Name of NMI Abbreviation United States National Institute of Standards and Technology NIST France Laboratoire Primaire du Temps et des Fréquences LPTF United Kingdom National Physical Laboratory NPL Japan Communications Research Laboratory CRL S100 User Guide – Rev. D – June 2005 5 SyncServer S100 Special Safety Instructions 1 Lithium Battery Disposal Instructions Caution: Replace lithium battery only with one of the same type and ratings. Dispose of the battery in accordance with all local codes. Contact your local environmental control or disposal agency for details. Electrical Safety Instructions Caution: Do not install the modem (phone) cord during an electrical storm. Note: minimum 26AWG phone cord is recommended for added safety. Note: A minimum 26AWG phone cord is recommended for added safety. Note: POWER CORD SELECTION: If your unit is not provided with a power cord-set, purchase only a Certified cord-set suitable for your location (voltage source) with a minimum 6A current rating. 6 S100 User Guide – Rev. D – June 2005 Chapter 2 1 S100 Technology 2 3 Overview This chapter gives a review of the S100 technology. There is additional information in “S100 Specifications” on page 119. S100 Product Overview The S100 network time server synchronizes secure network time. The following sections describe this technology. 5 Sources of Time The S100 obtains time from GPS, ACTS, or another S100, and delivers it to computers and other devices on a network. It acquires UTC (Universal Coordinated Time) from GPS signals, or using ACTS dial-up to the National Institute of Standards and Technology (in the U.S.). If there are several S100s on your network, only a few S100s need acquire UTC directly. They can then distribute that time to other S100s. On the Network Clients on a network synchronize with a time source using NTP, the Network Time Protocol, to exchange packets of time. The S100 implements NTP Version 4. This prevents intruders from spoofing time packets and using NTP to gain access to your systems. Unlike previous versions, NTP Version 4 implements asymmetric encryption. This is the same technique used S100 User Guide – Rev. D – June 2005 7 SyncServer S100 by secure web sites to protect credit card numbers and other sensitive information from unintended interception. 1 The S100 also supports SNMP v1.8 and SNMP v3 (Simple Network Management Protocol) for easy integration into your existing management hierarchy. Web-based Access The S100 management is web-based. Using a standard browser, you can set up and configure an S100 from any point on the Internet. See Chapter 3 for more about this web access. There is a detailed section about this web-based interface in Chapter 4, “The Web-Based Interface” on page 53. 8 S100 User Guide – Rev. D – June 2005 Time Distribution Model Stratum 0 GPS Satellites or NMI Dial-Up Service Stratum 1 Network time distribution systems use a hierarchical time distribution model, as shown in this figure: Symmetricom SyncServer 2 Stratum 2 SyncServers or Computer Systems (NTP Clients) Stratum 3 3 Computer Systems (NTP Clients) Figure 2-1: The S100 in the Time Distribution Hierarchy 5 In hierarchical systems, primary time source clocks are Stratum 0 (zero), including GPS satellites, National Institute of Standards and Technology (NIST) ACTS dial-up service, or similar national time standards organizations. The S100 acts as a Stratum 1 time server that derives its time from GPS and distributes this time over a TCP/IP network using NTP. Stratum 2 NTP clients can distribute time to Stratum 3 computers. How the S100 Works The following describes how the S100 acquires and secures time. S100 User Guide – Rev. D – June 2005 9 1 SyncServer S100 More details are found in “Chapter 3” on page 13 and “The Web-Based Interface” on page 53. 1 S100 and Time Distribution Time is distributed over an IP network using Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Time Protocol, and Daytime Protocol over TCP/IP. S100s can be distributed throughout a LAN or intranet. Also, a single GPS antenna is all that is required to acquire UTC time for an array of S100s, making the network less vulnerable to damage or attack. (Note: The GPS antenna described in this manual has been replaced as described in “Appendix E” on page 141.) Once the S100 is locked with its time source, it will continuously provide time even if the timing signal is lost. If the GPS time signal is lost, the NTP message returned by the S100 will indicate—from the Reference Timestamp—when it last obtained time updates from the timing signal. The S100 maintains the year value as a four-digit number. The S100 maintains time as binary seconds and has no problem with leap-years and the introduction of leap seconds. S100 and Client Software Install NTP client software on the client machines in order to synchronize those clients with S100’s NTP server. Obtain the SymmTime™ NTP client for Windows at http://www.ntp-systems.com/ symmtime.asp. Details about installing SymmTime are found in “Installing SymmTime” on page 49. Unix/Linux clients can be synchronized using the public domain NTP daemon or equivalent NTP client software. If an NTP daemon is not available for your system, you can obtain a copy of RFC 1305 or 2030 from the Network Information Center (NIC) at http:// www.ietf.org/rfc/rfc1305.txt, in order to implement an NTP daemon for your system. S100 and NTP v4’s Security Features NTP is the de facto standard of communicating time in IP network environments. Developed at the University of Delaware in the United States, NTP is public domain software. It can provide time without opening the NTP port and exposing the firewall to possible intrusion. The S100 supports NTP v4 (Secure NTP), and can support NTP v2 and v3, as well. The S100 generates keys, which take the form of a file composed of random numerical sequences. These key files are recognized by the cryptographic authentication components of NTP. These keys are symmetric, or private (in NTP v3 and v4), and asymmetric or public or Autokey (NTP v4); Autokey protocol, therefore, can recognize the key files as well. The contents of the key files include the public/private key pair, a certificate request, a certificate, and Diffie-Hellman parameters. 10 S100 User Guide – Rev. D – June 2005 Digitally signed public certificates are required by the Autokey protocol. (See the interface at “Advanced: Keys/Certificates” on page 64.) All of this data goes into your certificate request (X.509) to a trusted Certificate Authority (CA). The CA can be an outside trust authority, such as VeriSign, or the device can certify itself. The S100 itself is “self-signed”, or shipped to you with an authenticated certificate. The S100 CA digitally signs (authenticates) the request and sends it back, along with the certificate, to the person requesting it. More details of the NTP protocol and synchronization techniques can be found in the Help file included with the interface, or at: • http://www.ntp.org • http://www.ietf.org/rfc/rfc1305.txt 2 S100 and the Global Positioning System The Global Positioning System (GPS) receiver in the S100 tracks GPS satellites as they pass overhead and determines the range of the satellite in relation to its antenna. The GPS receiver uses the following four properties of the satellite to determine its own position and derive the time: 3 • x, or latitude • y, or longitude • z, or altitude • t, or time However, once the GPS receiver has calculated its position, only one satellite is needed to solve for time (t). This is because the receiver has tracked at least four satellites and has positioned itself. GPS time is expressed as the number of weeks since midnight, January 6, 1980 (GPS Week) and the number of seconds in the week. These two values are transmitted as binary integers from the satellites and converted into conventional date or day (UTC Time) by the GPS receiver. 5 S100 User Guide – Rev. D – June 2005 11 1 SyncServer S100 1 12 S100 User Guide – Rev. D – June 2005 Chapter 3 Installation and Configuration Overview 2 Installation, setup, and getting started with the S100 are reviewed in this section. before Symmetricom recommends you review beginning your installation so that you are already familiar with the references to the interface once you begin to use it. 3 Getting Up and Running This chapter guides you through the following basic steps: 2. Set up the hardware and make all connections (Optional: Install GPS antenna, connect phone line). Using the serial cable, establish the S100’s IP address. 3. Test for network functionality (ping). 4. Using the web-based interface, choose and configure the time source. 1. 5 Unpacking Your S100 Unpack and inspect each item in the box. If there is any damage, or any items are missing, please contact Symmetricom Customer Assistance (see “Appendix D” on page 137). Note: The GPS and bullet antennas and antenna cables described in this manual have been . replaced as described in The following items should be included: For the S100-Dial-up/ACTS For the S100-GPS S100 S100 A/C Power Cord with US-style wall plug A/C Power Cord with US-style wall plug S100 User Guide – Rev. D – June 2005 13 SyncServer S100 For the S100-Dial-up/ACTS For the S100-GPS CD with NTP Clients, SymmTime™ software, User Guide PDF CD with NTP Clients, SymmTime™ software, User Guide PDF Six-foot RS-232 Cable Six-foot RS-232 Cable Phone cord Phone cord D-BNC Signal Breakout Cable BC11576-1000 D-BNC Signal Breakout Cable BC11576-1000 Bullet Antenna Antenna Mast - aluminium mast threaded to screw into the bottom of antenna Mounting Bracket Hardware - for attaching mast to railing 50-foot RG58 (Belden 8240 or equivalent) cable 14 S100 User Guide – Rev. D – June 2005 S y n c S e rv e r S100 R S -2 3 2 C a b le P h o n e C o rd 2 C D w ith N T P C lie n ts , S y m m T im e , U s e r G u id e AC Power C o rd 3 D -B N C S ig n a l B r e a k o u t C a b le F o r G P S o p tio n : B u lle t A n te n n a A n te n n a C a b le A n te n n a M a s t a n d B ra c k e ts 5 Figure 3-1: S100 and Accessories Your CD-ROM The CD does not autoload when inserted into the CD-ROM drive. Use the file browser to view the contents of the CD. The CD contains: SymmTime, PuTTY, and TermPro23. PuTTY and TermPro23 are shareware. • SymmTime synchronizes a Windows-based PC’s clock with the time from an S100 unit or other NTP server. When executed, a small pop-up containing four clocks appears. Once installed, visit http://www.ntp-systems.com/symmtime.asp for the latest file downloads. S100 User Guide – Rev. D – June 2005 15 SyncServer S100 • TermPro23.exe is used to install Tera Term terminal emulation software, if desired. The manual refers to using Hyperterminal. Either will work (as well as any others). This version supports Win 95, NT 3.51 and 4.0. • PuTTY is described below. Using the Software None of the files in the PuTTY folder must be installed. They are provided in case you require them and do not have them. The SymmTime (click SymmTime200x.exe to launch) file must be used for synchronization. The TTermPro23 is also optional. PuTTY Folder Details PuTTY contains the following optional executable files: • pageant.exe (Secure Shell [SSH] authentication agent for PuTTY, PSCP, and Plink) • plink.exe (a command line interface to PuTTY back end) • pscp.exe (SCP client using command line secure file copy) • psftp.exe (SFTP client for general file transfer session similar to FTP) • putty.exe (a Telnet and SSH client) • puttygen.exe (RSA key generation utility) WARNING! Using PuTTY, PSCP, PSFTP, Plink is illegal in countries where encryption is forbidden. See http://rechten.kub.nl/koops/cryptolaw/clssum.htm PUTTY.EXE is a secure shell client utility that allows you to log into a multi-user computer from another computer over the network. The file, Putty.exe, only runs on full Win32 systems (Windows 95, 98, ME, NT, 2000, XP, not CE). Most of its data (saved sessions, SSH host keys) is in the Registry at: HKEY_CURRENT_USER\Software\SimonTatham\PuTTY PSCP.EXE is a Secure Copy client and a tool for transferring files securely between computers using an SSH connection. PSCP.EXE is a command line application only. It uses the Windows MS16 S100 User Guide – Rev. D – June 2005 DOS Prompt (in 95, 98, ME) or the Command Prompt (in NT, 2000). This is available from the Programs section of your Start Menu. To start PSCP, add the directory containing PSCP to your PATH environment variable, enter the following in the console window: set PATH=C:\path\to\putty\directory;%PATH% This will only work for the lifetime of that particular console window. To set your PATH more permanently on Windows NT, use the Environment tab of the System Control Panel. On Windows 95, 98, and ME, you will need to edit your AUTOEXEC.BAT to include a set command like the one above. 2 Further, PSCP.EXE is a command line application, not a GUI application. If you run it without arguments, it will simply print a help message and terminate. It runs on every SSH server. PSCP is designed to do a single file transfer operation and immediately terminate. PSFTP.EXE 3 is a tool for transferring files securely between computers using an SSH connection. PSFTP differs from PSCP in the following ways: • PSFTP uses the new SFTP protocol, which is a feature of SSH 2 only (PSCP will also use this protocol if it can, but there is an SSH 1 equivalent it can fall back to if it cannot). • PSFTP allows you to run an interactive file transfer session, much like the Windows FTP program. You can list the contents of directories, browse around the file system, issue multiple get and put commands, and eventually log out. PLINK.EXE 5 is a command line connection tool similar to UNIX SSH. It is mostly used for automated operations, such as making CVS access a repository on a remote server. Do not use Plink if you want to run an interactive session in a console window. Plink is a command line application in the same manner as PSCP. PAGEANT.EXE is for public-key authentication and allows open multiple SSH sessions without having to type a pass phrase every time. It provides you with the security benefit of never storing a decrypted private key on disk. Holding your decrypted private keys in Pageant is better than storing them in disk files. The drawbacks are: • Windows does not protect pieces of memory from being written to the system swap file. If Pageant is holding your private keys, it's possible that decrypted private key data may be written to the system swap file, and an intruder who gained access to your hard disk might be able to recover that data. S100 User Guide – Rev. D – June 2005 17 SyncServer S100 • Windows prevents programs from accidentally accessing one another's memory space and it allows programs to access one another's memory space deliberately (e.g., debugging). If a virus, trojan, or other malicious program attaches onto your Windows system while Pageant is running, it could access the memory of the Pageant process, extract your decrypted authentication keys, and send them back to its master. Before you run Pageant, you need to have a private key. Use Puttygen.exe to do this. When you run Pageant, it will put an icon of a “computer wearing a hat” into the System tray. It will remain there and do nothing until you load a private key into it. PUTTYGEN.EXE is a key generator. It generates pairs of public and private keys to be used with PuTTY, PSCP, Plink, as well as the PuTTY authentication agent, Pageant. PuTTYgen generates RSA and DSA keys. Use it as an alternative means of identifying yourself to a login server, instead of typing a password. In conventional password authentication, you prove you are who you claim to be by knowing the correct password. The only way to prove you know the password is to enter it. If the server has been compromised, an intruder could learn your password. Public key authentication (Puttygen.exe) solves this problem. You generate a key pair, consisting of a public key—which everybody is allowed to know, and a private key— which you keep secret and not give to anyone. The private key is able to generate signatures. A signature created using your private key cannot be forged by anyone unless they have that key. Anyone who has your public key can verify that a particular signature is genuine. So you generate a key pair on your own computer, and you copy the public key to the server. Then, when the server asks you to prove who you are, Putty.exe can generate a signature using your private key. The server can verify that signature (since it has your public key) and allow you to log in. Note: Keep the packing materials for future use. These materials are custom designed to protect the S100 during storage and shipping. Use them if you need to return the unit to Symmetricom (for Customer Assistance see “Appendix D” on page 137). 18 S100 User Guide – Rev. D – June 2005 Installing Your S100 Install the S100 in a physically secure location with strong physical access controls. Symmetricom recommends that you read the operating environment requirements and other specifications in “S100 Specifications” on page 119, before starting. WARNING! To prevent electrical shock or injury, DO NOT remove the S100 cover. Dangerous voltages exist within this enclosure! Rack Mounting 2 3 The S100 is designed for mounting in a standard 19-inch (48.26 cm) rack. It is important to keep the fan inlet and outlet areas clear to maintain air flow. If the unit is installed in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may become greater than that of the room. Be sure that the ambient temperature is no higher than 50°C/122°F. Make sure the unit is properly balanced and grounded. Primary Power Connection The S100 uses external AC power. 5 The unit has a power cable with a PH-386, IEC 320-C-13 three-conductor female connector on the computer end of the cable. The other end of the cable has a NEMA 6-15P grounding plug (US Standard, 15-amp, 125-volt, straight-blade plug). Important Safety Instructions! When using your telephone equipment, basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons. Do not use this product near water or in a damp location. Caution: To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line cord. S100 User Guide – Rev. D – June 2005 19 SyncServer S100 Making All Connections: An Overview Use your standard PC workstation to configure the S100. Refer to the illustrations in this section when you install the S100. You will need to make a network connection (you may or may not require a hub to do this). It is suggested you obtain an IP address from your IT department. The Serial cord connects the S100 to your computer. Connect the S100 to your network using the network port. Use your verified IP address in your web browser to reach the S100’s Configuration Wizard online. 20 S100 User Guide – Rev. D – June 2005 Setting Up the Hardware On the S100 Front Panel 2 3 Figure 3-2: S100 Front Panel Close-up Complete the following steps before turning on the power: 1. 2. Connect the 9-pin serial cable from the PC workstation to the S100 serial port. You are doing this so to configure the S100 using a PC; see “Establishing A Serial Connection” on page 24 in the next section. Connect the RJ45-terminated Ethernet cable to one or both network ports on the S100. Note: If only one network connection is required, use the left Ethernet port (eth0). The 5 two USB ports are not functionable on this S100 release. Sysplex Timer Port: This port outputs UTC only. S100 User Guide – Rev. D – June 2005 21 SyncServer S100 On the S100 Rear Panel Telephone Telephone cable cable to wall to phone DB9 Connector (optional) GPS ANT. J1 DB15 Connector GPS Antenna Connector Power Panel Figure 3-3: S100 Rear Panel Close-up Complete the following steps to complete the S100 installation: 1. 2. Connect the power cable to the S100. GPS Option: Install GPS Antenna by connecting it to the GPS Antenna connector shown in Figure 3-3. Connect the Phone cord to a telephone line. Note: The GPS antenna described in this manual has been replaced as described in “Appendix E” on page 141 3. If you are not using a Rubidium oscillator, connect the D-BNC Signal Breakout Cable (BC11576-1000) to the DB15 Connector shown in Figure 3-3. If you are using the S100 with an optional Rubidium oscillator, connect the external rubidium cable (furnished with the Rubidium oscillator) from the DB9 Connector to the DB15 connector (see Figure 33). Note: The D-BNC Signal Breakout Cable BC11576-1000 has five connectors on it. The three connectors labelled “Time Code Output”, “Time Code Input”, and “1 PPS Output” are available for use with on the S100. The connectors labelled “Event Input” and “Heartbeat” are not applicable for use on the S100. 22 S100 User Guide – Rev. D – June 2005 Installing the GPS Antenna If you are installing an S100 with the GPS option, a bullet antenna is provided. The bullet antenna provided with the S100 GPS version comes with a weatherproof housing, suitable for permanent installation in an outdoor location. Note: The GPS and bullet antennas and cables described in this manual have been replaced as described in “Appendix E” on page 141. 2 WARNING: Do not cut the cable to a shorter length. Instead, bundle any excess cable. Correct antenna cable length— even if you do not “use it all”—is critical to proper S100 operation. The cable should have a gain within 15dB–25dB. 3 Choosing an Antenna Location Global Positioning System (GPS) satellites orbit at an 56 degree inclination to the equator. The further north you are in the northern hemisphere, the more probable it is that satellites will be passing to the south of you. And if you are in the southern hemisphere, the satellites will be passing to the north of you. Please consider this as you install your antenna. The antenna should be located with an unobstructed, clear view of the sky for optimum tracking conditions. The satellite signals cannot penetrate foliage, or dense wood or metal structures. The antenna’s operation is not affected if it is partially covered with snow, provided the snow is dry and does not form a continuous ice sheet on the surface. The shape of the bullet antenna is designed to prevent accumulation of rain, snow, or ice on its surface. (Note: The bullet antenna described in this manual has been replaced as described in “Appendix E” on page 141.) 5 The GPS transmission is a 1.5 GHz (L1Band) spread-spectrum signal. Being spreadspectrum means it is relatively immune to interference. But high energy sources, especially those with significant in-band energy, can swamp the receiver’s radio frequency (RF) processing circuitry. In addition, it is difficult to operate GPS at power substations or in close proximity to high-voltage 60 Hz sources. Symmetricom offers an optional high-gain antenna that is useful in heavy interference situations. Still, it is best to locate the antenna away from radiating sources to avoid degradation in antenna performance. Outdoors Install the antenna, using the mast and mounting brackets, with a clear view of the sky, and away from radio frequency interference. It should be mounted vertically, in a location with an unobstructed view of 30° above the horizon. Be sure to position it at least two meters above other active receiving antennas, and shield it from transmitting antennas. S100 User Guide – Rev. D – June 2005 23 SyncServer S100 Installing the GPS antenna Note: The GPS antenna and cable described in this manual have been replaced as described in “Appendix E” on page 141. 1. 2. Slide the antenna mounting pole down over the antenna cable so that the cable passes through the center of the pole. Take the end of the cable that has passed through the pole and screw the antenna onto the cable by turning the antenna. 3. Screw the antenna down on the mounting pole by turning the pole. 4. Use the saddle straps to mount the antenna mast in an area where the antenna has an unobstructed view of 30° above the horizon. 5. After running the cable from the S100 location to the antenna, attach the cable to the antenna. 6. Optional: Connect the modem phone line to the card on the back of the S100. 7. Optional: Connect the chassis ground and install nut (not provided). 8. On the back panel of the S100, turn on the Power switch. The Power green LED in the front panel comes on. When the hard drive is active, a red LED light comes on. Connecting the Rubidium Option If you are using the optional Rubidium oscillator, the external SS X72 cable needs to be attached for proper operation. Facing the rear panel of the S100, connect the SS X72 cable from the DB15 connector to the DB9 connector, forming a single loop. If your unit has no DB9 connector, there is no rubidium in the S100. Establishing A Serial Connection This step is necessary to establish the S100’s IP address. The only time you will need to make a serial connection with the S100 is during setup. Once the S100 has an IP address, improper shutdown or power failures will not cause the IP address to be lost, also, you will use the web-based interface for communication. Note: To test the S100 prior to installation, you will need three Ethernet cables and a hub (see diagram below). Connect the supplied Serial cable from your computer to the front of the S100. Connect the S100 and the computer to the hub using two Ethernet cables. You can perform an off-network test at this point. When you have completed the test, connect 24 S100 User Guide – Rev. D – June 2005 the hub directly to the network using the third Ethernet cable and perform an on-network test. 2 3 Figure 3-4: Connecting the S100 The following instructions assume you are using Windows OS. With your computer turned on: 1. 2. Use and configure Hyperterminal, click Start->Programs->Accessories>Communications>HyperTerminal. The “Connection Description” dialog box appears. In the Name field, enter a name. In this example, it is S100. 3. Click OK. 4. In the “Connect to” dialog, select the COM Port number you are connected to. In this example, COM Port 1 is selected. 5. Click OK. 6. In the “COM1 Port Properties” dialog, enter the following Port Settings. 5 S100 User Guide – Rev. D – June 2005 25 SyncServer S100 Figure 3-5: COM Port Properties * To set the Terminal Type, select File>Properties>Settings. 7. Click OK. 8. In the terminal emulation (e.g., hyperterminal) window, select File->Properties. The “Properties” dialog opens. Click Settings tab. Verify the Telnet Terminal ID is set at VT100. 9. Click OK. Note: When your Hyperterminal is connected and operational, at the bottom of the window you should see the following : Setting Up the IP Address 1. Power on the S100 unit. The Linux system boots. Various bootup data scrolls on the terminal emulator’s (e.g., Hyperterminal) screen. This may last a few minutes. When prompted, at the User ID login, type: root. At the Password prompt, type: symmetricom . Note: The following anomaly occurs when using Hyperterminal in WIN 95: “boot: e” appears at the prompt interrupting the boot process. Use your backspace key to delete the “e”. Then press . This will continue the bootup process. If using Tera Term or other terminal emulation program, this anomaly may not occur. For security purposes, the root, or superuser, password should immediately be changed using the passwd utility. To do this, see “How to change the root password” on page 115. Keep your newly created password in a safe and secure place. If you should lose it, there is NO PASSWORD RECOVERY capability with the S100. This means that you will have to send the S100 back to Symmetricom for recovery! 2. Additional Linux boot-up data appears. When prompted, enter the Login and Password. Type each one and press . syncserv1 login: Password: 26 S100 User Guide – Rev. D – June 2005 Figure 3-6: Login and Command Line 3. A command line appears. 4. Type netconfig and press . 5. The Network Config screen pop-up appears, “Would you like to setup networking?” This screen should appear as follows: 2 3 Figure 3-7: Network Configuration Screen 6. If your screen does not appear this way, check the settings on your Hyperterminal. Select Yes . 7. Another Network Config screen appears. If you select the DHCP box, setup will automatically find an IP address. Otherwise, enter your assigned IP address and any other information in the appropriate area . When completed, press . Note: Most users will use a static IP address. Using the DHCP (Dynamic Host-Configuration Protocol) is an automatic way to obtain an IP address. However, this IP address may later be reassigned if it is not used for a period of time, depending on your IT network guidelines. 5 8. A command line appears. Type reboot . The S100 reboots, several Linux bootup screens appear. A similar message should appear (if you selected DHCP) confirming an IP address (see Figure 3-10 also): Figure 3-8: DCHP Confirmation Screen The S100 unit now has an IP address recorded. This IP address will remain even if there is a sudden power failure or improper shutdown. Make a note of the IP address for future reference. Use your Password and Login again when requested as in Step 2 (under Setting up the IP Address). Jot down the IP address. S100 User Guide – Rev. D – June 2005 27 SyncServer S100 Testing Network Functionality To ensure that your network is functioning correctly, check to see if the S100 is on the network. First, check the Ethernet connection between the client computer and the S100: 1. Call up the client computer’s command prompt. Use the Windows MS-DOS command prompt. At the command line, type: IPCONFIG . Your computer’s IP address appears (see A). A B C Figure 3-9: IPCONFIG and PING Screen Note: In Win95, type WINIPCFG at the command line in Step 1. At the command prompt (See Figure 3-9), type a ping command to verify that the S100 is visible on the network. Use the IP address for the S100. For example: ping xxx.xxx.xxx.xxx (where xxx = the IP address of the S100). 2. Press . The message shown in Figure 3-9 indicates the ping command was successful. Four packets were sent and none were lost. An unsuccessful ping results in packets lost and a Timed Out message. If there is an affirmative response, the S100 is visible to the network. Note: If there is no response, then troubleshoot and fix the connection problem before proceeding with the next steps. Problems may include physical network connections or IP addresses. 28 S100 User Guide – Rev. D – June 2005 3. Now, verify the S100’s IP address. At the Unix command prompt, at the command line (Figure 3-6), type IFCONFIG and press . The following appears (Figure 3-10). 2 Figure 3-10: Linux IP Confirmation Screen 4. Open your web browser, enter the IP address in the browser Address field and press . The Configuration Wizard link appears. Use the Wizard to complete the S100 configuration process. 3 Turning Off Your S100 Normal If you have configured the unit correctly and it is running normally, select (Administrative Menu) Administration>Shutdown/Reboot from the S100’s web interface. The following screen appears: 5 Figure 3-11: S100 Shutdown Screen If you are using SSH or TTY, at the prompt type: shutdown -h now . S100 User Guide – Rev. D – June 2005 29 SyncServer S100 How to Acquire Time With the S100, you can choose your source of secure time. Each of the time references described in this section is configured using the web-based interface’s Configuration Wizard. First, log on. Logging On In your browser, enter the IP address of the S100 (use this format: “http://ipaddress”). Add the S100 home page to your ‘Favorites’ list for future convenience. If the link/icon is not present, in your browser address window, enter the S100 IP address . On your first log-in, the first screen you see is the System Status screen. Figure 3-12: Initial System Status The System Status screen gives you the status of the S100’s Timing, Uptime, and Versions. The color of the box on the top left side of the screen is your guide. It follows the traffic light convention: • Green = Normal Operation: The S100 is up and running with the correct time. • Amber = Unsatisfactory: System not yet ready to issue time. • Red = Unsatisfactory: Some settings still need attention before secure time can be issued. Note: Log-ins after this first log-in will bring you to the last screen you accessed in your most recent session. 30 S100 User Guide – Rev. D – June 2005 Administrator Log-In On the System Status Screen, click the Administrator Log-In link. After the security alert, the following dialog is displayed. 2 Figure 3-13: Logging In Enter the default user name, admin, and default password, symmetricom. We strongly recommend you change these settings as soon as possible. (You may log off by clicking Log Out at the top of each screen in the interface. More about logging off can be found in “Logging Off” on page 85.) 3 System Status: Logged In Once logged in, you see the System Status screen again except now it has more information. Configuration Wizard 5 Figure 3-14: Full System Status In Versions, this information refers to the current software in the S100. In the NTP Host Reachability, this example shows that the IP address was accessed eight times and provides additional details. S100 User Guide – Rev. D – June 2005 31 SyncServer S100 Next Step If this is your first log-in, your next step is to select the Configuration Wizard link at the top of the System Status page (see Figure 3-14). If you have logged in before and have already configured your S100, skip the Configuration Wizard and instead choose the item you want from the Administrative Index in the left pane. Details are then provided in the right window pane. If you have established the S100's IP address, type it in the browser's Address field and press . The browser displays the screen in Figure 3-15. Figure 3-15: Configuration Wizard: Choose Primary Time Source Note: The Configuration Wizard is the most convenient way to configure the S100. The Configuration Wizard Using your browser, follow this easy-to-direct sequence of dialogs to configure the S100’s source of time. You will need the wizard only once, unless you change the time source for the S100. Every screen in the wizard lets you start over, reset, or (for a screen in a sequence) go back to the previous screen. Note: When within the Configuration Wizard, do not use your browser’s back button. Use the Wizard’s back button instead: Use the Reset button to clear the fields of previously typed information. 32 S100 User Guide – Rev. D – June 2005 Choose Your Time Source The first dialog in the Configuration Wizard asks you to choose the source of time. 2 Figure 3-16: Choose Your Time Source 3 The choices are: • Global Positioning System (GPS) • Dial-up (to NIST's Automated Computer Time Service (ACTS)) • Network Time Protocol (NTP) • IRIG-B Figure 3-17 shows the screen flow after choosing the time source option you prefer. Warning: If you've already configured your timing engine, the Configuration Wizard will remove all of that configuration. This may be considered desirable; please be sure that this is what you want to do. 5 S100 User Guide – Rev. D – June 2005 33 SyncServer S100 Figure 3-17: Configuring the S100 Time Source Beginning on the following pages, you will be walked through each of the various configuration screens used in the Wizard. Most information is self-explanatory. Regardless of the time source chosen for configuration, the Wizard uses a common set of screens and only the specific information relating to the time source chosen may be different on any particular screen. 34 S100 User Guide – Rev. D – June 2005 GPS 2 Figure 3-18: Dialup Backup If you choose GPS (see Figure 3-16) and click Next, the Dialup Backup dialog is displayed. If you wish to use dial-up as a backup time source to GPS, click the checkbox next to Use dialup as backup to GPS, then click the Next button. 3 If you do not want to back up your GPS time source with dial-up, leave the checkbox unselected, and click Next, which will open the System Information dialog (see Figure 320). If you check Use dialup as backup for GPS, this Dialup Settings dialog is displayed. In Options, if you wish to use ATDP (pulse dialing), check the box, otherwise the S100 uses standard ATDT (dial tone) dialing. 5 Figure 3-19: Dial-up Settings In the Modem Phone Number field, enter the NIST phone number preceded by any prefixes that might be required to reach those numbers. A “9,” (nine comma) prefix gets an outside line from an office phone; the comma introduces a one-second delay before the remaining numbers are dialed. The “1” prefix is required for long distance dialing in the US. S100 User Guide – Rev. D – June 2005 35 SyncServer S100 Then click Next for the System Information dialog. Figure 3-20: System Information • Admin e-mail, for the administrator of the S100. After a test is conducted, this email address receives the notice. • Mail forwarder, or the SMTP server • Host name • System (S100) location Confirm the data that is in the fields. If it is not accurate, change it to the correct information. Click Next. Note: All the fields are optional. A unit can be configured and tested with all the fields blank. 36 S100 User Guide – Rev. D – June 2005 System Tests Dialog 2 3 Figure 3-21: System Testing options You can skip the test by clicking Finish, or initiate the test by clicking Test Now. The default is to test all the services, so unless you un-check them, they all will be tested. If you do not use dial-up as backup, it will not be listed here nor will it be tested. Initiate the test by clicking Test Now. Test Results dialog 5 Figure 3-22: Test Results shown This displays the results of your test. This tells you if the S100’s GPS receiver is functioning properly. In this example, it is. However, failed tests are also shown. S100 User Guide – Rev. D – June 2005 37 SyncServer S100 There is no output to the “Mail test” field. That is because mail is tested by sending an e-mail to the address that was not provided earlier. Click Finish. Setup Complete dialog Figure 3-23: Your GPS set-up is complete This screen verifies your configuration of the S100: • Its time source • Modem phone number (if you designated dial-up as the backup source for time) • Host name and System location • Administrator e-mail Dialup Settings dialog When using dial-up, the time reference is coming from an analog phone line through the builtin modem. Automated Computer Time System (ACTS) is maintained by NIST. In the US, use either of the following phone numbers to access time: • Colorado: (303) 494-4774 • Hawaii: (808) 335-4721 Outside the US, connect with your local measurement institute. 38 S100 User Guide – Rev. D – June 2005 2 Figure 3-24: Dial-up Settings If you choose the Dialup radio button and click Next, the Dialup Settings dialog is displayed. 3 In the field, enter or paste your modem phone number. Then click Next for the System Information dialog. System Information dialog 5 Figure 3-25: System Information fields This shows: • Admin e-mail, for the administrator of the S100 • Admin Password • Mail forwarder, or the SMTP server S100 User Guide – Rev. D – June 2005 39 SyncServer S100 • Host name • System (S100) location Confirm the data that is in the fields. If it is not accurate, change it to the correct information. Click Next. System Tests dialog Figure 3-26: System Testing options You can skip the test by clicking Finish, or initiate the test by clicking Test Now. The default is to test all the designated services, so Dialup and E-Mail, unless you uncheck them, will be tested. To initiate the test, click Test Now. 40 S100 User Guide – Rev. D – June 2005 Test Results dialog 2 Figure 3-27: Test Results shown 3 This screen tells you if the dial-up time source for your S100 is functioning properly. In this example, failed tests are shown. There is no output to the “Mail test” field. That is because mail is tested by sending an e-mail to the address that you indicated earlier. Click Finish. Setup Complete dialog 5 Figure 3-28: Your Dial-up set-up is complete This screen verifies your configuration of the S100: • Its time source • Modem phone number • Host name • System location • Administrator e-mail S100 User Guide – Rev. D – June 2005 41 SyncServer S100 NTP ntp1.symmetricom.com Figure 3-29: Defining Your NTP Settings You can also acquire time through other NTP servers and S100s. Note: If you have not configured DNS, use IP addresses rather than hostnames. Choose the NTP radio button (see Figure 3-16) and click Next. The Network Time Protocol Settings dialog (Figure 3-29) appears. On this screen, name one (or more) NTP servers or peers. NTP v4’s Autokey requires digitally signed certificates. For more about the Autokey protocol, see “S100 and NTP v4’s Security Features” on page 10. Then click Next. 42 S100 User Guide – Rev. D – June 2005 System Information dialog 2 3 Figure 3-30: System Information fields The System Information dialog shows you: • Admin e-mail, for the administrator of the S100 • Mail forwarder, or the SMTP server • Host name • System (S100) location 5 Confirm the data that is in the fields. If it is not accurate, change it to the correct information. Click Next. S100 User Guide – Rev. D – June 2005 43 SyncServer S100 System Tests dialog Figure 3-31: System Testing options You can skip the test by clicking Finish, or initiate the test by clicking Test Now. The default is to test all the services, so NTP and E-Mail, unless you un-check them, will be tested. Click Test Now. Test Results dialog Figure 3-32: Test Results shown This screen tells you if the NTP time source for your S100 is functioning properly or if there is a test problem. 44 S100 User Guide – Rev. D – June 2005 There is no output to the “Mail test” field. That is because mail is tested by sending an e-mail to the address that you indicated earlier. Click Finish. Setup Complete dialog 2 3 Figure 3-33: Your set-up is complete This screen verifies your configuration of the S100: • Its time source • Host name • System location • Administrator e-mail Configuring NTP To configure NTP, use the NTP Relationships dialog (See “NTP Relationships” on page 58). Use the dialog to view the NTP status and create the NTP associations. 5 IRIG-B (v.120,122,123) Both the D-BNC Signal Breakout Cable and the optional Rubidium oscillator cable provide a Timecode Input connector. To use IRIG time code as a reference, connect the IRIG signal to the Timecode Input connector, select IRIG-B (see Figure 3-16), and click Next. If you wish to use dial-up as a backup time source to GPS, click the checkbox next to Use dialup for backup to IRIG-B, then the Next button. If you do not want to back up your IRIG with dial-up, leave the checkbox unselected, and click Next. S100 User Guide – Rev. D – June 2005 45 SyncServer S100 Dialup Backup dialog Figure 3-34: Dial-up Settings If you check Use dialup as backup for IRIG-B, a similar Dialup Settings dialog is displayed (see Figure 3-24). In the field, enter or paste in your modem phone number. Then click Next. A screen similar to Figure 3-35 now appears. System Information dialog Figure 3-35: System Information fields This shows: • Admin e-mail, for the administrator of the S100 • Mail forwarder, or the SMTP server 46 S100 User Guide – Rev. D – June 2005 • Host name • System (S100) location Confirm the data that is in the fields. If it is not accurate, change it to the correct information. Click Next. System Tests dialog 2 3 Figure 3-36: System Testing options You can skip the test by clicking Finish, or initiate the test by clicking Test Now. 5 The default is to test all the services, so unless you un-check them, they all will be tested. If you do not use dial-up as backup, it will not be listed here nor will it be tested. S100 User Guide – Rev. D – June 2005 47 SyncServer S100 Test Results dialog Figure 3-37: Test Results shown This screen shows whether the IRIG-B for your S100 failed or passed. In this example, the IRIG-B failed. There is no output to the “Mail test” field as no addresses had been provided in the System Information dialog (Figure 3-35). Click Finish. Setup Complete dialog Figure 3-38: Your IRIG set-up is complete This screen verifies your configuration of the S100: • Its time source • Modem phone number (if you designated dial-up as the backup source for time) • Host name • System location • Administrator e-mail 48 S100 User Guide – Rev. D – June 2005 Using SymmTime™ Next, you need to install client software to test NTP (Windows installation). The SymmTime utility is a handy way of doing this. It keeps accurate time on your client Windows computer. 2 Figure 3-39: SymmTime™ Utility and Clock Display Use SymmTime200x.exe to launch SymmTime on your PC. When executed from the CDROM, a small pop-up containing four clocks appears. Once installed, visit http://www.ntpsystems.com/symmtime.asp and download the latest updated files. 3 Installing SymmTime 1. 2. On the client computer’s hard drive, create a separate directory for SymmTime. Copy the SymmTime200x.exe file from the utility disk into this directory. 3. Double-click Symmtime.exe. This will install the program onto your computer. 4. Configure the clocks as you desire using the Build tool (select the hammer in the lower right corner, the following appears). 5 S100 User Guide – Rev. D – June 2005 49 SyncServer S100 50 5. Right-click the displayed clocks for the menu and select Sync Servers 6. The following screen appears. Click Add Server. 7. New Server dialog box, enter the IP address and location of the S100. Click OK. The IP address you use will be the one obtained in the setup of the S100. S100 User Guide – Rev. D – June 2005 8. The IP is added to the Active Servers window. Click OK. The IP address is listed under Active Servers. 2 To Synchronize SymmTime: 1. Right-click anywhere on the clocks. Select Sync Status from the menu to tell your computer to automatically get time from the S100. A similar screen will appear. 3 5 2. Click Sync Now. If you receive a no response, it is because you have not yet configured the S100; configure it now. An affirmative response confirms you have configured the S100. Next: Use the Web-Based Interface Now that you have established the S100, configured your time source, and installed your client software, you can use the web-based interface to manage S100 operations. See Chapter 4 for a complete description. S100 User Guide – Rev. D – June 2005 51 SyncServer S100 52 S100 User Guide – Rev. D – June 2005 Chapter 4 The Web-Based Interface Overview 2 The following is a description of the web-based software interface that you use to manage the S100. This material is designed to be a reference for you as you use the S100. It also describes some of the procedures that will help you begin using the S100. 3 Symmetricom recommends you review this section before beginning the permanent installation of the S100, so that you will be familiar with it when you need to use it. For detailed information about NTP (Network Time Protocol), use the NTPD Help link (see “NTPD Help” on page 84) embedded in the S100’s web interface to review the NTP Distribution document (source: University of Delaware). Additional information is available at http://www.ntp.org/. Interface: Screen Reference The S100 management interface has been designed with ease of use in mind. As a result, you access the management interface S100 through any web browser. This section describes the screens used in the interface, including their functions. It supplies some procedural instructions, as well. 5 Each dialog or screen, except in the Configuration Wizard, lets you refresh that screen or open a new window, and all will let you log out. For security reasons, the interface will time out after 30 minutes if there is no activity. S100 User Guide – Rev. D – June 2005 53 SyncServer S100 Logging In Using your browser, the following dialog is displayed once you enter the S100’s IP address or click the link to or icon for the S100. Figure 4-1: Logging In Enter the default user name, admin, and default password, symmetricom. Assuming this is the first time you have logged in, you will see the System Status screen (see “System Status” on page 57). Log-ins after this first log-in will bring you to the last screen you accessed in your most recent session. Administrative Interface This is the main tool for administering the S100. If you click Refresh at the top of any screen, it will remove any confirmation or error messages on the screen. If you click New Window at the top of any screen, it opens a second browser window without the admin menu. 54 S100 User Guide – Rev. D – June 2005 Admin Interface: Base Menu The first thing you see on the left of your screen is the base Administrative (Admin) Menu. This is the starting point for administration tasks on the S100. Click “+” to expand the sub-menu. 2 Figure 4-2: Administrative Interface: Base Menu 3 5 S100 User Guide – Rev. D – June 2005 55 SyncServer S100 Administrative Menu: Expanded Expanding each item on the base menu shows you all the available options. Click Collapse (at the bottom of the menu) to revert to the base version of the menu. Figure 4-3: Interface Admin Menu, expanded 56 S100 User Guide – Rev. D – June 2005 System Status Clicking this item, you will quickly see the status of the S100. 2 3 Figure 4-4: Checking the Status The color of the box on the left side of the page is your guide. It follows the traffic light convention: • Green = Normal Operation: the S100 is up and running with the correct time • Amber = Unsatisfactory: Some settings still need attention before secure time can be issued • Red = Unsatisfactory: System not yet ready to issue time 5 Timing Configuration These menu options let you manage NTP, the heart of the S100 system. For more details on each of the NTP terms used here, see “NTPD Help” on page 84. S100 User Guide – Rev. D – June 2005 57 SyncServer S100 NTP Relationships Use this option to configure NTP . Figure 4-5: Configuring New Clients and Servers Define the relationships between and among this host and other hosts. For more details, see “NTPD Help” on page 84 or click HTPD Help embedded in the S100 web interface. In the NTP Associations panel of this screen you see the configuration of the network that you are putting the S100 on. These are all the devices from which the S100 can get time. They are named as server or peer, depending on their relationship to the S100. In this section, clicking Reset clears any data you’ve just added, and clicking Remove and Restart NTP deletes the checked host(s). The Add New Relationships panel lets you add a host to your configuration. Next to each parameter, enter the values for the clients you are adding to the configuration: Role - The host you add can serve in any one of the following roles: • Peer 58 S100 User Guide – Rev. D – June 2005 • Server • Broadcast • Manycast Client • Broadcast Client • Manycast Server • Multicast Client Address - Enter the IP address or host name for the host you are adding. 2 Dialup, timing engine, and Set timing engine mode links - Use these links to populate the address field appropriately. Dialup Phone Number - Enter the modem phone number you will be using. Enter a 9, (nine comma) if required to get an outside line. (The comma introduces a one second delay, which gives time for the outside dial tone to become available.) Prefer - This marks the server as “preferred”, meaning this server, of all the correctly operating hosts and if all things are equal, will be the host chosen for synchronization. 3 Key - All packets sent to and received from the server or peer will include authentication fields encrypted using the specified key. • None: The default, no encryption field. • Key= : This is the index of the key in the keystore. • Autokey: All packets sent to and received from the server or peer include authentication fields encrypted using the autokey scheme. (NTP v4) Burst - Data grouped for transmission, in the following ways: • N/A: If you choose this option, the Burst command will not be executed. • Burst: Selecting this option tells the system that when the server is reachable, send eight packets instead of one. • iBurst: Selecting this option tells the system that when the server is not reachable, send eight packets and keep trying every 16 seconds. 5 Minimum Poll Interval - Indicate in seconds the smallest measure of time in which you want the S100 to check the network hosts’ time. If you enter nothing here, the S100 will use the default, 0:01:04 seconds. Maximum Poll Interval - Indicate in seconds the largest measure of time in which you want the S100 to check the network hosts’ time. If you enter nothing here, the S100 will use the default, 0:17:04 seconds. Time to Live - Data in the Internet Protocol that specifies how many more hops a packet can travel before being discarded or returned, here entered in the form of whole numbers. Version - These are Default, 1, 2, 3, or 4. Clicking Reset clears the data you’ve just entered. Clicking Add and Restart NTP adds the data you’ve just entered and restarts NTP. When you are finished with the addition of any new clients, they will display in the NTP Relationships panel (see “NTP Relationships” on page 58) at the top of the screen. S100 User Guide – Rev. D – June 2005 59 SyncServer S100 NTP Time Source Test The NTP Server Test dialog lets you test the servers you designated in the NTP Relationships panel (see “NTP Relationships” on page 58. Figure 4-6: Testing the NTP Time Source Host • All • 127.127.40.0 (onboard GPS/IRIG reference clock driver) • 127.127.18.3 (NIST ACTS reference clock driver) • localhost Options - Use the checkbox to enable Verbose Output. NTP Dialup In the following dialog, enter or paste in your modem phone number. Then click Submit. Figure 4-7: NTP Dialup 60 S100 User Guide – Rev. D – June 2005 NTP Restart Here, you can restart the NTP daemon, for troubleshooting purposes only. Figure 4-8: Restart NTP 2 However, please note the following warning: Warning! It can take NTP a significant period of time to go through its processes. If you choose to restart, you will be required to reset your time source. 3 NTP Status This screen gives you the following information: 5 Figure 4-9: Snapshot of NTP Status Reference Time - This is the last time it synced. System Peer - This tells you which NTP server the S100 is synced to. System Peer Mode - This tells you what the S100 is—client or otherwise—to the NTP server it is synced to. S100 User Guide – Rev. D – June 2005 61 SyncServer S100 Leap Indicator - This is a two-bit code warning of an impending leap second. The numbers mean: 00 = no warning 01 = the last minute has 61 seconds 10 = the last minute has 59 seconds 11 = alarm condition (clock not synchronized) Stratum - This is the stratum level of the S100. Precision - This is an eight-bit signed integer indicating the precision of the local clock, in seconds to the nearest power of two. The range is -6 to -18. Root Distance, or root delay - This is a signed fixed-point number indicating the total roundtrip delay to the primary reference source at the root of the synchronization subnet, in seconds. It can be expressed as either a positive or negative number. Root Dispersion - A 32-bit unsigned fixed point number indicating the maximum error relative to the primary reference source, in seconds (milliseconds). Reference ID - A 4-byte code indicating the reference source. If the reference source is stratum 0, this string will identify the type of source (GPS or dial-up, for example). If the source is stratum 1 or higher, this 4-byte code will contain the IP address of the reference source. Reference Time - The local time at which the local clock was last set or corrected, in a 64-bit time-stamp format. System Flags - These are various flags that can be enabled or disabled using the configuration commands. Jitter - Distortion of a signal caused by some weakness in synchronization, here shown in seconds (milliseconds). Stability - This is the residual frequency error remaining after the system frequency correction is applied. Used most often in maintenance, the value starts as high as 500 ppm but settles into the .01 to 0.1 ppm range. Broadcastdelay - This shows the default broadcast delay. authdelay - This is the default authentication delay.NTP Advanced Configuration Here you will find advanced configuration features of NTP. You probably won’t need to access these, but they are here if you need to edit the configuration. 62 S100 User Guide – Rev. D – June 2005 Advanced: ntp.conf The following dialog is only for those with advanced knowledge of NTP. 2 3 Figure 4-10: Viewing the NTP Configuration File The dialog in Figure 4-10 displays the NTP configuration file. It allows you to edit the config text file. If you need help with the NTP config file, click the NTP Configuration Help link near the top of the screen, and you will be directed to NTP Help. Additional information about NTP is available is available at www.ntp.org . Warning! If you improperly configure the ntp.conf, you will render the S100 unable to sync to any time source. Be certain you know NTP well enough to do this. S100 User Guide – Rev. D – June 2005 5 63 SyncServer S100 Advanced: Keys/Certificates Use this NTP Keys/Certificates dialog to obtain a digital certificate that verifies the identity of the S100. Figure 4-11: Obtaining and Generating Keys and Certificates Working from top to bottom: Generate Keys - Select the key algorithm and hash algorithm you wish to use: • RSA + MD5 • RSA + SHA1 • DSA + SHA1 DSA + SHA1 is the default. New Random MD5 Keys - Select this checkbox to generate random MD5 keys. Then click Generate. The screen refreshes and a “keys generated” message displays in the upper left corner. Next to the Certificate Request field, click Request to issue a certificate request. A confirmation dialog will prompt you to tell the system where you want the certificate; respond to the prompt. If you choose Upload Certificate, browse to the certificate request, as sent to you by the Certificate Authority, or enter its name. Then click Upload. 64 S100 User Guide – Rev. D – June 2005 Alternatively, you can use Paste Certificate to copy and paste the certificate from the certreq.jsp file into this field. Open the certreq.jsp file using a text editor (e.g., Notepad) and copy the contents. The certificate should be base 64 encoded. Paste the contents in the Paste Certificate field here, then click Submit. The S100 is self-signed, thus it can verify your certificate. For more about how the S100 uses NTP keys and certificates, see “S100 and NTP v4’s Security Features” on page 10. 2 Timing Engine This section of the interface lets you view various aspects of the Symmetricom bc635/637 PCI board—the timing engine of the S100. 3 Main Settings The timing engine mode choices you see in the drop-down list box are: 5 Figure 4-12: Timing Engine Main Settings • GPS is the default, which obtains the time from GPS receiver and antenna. • IRIG, which obtains the time from the IRIG time code input. (Note: IRIG time code doesn’t include the year with its time information. Be sure to enter the year in the Year field.) • Free Running means there is no external timing source used, that the time is set manually • One Pulse Per Second, or 1PPS, syncs the oscillator to a user-supplied 1PPS S100 User Guide – Rev. D – June 2005 65 SyncServer S100 • Real-Time Clock, or RTC, synchronizes the oscillator to the 1PPS signal from the timing engine itself Mode - How time is being acquired. Time Format - The timing engine uses Binary code time. Year - Set the year here. (Note: You must enter the year if you are using IRIG as the primary reference source). Local Offset - Allowed values are -16 through +16, and can include half-hour offsets. Propagation Delay - If there is any propagation delay from the reference source, the timing engine will adjust for it. Values range from -9999999 to +9999999. Current Leap Seconds - This figure accounts for the local offset. Scheduled Leap Event Time - This is a 32-bit binary value corresponding to the number of seconds elapsed since 0 hour January 1, 1970 UTC. Scheduled Leap Event Flag - This will alert you to an upcoming leap event. GPS Time Format - UTC is the default. IEEE Daylight Savings Flag - This alerts you to an upcoming Daylight Savings Time event. Timecode Settings Figure 4-13: Timecode Settings Code type choices in the drop-down list box are: • IRIG-A • IRIG-B • IEEE 1344 • NASA 36 Code Type - This identifies the time code in setting. Modulation Type - The type associated with the time code signal: • AM, for amplitude modulated • DC, for direct current level shift, or digital IRIG 66 S100 User Guide – Rev. D – June 2005 The default modulation envelope is AM. Time Code Settings - This confirms the settings: • Time Code = The time code in setting • Code Modulation = The modulation type associated with the time code signal • Time Code Out = The time code out setting • Generator Time Offset = This shows any offset to the time code signal being produced by the timing engine. 2 Clicking Reset lets you clear any data you’ve entered, and Submit implements changes you have made. GPS Information 3 This section of the admin menu appears only if you have the GPS option on the S100. The following items give details on GPS activity: GPS Health This screen updates the signal status. This example shows a normal screen. 5 Figure 4-14: GPS Health Status The error codes are encoded into individual bits within the byte. The bit positions and their meanings are shown below. Bit Position Meaning if bit value = 1 0 Battery back-up failed (1)(4) 1 Signal processor error (1) 2 Alignment error, channel or chip 1 (1) 3 Alignment error, channel or chip 2 (1) 4 Antenna feed line fault (2) 5 Excessive ref freq. error (3) S100 User Guide – Rev. D – June 2005 67 SyncServer S100 6 (Unused) 7 (MSB) (Unused) Notes: (1) After this error is detected, its bit remains set until the GPS receiver is reset. (2) This bit follows the current status of the antenna feed line fault-detection circuitry. Since GPS receiver has an integral antenna assembly, this information of little import; it is only shown for the sake of completeness, being important for sensors with separate antennas. (3) This bit is ‘1’ if the last computed reference frequency error indicated that the reference oscillator is out of tolerance. (Packet 2D requests the oscillator offset and packet 4D returns the oscillator offset to the user.) (4) this bit is always set as the GPS receiver battery backup is not installed. GPS Signal Strength Here, the signal strength are displayed. Figure 4-15: GPS Signal Strength The data is for the satellites that are currently being tracked: • The satellite number • The signal level for each satellite 68 S100 User Guide – Rev. D – June 2005 GPS Time GPS time is noted here. 2 Figure 4-16: GPS Time Seconds of Week - This is expressed in the number of seconds since January 6, 1980 (GPS Week). 3 GPS Week Number -This is expressed in the number of weeks since January 6, 1980. GPS/UTC Offset - Currently this is 13 seconds. GPS Position This screen shows you the calculated coordinates of the gps antenna. 5 Figure 4-17: GPS Position X Coordinate = Latitude Y Coordinate = Longitude Z Coordinate = Altitude Time-of-fix = Time For more about GPS position, see Chapter 2, “S100 and the Global Positioning System” on page 11. Note: The GPS antenna described in this manual has been replaced as described in “Appendix E” on page 141. S100 User Guide – Rev. D – June 2005 69 SyncServer S100 Other Information The following screens give additional information about the S100. Engine Time The engine time is read directly from the timing engine. Figure 4-18: Timing Engine Time Clock Settings The clock settings here are: Figure 4-19: Clock Settings Oscillator - This is internal to the timing engine. DAC Value - A 16-bit Digital Analog Converter is used to set the frequency on the oscillator. The value here shows a rate match between the hardware clock frequency and the selected time reference source. Jam Control - “Jam” refers to jam synchronization. This controls whether or not the software may “jam” the clock circuitry if a phase discontinuity of greater than 1 millisecond is found. Battery Status - The timing engine’s battery status is noted here. Clock Value - This register shows the number of 100ns steps needed to advance or slow down the phase of the local clock circuit. 70 S100 User Guide – Rev. D – June 2005 Disc Control - Short for disciplining control, this disciplining function is the part of the software that matches the local clock phase and frequency with the selected time reference function. Phase Control - Short for local clock phase shifting, this function shows if the software is shifting the one-second rollover point of the local hardware clock by a specified amount. Disc Gain - Short for oscillator disciplining function gain value, this is a scalar value that sets the gain for the Kalman filter so it can discipline the local oscillator to the selected time reference. 2 Control Settings The timing engine control settings are viewable here. 3 Figure 4-20: Control Settings They are: HeartBeat Mode - The heartbeat is the specified frequency. HeartBeat Counter1 and 2 - These are internal counters to the timing engine. Frequency Output - The available frequencies are 1, 5, and 10 MHz. 5 Event Control - This setting enables or disables the ability of the internal clock to capture the time at which an external event occurs. Event Edge - This is either the rising or falling edge of the heartbeat signal. Event Capture Lockout - If enabled, the capture lockout can be used to control whether or not subsequent signals will overwrite the data in the timing engine’s event time registers. Event Capture Source - This setting controls the source of the external event—an external event input or strobe, for example. S100 User Guide – Rev. D – June 2005 71 SyncServer S100 Model Information The following page provides basic data about the bc635/637 PCI board, the timing engine of the S100. Figure 4-21: Timing Engine Model Information Networking Use the following dialogs to configure several parameters of the S100 on your network. TCP/IP The following dialog enables you to define the following parameters: Figure 4-22: Configuring TCP/IP Network Interface - Here, choose the Ethernet port you are using. If there is only one interface, use eth0, the default. A local loopback refers to a loopback plug inserted in one 72 S100 User Guide – Rev. D – June 2005 of the ports; a signal is transmitted and returned to the sending device and the returned signal is compared with the transmitted signal in order to evaluate the integrity of the equipment or transmission path. DHCP - This is the Dynamic Host Configuration Protocol, which assigns an IP address to each node in a network. Here, the default is Enable. Static IP - Click the radio button to Enable, then enter the S100’s IP address, subnet mask, and default gateway. The setting for On Boot is defaulted to Enable. Uncheck this box if you do not want the IP address when you reboot. 2 Local Domain - This is your local domain name. Search Domains - The system will search these domains—which usually include your local domain as well as others—so it can resolve any unresolved host names that may be missing the host, local, or top level portion of the name. Hostname - Enter the S100’s name here. 3 IP Forwarding - You can redirect data from one IP address to another by selecting Enable here. DNS Nameservers - These are the DNS servers on the network. Reset - Click this button to return to the previous settings. Update/Reboot - Click this button to reboot the server, but please note the warning: Warning If you click Update/Reboot, you will reboot the server, and will need to reacquire time. Be certain you want to do this. If you do choose to do this, a confirmation message will display at the top if this screen. 5 S100 User Guide – Rev. D – June 2005 73 SyncServer S100 ifconfig Output This screen gives you information about the network configuration of the S100. It lets you troubleshoot network problems. Figure 4-23: Configuration Information Ping Use the ping command to test the network route between the S100 and a remote host. Figure 4-24: Pinging the Remote Host This is a diagnostic tool that confirms that all is well between the two devices. The dialog shown in Figure 4-24 lets you define the following parameters: Host - URL of the remote host 74 S100 User Guide – Rev. D – June 2005 Wait time - Response time between pings Ping count - Try to ping this number of times before quitting Options • Route: Gives detailed information about the route followed between two hosts • Quiet: No output until done • Allow Ping of Broadcast Address: Lets you ping broadcast addresses so all machines in a broadcast group can respond 2 Traceroute Traceroute shows you the network route between the S100 and a remote host. Use it as a diagnostic tool. 3 5 Figure 4-25: Seeing the Traceroute The dialog shown in Figure 4-25 lets you determine the following parameters: Host - Remote server’s IP address Source Network Interface - The S100 has two Ethernet cards, 0 (zero, left) and 1 (right). The default is eth0, as you see here. Response Wait Timeout - This is how long the S100 should wait for a host to respond. Base UDP Port - This refers to the User Datagram Protocol port number. The default is port 33434. Options S100 User Guide – Rev. D – June 2005 75 SyncServer S100 • Skip Name Lookup: If you check this, the S100 will not take the time to look up the host names of the intermediate hosts along the path. Administration Here, configure non-NTP features of the S100. You can also shut down or restart the S100. Shutdown/Reboot This option shuts down the network connection. WARNING! If you click Shutdown, you will shut down the S100’s network connection. When - Using a 24-hour clock, enter the time here. Figure 4-26: Shutdown/Reboot Options - These are: • Cancel Pending Shutdown: Lets you cancel a shutdown • Reboot: The default setting. Useful if you need to shut down and restart the hardware and software. This is very handy if the S100 is remote • File System Check on Reboot: Here the system checks for errors, lost clusters, and other problems Message - Here, enter a message that would be sent only to someone who might be logged in using Secure Shell. 76 S100 User Guide – Rev. D – June 2005 Reset - Click Reset to clear the data you have entered. Submit - Clicking Submit to disconnect the server from the network. Admin Users Use this dialog to change, delete, or add a user. 2 3 Figure 4-27: Changing or Adding Users Restart Web Interface This page lets you do a clean restart of the web server. WARNING If you click Restart, you will shut down the webserver, then it will restart. This will take a minute or two to complete. 5 The restart affects only the management of the system, not the time or service. Figure 4-28: Server Restart option S100 User Guide – Rev. D – June 2005 77 SyncServer S100 Time Zone Use this option to set the time zone displayed in the web-based admin interface. Figure 4-29: Setting the Time Zone The time zone is for display purposes only. It will not affect NTP, the output, or clients. Highlight the time zone you want, then click Submit to set the time zone. System Log Configuration Use this option to configure the System Log. Figure 4-30: System Log Configuration Note: Remote logging is available by specifying an IP address preceded by an @ sign. 78 S100 User Guide – Rev. D – June 2005 SNMP Configuration 2 Figure 4-31: SNMP Configuration 3 When populated with text, this screen is a summary of the SNMP configuration commands entered in the SNMP Edit screen. SNMP Edit 5 Figure 4-32: SNMP Edit Use this screen to enter your SNMP commands for configuration and any other related information. S100 User Guide – Rev. D – June 2005 79 SyncServer S100 Alarms This page lets you configure alarm activity . Figure 4-33: Setting Alarm Parameters E-mail Address - This e-mail address is where any alarm messages will be sent. Mail forwarder - The server that will handle the e-mail. Issue Alarms - Here, check when you want alarms sent: • Upon boot, and if Flywheeling continues for more than 60 seconds. If you check here for this alarm, it will tell you that the system has lost contact with its source of time but will keep going for some period. • If there has been a Configuration Change, you can check here for an alarm to be sent. Reset lets you clear the entered data, and Submit tells the system you are finished. Configuration Wizard The next item on the Admin menu is the Configuration Wizard. This helps you select and configure your time reference. Step-by-step Configuration Wizard instructions are in “The Configuration Wizard” on page 32. 80 S100 User Guide – Rev. D – June 2005 Logs You can access the NTP, Boot, System, Config and HTTPD logs through either the admin menu or in the drop-down list box in the Logs parameter. All the logs have the following parameters and values: Logs - This drop-down list box lets you access other logs from this screen. The size of the log you choose will be displayed beneath the drop-down box. Filter - 2 • No filter: Displays all logs. • Display only the last __ lines: Useful for avoiding screen clutter. • Search: Search feature allows you to see what has happened on any given day. •Selecting the case-blind option lets the search ignore case in your search. •Selecting the line numbers option limits the search to log line numbers. •Choosing regular expression allows for pattern matching in your search. Prune - 3 • Remove all but the last __ lines: Lets you pare down the log after you have viewed it. NTP Log Use this log to see NTP activity. 5 Figure 4-34: NTP Log S100 User Guide – Rev. D – June 2005 81 SyncServer S100 Boot Log Use this log to see messages created during the boot process. Figure 4-35: Boot Log System Log Use this log to monitor system activity. Figure 4-36: System Log 82 S100 User Guide – Rev. D – June 2005 Config Log This log shows you S100 configuration and status messages. 2 3 Figure 4-37: Config Log HTTP Log This log shows webserver messages. 5 Figure 4-38: HTTP Log S100 User Guide – Rev. D – June 2005 83 SyncServer S100 Help This is the last section of the S100 admin menu. Available Help functions are: Figure 4-39: Help Options SyncServer Help This is the application Help. Use the Table of Contents, Index, or Search to find information. NTPD Help For detailed information about NTP (Network Time Protocol), use the NTPD Help link (see “NTPD Help” on page 84) embedded in the S100’s web interface to review the NTP Distribution document (source: University of Delaware). Additional information is available at http://www.ntp.org/. Search NTPD Manual This option gives you the ability to do basic searches within the NTPD Help. Collapse Button Click the Collapse button at the bottom right of the admin menu to reduce the menu down to its main elements. 84 S100 User Guide – Rev. D – June 2005 Logging Off Log off by clicking Log Out, at the top of each screen within the interface. 2 3 Figure 4-40: Log Off screen You will see the System Status screen with some prompts. At this point, you can choose among the following options: • Log back in • Go to the Configuration Wizard, which will require you to log back in but will then take you directly to the wizard • Continue the logoff by closing your browser S100 User Guide – Rev. D – June 2005 5 85 SyncServer S100 86 S100 User Guide – Rev. D – June 2005 Chapter 5 Operations & Time-Protocols S100: Operations and Time Protocols 2 Sysplex Timer “Sysplex” means SYStem comPLEX, a term often used to describe continuous computing on clusters of computers. The Sysplex Timer is sometimes called an External Time Reference (ETR). The Sysplex Timer provides a synchronized Time-of-Day (TOD) clock for multiple attached computers. A Sysplex is needed when two or more systems are configured in a Sysplex. One Sysplex Timer can do the job, but it’s a good idea for you to have a second duplex timer on the cluster as a backup in case the primary timer fails. 3 How the S100 Uses the Sysplex Timer The S100 receives the signal from the GPS antenna, then provides Sysplex Timer output through its Serial Port A. The Serial Port A supplies an ASCII broadcast of UTC time that is often used by computers that cannot or do not use NTP. Note: The GPS antenna described in this manual has been replaced as described in “Appendix E” on page 141. Be sure your computer is set up with the correct Serial Port parameters—the correct baud rate, data bits, stop bits, and parity. The Serial Port will start broadcasting the time only after it receives a c or C character. It will stop broadcast when it receives an r or R character. If you set the Sysplex Timer to Auto on, the Sysplex Timer starts automatically on power up. 5 The following time information string is transmitted once per second, when started with the c or C character. The DDD field represents three ASCII digits of days (001–366). The Quality Indicator indicates the validity of the time. The Carriage Return character is transmitted ontime. The first rising edge of the Carriage Return character occurs within 100 microseconds after the S100 1PPS signal transitions from low to high. S100 User Guide – Rev. D – June 2005 87 SyncServer S100 Figure 5-41: Time Information String Parameters Comm parameters can be controlled by modifying the /etc/.ss_profile file. Various operational parameters for the sysplex daemon can be controlled using parameters in the .ss_profile file. Use the serial connection or SSH to login to the S100 in order to change this file. Set the value of the SYSPLEX_PROGRAM environment variable by adding or removing the # comment character in the first column. For example: # which sysplex program shall we run SYSPLEX_PROGRAM=sysplex #SYSPLEX_PROGRAM=sysplexoddp #SYSPLEX_PROGRAM=sysplexnof #SYSPLEX_PROGRAM=sysplexoddpnof SYSPLEX_OPTIONS=on will run the standard (9600,8,n,1) version of the protocol while: # which sysplex program shall we run #SYSPLEX_PROGRAM=sysplex SYSPLEX_PROGRAM=sysplexoddp #SYSPLEX_PROGRAM=sysplexnof #SYSPLEX_PROGRAM=sysplexoddpnof SYSPLEX_OPTIONS=on 88 S100 User Guide – Rev. D – June 2005 will run the odd parity (9600,8,o,1) version of the protocol. The currently available versions of the protocol are: • sysplex (9600,8,n,1) • sysplexoddp (9600,8,o,1) • sysplexnof (9600,8,n,1) with the 'F' (see sysplex definition) suppressed. • sysplexoddpnof (9600,8,o,1) with the 'F' (see sysplex definition) suppressed. 2 The SYSPLEX_OPTIONS environment variable can be set to either "on" or blank. A value of "on" will result in the sysplex protocol broadcast being automatically started instead of waiting for a start character. An empty or blank value will not. Note: NOTE: The sysplex daemon must be restarted in order for the changes to take effect. The easiest way to do this is to reboot the box using either the web interface or the reboot command. If there are any problems, a copy of the factory profile is kept in the /etc directory with the name .ss_profile.original . The factory settings may be restored by copying the backup file over the modified version using: 3 cp /etc/.ss_profile.original /etc/.ss_profile Time Protocol (RFC 868) This protocol provides a site-independent, machine-readable date and time. The time service on the S100 responds to the originating source with the time in seconds since midnight of January 1, 1900. The time is the number of seconds since 00:00 (midnight) January 1, 1900 GMT. So the time “1” is 12:00:01 A.M. on January 1, 1900 GMT. This base will serve until the year 2036. If the server is unable to determine the time, it either refuses the connection or it closes the connection without sending any response. 5 When used over the Transmission Control Protocol (TCP), the S100 listens for a connection on port 37; once the connection is established, the server returns a 32-bit time value and closes the connection. When used over the User Datagram Protocol (UDP), the S100 listens for a datagram on port 37. When a datagram arrives, the S100 returns a datagram containing the 32-bit time value. For additional information, see http://www.faqs.org/rfcs/rfc868.html Daytime Protocol (RFC 867) The Daytime protocol sends the current date and time as a character string without regard to the input. When used over TCP, the S100 listens for a connection on port 13; once a connection is established the current date and time is sent out as an ASCII character string. The service closes the connection after sending the quote. S100 User Guide – Rev. D – June 2005 89 SyncServer S100 When used over UDP, the S100 listens for a datagram on port 13. The S100 responds to the UDP request with the current date and time as an ASCII character string. For additional information, see: http://www.faqs.org/rfcs/rfc867.html. Simple Network Time Protocol (RFC 2030) Simple Network Time Protocol (SNTP) is a simplified access protocol for servers and clients using NTP as it is now used on the Internet. The access paradigm is identical to the UDP/ Time client implementation. SNTP is also designed to operate on a dedicated server configuration, including an integrated radio clock. SNTP uses the standard NTP time stamp format described in RFC 1305 and previous versions of that document. NTP stamps are represented as a 64-bit unsigned, fixed-point number, in seconds relative to 0h on January 1, 1900. For additional information, see: http://www.faqs.org/rfcs/rfc2030.html. Network Time Protocol (RFC 1305) The Network Time Protocol (NTP) is used to synchronize computer clocks in a TCP/IP computer network. It provides a comprehensive mechanism for accessing national time and frequency distribution services, for organizing the time-synchronization subnet, and for adjusting the local clocks. NTP provides accuracy of 1-10 milliseconds (ms), depending on the jitter characteristics of the synchronization source and network paths. NTP uses User Datagram Protocol (UDP), which is a sub-protocol of the Internet Protocol (IP). Some definitions follow. For more, see “Time Glossary” on page 121. For additional information, see http://www.faqs.org/rfcs/rfc1305.html. NTP Data Format The format of the NTP message data area, which immediately follows the UDP header, is shown in Figure 3-2. NTP time stamps are represented as a 64 bit unsigned fixed-point number, in seconds relative to 0h on 1 January 1900. The integer portion is in the first 32 bits and the fractional portion is in the last 32 bits. 90 S100 User Guide – Rev. D – June 2005 Table Intro-1: NTP Message Data 0 LI 8 VN MODE 16 Stratum 24 Poll 31 Precision Synchronizing Distance (Root Distance) (32 bits) Synchronizing Dispersion (Root Dispersion) (32 bits) Reference Identifier (32 bits) 2 Reference Time Stamp (64 bits) Originate Time Stamp (64 bits) Receive Time Stamp (64 bits) Transmit Time Stamp (64 bits) Authenticator (Optional) (96 bits) 3 Leap Indicator (LI) This is a two-bit code warning of an impending leap second that will be inserted or deleted in the last minute of the current day, with bit 0 and bit 1, respectively, coded as follows: 5 Figure 5-42: Two-bit Leap Second Indicator Code You are alerted to an alarm condition when the S100 is first powered on—in other words, before time is initially acquired from the timing signal. An alarm condition will also signal when the timing parameters are changed. This alarm condition will persist until the S100 acquires time. It should not signal again until the unit is powered off and on. Version Number (VN) This is a three-bit integer indicating the NTP version number. The S100 will return the version number from the incoming NTP message. S100 User Guide – Rev. D – June 2005 91 SyncServer S100 Mode This is a three-bit integer indicating the mode. The S100 can be operated in any mode. Stratum This is an eight-bit integer indicating the stratum level of the local clock. For the S100 this field is set to one indicating a primary reference, if the S100 is relying on its GPS receiver or dial-up modem connection for timing information. Otherwise, it will accurately reflect its location in a timing hierarchy. Poll Interval This is an eight-bit signed integer indicating the maximum interval between successive messages, in seconds to the nearest power of two. The S100 will return the poll interval from the incoming NTP message. Precision This is an eight-bit signed integer indicating the precision of the local clock, in seconds to the nearest power of two. For the S100 this field is set to –19 (minus nineteen), which is the value closest to the 1u sec precision of the S100 when operating in GPS mode. Synchronizing Distance (Root Distance Version 3) This is a 32-bit fixed-point number indicating the estimated round-trip delay to the primary synchronizing source, in seconds with fraction point between bits 15 and 16. Set to zero in the S100 for GPS mode and a corresponding value when operating with another time source. Synchronizing Dispersion (Root Dispersion Version 3) Synchronizing Dispersion is a 32 bit fixed-point number indicating the estimated dispersion to the primary synchronizing source, in seconds. Root Dispersion indicates the maximum error relative to the primary reference source. Reference Clock Identifier This is a 32-bit code identifying the particular reference clock. In the case of Stratum 1 (primary reference), this is a four-octet, left justified, zero-padded ASCII string. For the S100 the four-octet string is dependent on the time source selected, ‘GPS’ for GPS and ‘FREE’ for Free Running Clock. If the unit is synchronizing to another S100, the reference clock identifier will contain the four-byte address of the selected S100. Reference Timestamp This is the local time at which the local clock was last set or corrected, in 64-bit timestamp format. With the S100, the Reference Timestamp is the last time that a valid timing signal was 92 S100 User Guide – Rev. D – June 2005 detected. Therefore, the Reference Timestamp will indicate the time at which the timing signal was lost. When the timing signal returns, the Reference Timestamp will be updated. Originate Timestamp This is the local time at which the request departed the client host for the service host, in 64bit time stamp format. Receive Time stamp 2 This is the local time at which the request arrived at the service host, in 64-bit time stamp format. Transmit Time stamp This is the local time at which the reply departed the service host for the client host, in 64-bit time stamp format. 3 Authenticator This field is used to hold a cryptochecksum if authentication has been enabled. Refer to the next section for more information about this mechanism. Autokey This field contains various autokey parameter requests and responses if autokey is enabled for the association. These parameters can include signatures, certificates, or other data. NTP Authentication 5 NTP authentication enables an NTP client to ensure two things: that the time stamp received has come from a trusted source, and that it has not been modified in transit. Because Symmetricom has extended the authentication method, you can use it to deny service to unauthorized clients who submit NTP time stamp requests. The NTP protocol includes space for two variables related to authentication: an authentication key identifier field and a cryptochecksum field. Authentication: NTP v3 The NTP client can operate with both non-authenticated and authenticated servers. This approach uses symmetric-key cryptography. Thus, keys and key identifiers are determined in advance and distributed in traditional ways. S100 User Guide – Rev. D – June 2005 93 SyncServer S100 The message digest is computed using preferred Message Digest 5 (MD5). An alternative is the Digital Encryption Standard, Cipher Block Chaining (DES-CBC). The Message Authentication Code (MAC) is made up of a key identifier, then the message digest. Keys are held in a key cache; the cache is initialized from a private file. Authentication: NTP v4 Autokey NTP v4 uses public-key cryptography, meaning all keys are random, and private keys are never revealed. A certificate scheme binds the public key to the server identification. Symmetric-key cryptography uses fixed private keys that must be distributed in advance. The Diffie-Hellman model defines the key agreement, and is required for private random keys. Public Domain NTP Package For clients not using the public domain NTP package, the NTP packet is enlarged by 8 bytes to handle the entire cryptochecksum, which is 16 bytes (128 bits) in size as generated by the MD5. Since this field is the last in the packet, it should not present any difficulty. How NTP Defines the Authentication Process If authentication is enabled, and a valid authentication key identifier and cryptochecksum is received, then the NTP packet is filled in and a new cryptochecksum is computed and added to the packet. The packet is then sent back to the client. More information For more about NTP authentication, see both the NTP help available from the S100 web interface and from: http://www.ntp.org. Typical NTP Configuration Considerations This section provides additional information on using NTP and network configuration. The examples provided for explanatory purposes only. 94 S100 User Guide – Rev. D – June 2005 Other NTP Considerations The following are information modules regarding NTP. They are used here as a FYI. Clients An NTP client can have a number of servers, and broadcast and non-broadcast servers can be used by the same client. NTP clients synchronize their time to match NTP servers, while NTP servers never synchronize their time to match NTP clients. However, NTP clients can also be NTP servers to clients of their own. 2 There are several points to consider for various client configurations. Normal NTP clients are set up with the server keyword, while broadcast and multicast clients are setup with the broadcastclient and multicastclient keywords. There is no client keyword. 3 Setting up a computer as an NTP client requires adding several lines to the ntp.conf file and restarting ntpd. For example, configure the NTP client to synchronize with a couple of alternate NTP servers in the event the primary NTP server is unavailable. This is important since an failure of the primary NTP server is unlikely to be noticed promptly. The client servers should be as independent as possible. The dependency chain of an NTP server can be determined by running the ntptrace command with each server. If possible, servers should not share common NTP parents. To identify a server as preferred, enter the keyword “prefer” to the right of the server name/IP address. A preferred server will be used as a synchronization source if it meets a minimum accuracy level, even if there are other more accurate servers. However, if a preferred server is far outside of the accuracy bounds determined by consulting other servers, it will be discarded. In general, a server will not fall outside these accuracy bounds unless it or the majority of other servers are misconfigured. Using preferred servers allows setting up clients to prefer a clock that is known to be very accurate. The time exchange between the client and server can also be protected with an authentication key. 5 Clients can also be configured to respond to broadcast or multicast packets sent by a broadcast or multicast NTP server. Broadcast and multicast are generally used as the primary server on a LAN or subnet. Using broadcast or multicast allows synchronizing a large number of clients without creating large amounts of NTP traffic. In addition, servers can be changed easily, since clients do not listen for a specific server when they are in broadcast mode. Because the links are mostly local, this allows accurate synchronization for the clients. The important NTP servers within an enterprise (generally low stratum numbers) and any servers separated by large distances or low latency links should use non-broadcast mode in order to maintain close synchronization. If the clients are not configured to synchronize with a specific group of servers, a rogue system can influence the synchronization process by broadcasting invalid time information. To defend against this threat, authentication and access control should be used to help limit potential synchronization sources. S100 User Guide – Rev. D – June 2005 95 SyncServer S100 Basic NTP Configuration No special configuration is required for a machine with a running NTP to be used by other network nodes as a standard server (as opposed to a broadcast server or peer). However, access control is needed to prevent a machine from acting as an NTP server to clients. Further, operating as a broadcast server or a peer server involves additional configuration. Basic guidelines for architecting an NTP solution, should include: 1. 2. Limiting single points of failure and maximizing independence Controlling network impact 3. Enabling access control 4. Selecting appropriate reference clocks Single points of failure can be reduced by assuring that client servers are as independent as possible. Using a number of independent servers reduces the effectiveness of an incorrectly configured server spoofing the time, and thus increases security. Verifying NTP server independence can be difficult. To effectively map the dependencies on an NTP subnet, each of the peers and servers must be mapped. Use ntptrace to determine the hierarchy of time sources used by a client. It can then be easily identified if two machines share common time servers. A client should always receive time from at least four servers. This will reduce the chances of it losing synchronization when a server fails. If fewer than four servers are used, the agreement algorithm cannot reliably detect a clique including a majority of trusted sources. An easy solution is to use three servers from a lower stratum number and one unrelated peer from the same stratum. The goals of an NTP architect are two-fold: to limit NTP’s network activity and increase the accuracy of the clocks. To achieve high clock accuracy, the network latency needs to be low. NTP can achieve a high level of accuracy and remain a good network citizen if local NTP servers are used and NTP servers use the appropriate modes. The easiest way to increase accuracy in an NTP configuration is to reduce the latency between the connections by putting NTP servers on the same LAN as their clients. If a LAN is very large, it is a good idea to have multiple servers in different geographic or network segments. However, if several independent servers are used, the NTP clock selection algorithms will probably help mitigate the effects of any increased latency. Another advantage to using local servers is that they tend to reduce the load on the WAN, though NTP is unlikely to be a big source of network load. Another way of reducing NTP traffic, while keeping clock accuracy, is to use appropriate server modes. Central servers (generally stratum 1 and 2 servers) should use non-broadcast server/client mode or peer mode, which allows more accurate time distribution. These servers are generally geographically distributed; therefore, the accuracy of the time distribution is critical. Broadcasting over high latency links can lead to very inaccurate time, both because of the latency and because it is likely the latency will be variable and unpredictable. Using broadcasting or multicasting over relatively local connections is acceptable. In fact, for a local server with a large number of clients and a fairly constant network latency broadcasting or 96 S100 User Guide – Rev. D – June 2005 multicasting is likely to be nearly as accurate as using a nonbroadcast server. Multicasting is preferable to broadcasting because it makes identifying NTP traffic easier and does not affect non-NTP clients on the network. Broadcasting or multicasting is a good fit in some environments, however, it is not appropriate for all environments. In particular, architectural or security concerns may preclude the use of broadcasting or multicasting. Multicast NTP transactions open the network to denial of service attacks. For security conscious environments, monitoring should be turned off because it could allow an attacker to obtain sensitive information about hosts or networks. In most other environments, disabling monitoring is an unnecessary restriction and only makes it more difficult to solve NTP problems. Requiring authorization keys for queries is another option. Limiting access to NTP queries prevents intruders from probing for information using the ntpq command. While the information obtained from ntpq may seem trivial, an intruder could discover sensitive information, including network delays (which could lead to determining network architecture), hostnames, IP addresses, and OS versions. In addition to authenticated transactions, NTP also provides the capability to restrict access to its services. This function is provided using the restrict keyword. This keyword is defined in the ntp.conf file and has the following syntax. 2 3 The address and mask are both representations of the IP address and network subnet mask to be restricted. The flags indicate what function is to be controlled. For example, if all communication from IP address 192.xxx.x.x is to be ignored, the following access restriction can be used. The restrict command is often used with the default keyword, which limits the specified access from all IP addresses. restrict address [ mask numeric_mask ] [ flag ] [ ... ] restrict 192.xxx.x.x ignore restrict default ignore Any restrict statements that do not contain a keyword will enable (rather than restrict) access. Additional keywords such as noquery are also useful. Noquery restricts who can query the run time configuration of the time server. While having the ability to query the server would appear to be harmless, the query function can be useful in mapping network time architectures and locating potential security weaknesses. For example, with the ntpsweep command (supplied from the open-source NTP software distribution), it is possible to determine the operating system and processor type of NTP peers. This function can be restricted using the noquery option, otherwise queries are allowed. The version information seen by outsiders could be modified to mask the OS version, but few administrators take the time to obscure this information. This allows system intruders to easily obtain information about the operating system platforms and versions. Security is only as strong as the weakest link. For NTP, this means not only its access control and authentication but also the platform security of its servers and clients. If a platform cannot be sufficiently protected, it is possible that the NTP configuration and authentication key files can be stolen or compromised. 5 A reference clock is needed to synchronize an NTP network to a useful standard. Clients cannot sync to a potential NTP server unless a reference clock exists in the server’s synchronization path. There are three different ways to set up an NTP server for a large number of clients: • Set up a reference clock on a secured network that uses accurate public NTP servers • Set up a reference clock directly on a secured network S100 User Guide – Rev. D – June 2005 97 SyncServer S100 • Use a server’s local clock as a reference clock (not a good idea) Synchronizing the server to a public NTP server is the most common route for most small installations. Use the ntptrace command to obtain a general idea of the server's quality. It is important to find a server that is peered with several other servers to provide robustness. The NTP protocol is designed as a hierarchy to prevent large numbers of clients from accessing the same primary time sources. A large number of clients should not be configured to hit a busy stratum 1 time server. Networks should be designed to minimize the number of servers that interact with public NTP servers. In addition, because public stratum 1 servers are often overloaded, stratum 2 servers should be used except for large (over 100 clients) NTP configurations where highly accurate time is critical. A list of public NTP servers (along with a list of things to consider when using them) is available at: . For additional information about NTP, see http://www.eecis.udel.edu/~mills/ntp/servers.html. For secure environments where synchronized time is critical, it may not be appropriate to use a public reference clock. However, it is still important to use an external time source; otherwise, if the primary clock in the data center wanders, it causes all of the NTP clients connected to it to wander with it. Another option is to place the main NTP sources for the enterprise on secure management networks and have them receive time from external servers. However, as with any externally provided service, it is also an entry point for attackers. Therefore it is important to keep the servers independent and well secured. A layered security approach should be used that encompasses isolated network segments and systems, in addition to platform and NTP security measures. For example, NTP servers could be deployed on independent platforms running only the NTP service. In addition, the servers should use the access control and authentication facilities in NTP to further restrict access to the service. If possible, only authenticated NTP packets should be accepted. The server should also only accept packets from known, approved sources. For additional security, the NTP packets could be tunneled between the NTP sources and their external servers over encrypted connections. As a rule, the preferred configuration is at least three coordinated time servers providing service throughout the administrative domain including campus networks and subnetworks. Each of these should obtain service from at least two different outside sources of synchronization, preferably using a different gateways and access paths. These sources should all operate at the same stratum level, which is one less than the stratum level to be used by the local time servers themselves. In addition, each of these time servers should peer with all of the other time servers in the local administrative domain at the stratum level used by the local time servers, as well as at least one (different) outside source at this level. This configuration results in the use of six outside sources at a lower stratum level (toward the primary source of synchronization, usually a radio clock), plus three outside sources at the same stratum level, for a total of nine outside sources of synchronization. The actual load on network resources is minimal, since the interval between polling messages exchanged between peers usually ratchets back to no more than one message every 17 minutes. The stratum level to be used by the local time servers is an engineering choice. As a matter of policy, and in order to reduce the load on the primary servers, it is desirable to use the highest stratum consistent with reliable, accurate time synchronization throughout the administrative domain. In the case of enterprise networks serving hundreds or thousands of client file servers and workstations, conventional practice is to obtain service from stratum-1 primary servers. It is important to avoid loops and possible common points of failure when 98 S100 User Guide – Rev. D – June 2005 selecting these sources. Note that, while NTP detects and rejects loops involving neighboring servers, it does not detect loops involving intervening servers. It is strongly advised, and in practice for most primary servers today, to employ the authentication or access-control features of the NTP specification in order to protect against hostile intruders and possible destabilization of the time service. Using this or similar strategies, the remaining hosts in the same administrative domain can be synchronized to the three (or more) selected time servers. Assuming these servers are synchronized directly to stratum-1 sources and operate normally as stratum-2, the next level away from the primary source of synchronization, for instance various campus file servers, will operate at stratum 3 and dependent workstations at stratum 4. Engineered correctly, such a subnet will survive all but the most exotic failures or even hostile penetrations of the various, distributed timekeeping resources. 2 When planning your network, keep in mind a few generic don'ts, in particular: • Don't synchronize a local time server to another peer at the same stratum, unless the latter is receiving time from lower stratum sources the former doesn't talk to directly. This minimizes the occurrence of common points of failure, but does not eliminate them in cases where the usual chain of associations to the primary sources of synchronization are disrupted due to failures. 3 • Don't configure peer associations with higher stratum servers. Let the higher strata configure lower stratum servers, but not the reverse. This greatly simplifies configuration file maintenance, since there is usually much greater configuration churn in the high stratum clients such as personal workstations. • Don't synchronize more than one time server in a particular administrative domain to the same time server outside that domain. Such a practice invites common points of failure, as well as raises the possibility of massive abuse, should the configuration file be automatically distributed do a large number of clients. 5 The following diagrams depict typical NTP configurations from large to small networks. Use these as a guide when creating your own. S100 User Guide – Rev. D – June 2005 99 SyncServer S100 Figure 5-43: Large Net NTP Configuration 100 S100 User Guide – Rev. D – June 2005 Figure 5-44: Large Net NTP Configuration 2 2 3 5 S100 User Guide – Rev. D – June 2005 101 SyncServer S100 Figure 5-45: Small Net NTP Configuration Figure 5-46: Small Net NTP Configuration 102 S100 User Guide – Rev. D – June 2005 Figure 5-47: Minimum Net NTP Configuration Peers Setting up a peer can be accomplished by adding the peer command to the ntp.conf file. The configuration of a peer is basically the same as setting up a client: an address or host name needs to be specified, along with a key and possibly the prefer keyword. Peers also have an associated polling interval that can be set in the ntp.conf file. While a set of peers can use different polling intervals, true peers use the same polling interval. The defaults should be acceptable except when peers are connected by very slow links. Setting the polling range is described in the ntpd man page. Generally, peer connections are used to improve the time accuracy at the base of the NTP tree (low numbered strata), or provide additional redundancy at the leaves of the NTP tree (high numbered strata). Using peer connections allows both of these without resorting to creating a new level of hierarchy. 2 Security 3 NTP provides the capability for NTP clients and servers to authenticate each other. This is accomplished with symmetric authentication keys and key identifiers. The term symmetric means that the keys must be the same on both the client and the server. Because NTP keys are stored outside of the ntp.conf file, the NTP keys file must be specified in the ntp.conf file for any configuration that will use keys. This is accomplished using the keys keyword, followed by the absolute path to the file. With NTP version 3, authentication keys must be manually distributed to each of the client systems (NTP version 4 can use an automatic public key distribution, which is fully described in the NTP version 4 documentation). Caution must be exercised when transferring these keys to each client system. Be sure to use a protocol that supports strong authentication and encryption. 5 Establishing authenticated communication between a client and server requires configuration on both the client and the server. In order for authentication to work, both the client and the server must have a keys.conf file specified in ntp.conf that contains the same key with the same key ID. In other words, both the client and the server should have a line in the keys.conf file that is identical. ACTS Interface: Dial-up The Automated Computer Time Service (ACTS) is maintained by the U. S. National Institute of Standards and Technology (NIST). More information is in the next section. In most of this guide, the term dial-up is used instead. S100 User Guide – Rev. D – June 2005 103 SyncServer S100 ACTS Operation Use the S100’s web-based interface to configure this method of access to time (for information, see “Main Settings” on page 65). ACTS provides a backup time service through an ASCII time broadcast, and supports a measured delay mode for enhanced accuracy. This service is based on the use of asynchronous modems. It is designed to coexist with a standard IRIG B time code input. The S100’s ACTS operation includes simultaneous support of both client and server modes. This means the S100 can obtain time information from a remote site through an ACTS client connection while providing server capabilities such as distributing time information to local clients or other S100 units. When services are available, an ACTS client call will not modify the S100 clock if the unit is currently decoding a valid time code signal. More Information For more about NIST and ACTS: http://www.boulder.nist.gov/timefreq/service/acts.htm SNMP (Simple Network Management Protocol) By default, the S100 has both SNMP version 1 and SNMP version 3 enabled upon bootup. Version 1 can be configured using the S100 web interface. The S100 supports MIB 2. The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. Three versions of SNMP exist: SNMP version 1 (SNMP v1), SNMP version 2 (SNMP v2), and SNMP v3. All versions have a number of features in common, but SNMP v2 offers additional protocol operations. SNMP Version 3 (SNMP v3) provides much greater security than the previous two. The S100 supports SNMP v1 and v3. An SNMP-managed network consists of three key components: managed devices, agents, and network-management systems (NMSs). A managed device is a network element that contains an SNMP agent and that resides on a managed network. These devices collect and store management information and make this information available to Network Management Systems using SNMP. Managed devices, or called network elements, can be routers and access servers, switches and bridges, hubs, computer hosts, or printers. An agent is a software module that resides in a managed device. This agent has local knowledge of management information and translates that information into a form compatible with SNMP. 104 S100 User Guide – Rev. D – June 2005 NMS executes applications that monitor and control managed devices. One or more NMSs must exist on any managed network. There are four basic SNMP commands: read, write, trap, and operations: • The read command is used to monitor managed devices. The NMS examines different variables that are maintained by managed devices. • The write command is used to control managed devices. The NMS changes the values of variables stored within managed devices. • The trap command is used to report events to the NMS. When certain types of events occur, a managed device sends a trap to the NMS. 2 • Operations are used to determine which variables a managed device supports and to gather information in tables, such as a routing table. A Management Information Base (MIB) is a collection of information that is organized hierarchically. MIBs are accessed using a network-management protocol such as SNMP. They are managed objects and are identified by object identifiers. 3 A managed object (called a MIB object, an object, or a MIB) is one of any number of characteristics of a managed device. Managed objects are comprised of one or more object instances or variables. The SNMP manager is part of the Network Management System such as Spectrum, HP Open View or Cisco Works. Information is traded between the NMS and the network. NMS gathers, controls and monitors using information from the network. There are three catagories: Statistics, Current Status and Alerts. Statistics (Traffic, CPU process) are gathered and stored. Current Status data is monitored (i.e., links). Alerts are reports of any unusual activity in the network. There are two types of managed objects: single objects and multiple related objects. An example of a single object is atInput, which is an object that contains an integer value that indicates the total number of input packets on a router interface. An object identifier (or object ID) uniquely identifies a single object in the MIB hierarchy. The MIB hierarchy can be depicted as a tree with a nameless root, the levels of which are assigned by different organizations. 5 The top-level MIB object IDs belong to different organizations, while lower-level object IDs are allocated by associated organizations. Vendors can define private branches that include managed objects for their own products. There are MIBs for Ethernet, Token Rings, Routing, ATM, Frame Relay etc. Version 1 SNMP version 1 (SNMP v1) was the first implementation of the SNMP protocol. It is described in Request For Comments 1157 (RFC 1157) and functions within the specifications of the Structure of Management Information (SMI). SNMP v1 operates over protocols such as User Datagram Protocol (UDP), Internet Protocol (IP), OSI Connectionless Network Service (CLNS), AppleTalk Datagram-Delivery Protocol (DDP), and Novell Internet Packet Exchange (IPX). SNMP v1 is widely used and is the de facto network-management protocol in the Internet community. S100 User Guide – Rev. D – June 2005 105 SyncServer S100 SNMP is a simple request/response protocol. The network-management system issues a request, and managed devices return responses. This is implemented using one of four operations: Get, GetNext, Set, and Trap. The Get operation is used to retrieve the value of one or more object instances from an agent. If the agent responding to the Get operation cannot provide values for all the objects in a list, it does not provide any values. The GetNext operation is used to retrieve the value of the next object in a table or a list within an agent. The Set operation is used to set the values of object instances within an agent. The Trap operation is used by agents to inform the NMS of a significant event. SNMP v1 has no authentication capabilities, which increases vulnerability to security threats. These include masquerading occurrences, modification of information, message sequence and timing modifications, and disclosure. Masquerading consists of an unauthorized entity attempting to perform management operations by assuming the identity of an authorized management entity. Modification of information involves an unauthorized entity attempting to alter a message generated by an authorized entity so that the message results in unauthorized accounting management or configuration management operations. Message sequence and timing modifications occur when an unauthorized entity reorders, delays, or copies and later replays a message generated by an authorized entity. Disclosure results when an unauthorized entity extracts values stored in managed objects, or learns of notifiable events by monitoring exchanges between managers and agents. SNMP does not implement authentication, many vendors do not implement Set operations, thereby reducing SNMP to a monitoring facility. Note: The S100 does not support SNMP Version 2. Version 3 This contains many new security features that have been missing from the previous versions. Both SNMP v1 and SNMP v2c are highly insecure. SNMP v3 introduces advanced security splitting the authentication and the authorization into two facets: • The default User-based Security Module (USM) lists the users and their attributes. The USM is described by RFC 2574. • The VACM is the Version-based Access Control Module and controls which users (and SNMP v1/v2c communities as well) are allowed to access and how they can access sections of the MIB tree. The VACM is described by RFC 2575. In this version, each user has a name (called a securityName), an authentication type (authProtocol), and a privacy type (privProtocol) as well as associated keys for each of these (authKey and privKey). Authentication is performed using a user’s authKey to sign the message being sent. The authProtocol can be either MD5 or SHA. The authKeys (and privKeys) are generated from a passphrase that must be at least 8-10 characters in length. Authentication is performed using a user’s privKey to encrypt the data portion the message being sent. The privProtocol can only be DES at this time. Messages can be be sent unauthenticated, authenticated, or authenticated and encrypted by setting the securityLevel to use. 106 S100 User Guide – Rev. D – June 2005 All of this information is passed to commands using the command line arguments described in the table below. An authenticated request example: COMMAND: snmpget -v 3 -n "" -u MD5User -a MD5 -A "The UCD Demo Password" -l authNoPriv 255.255.255.255 sysUpTime.0 RESPONSE: system.sysUpTime.0 = Timeticks: (83491735) 9 days, 15:55:17.35 An authenticated and encrypted request example: 2 COMMAND: snmpget -v 3 -n "" -u MD5DESUser -a MD5 -A "The UCD Demo Password" -x DES -X "The UCD Demo Password" -l authPriv 255.255.255.255 sysUpTime.0 RESPONSE: system.sysUpTime.0 = Timeticks: (83493111) 9 days, 15:55:31.11 3 Table 2: Command Line Arguments Parameter Command Line Flag Snmp.conf token securityName -u NAME defSecurityName NAME authProtocol -a (MD5|SHA) defAuthType (MD5|SHA) privProtocol -x DES defPrivType DES authKey -A PASSPHRASE defAuthPassphrase PASSPHRASE privKey -X PASSPHRASE defPrivPassphrase PASSPHRASE securityLevel -l (noAuthNoPriv|authNoPriv|authPriv) defSecurityLevel (noAuthNoPriv|authNoPriv|authPriv) context -n CONTEXTNAME defContext CONTEXTNAME 5 The host shown above allows us to look at it using any level of authentication. Any hosts you set up should be more restricted than that and require at least a level of authNoPriv when you configure the VACM access control. Setting up your snmp.conf file to look like this, makes your commands much simpler: defContext none defSecurityName MD5User defAuthPassphrase The UCD Demo Password defVersion 3 defAuthType MD5 defSecurityLevel authNoPriv COMMAND: snmpget test.net-snmp.org sysUpTime.0 RESPONSE: system.sysUpTime.3.0 = Timeticks: (83517052) 9 days, 15:59:30.52 S100 User Guide – Rev. D – June 2005 107 SyncServer S100 108 S100 User Guide – Rev. D – June 2005 Chapter 6 Frequently Asked Questions Questions 2 How can we obtain NTP client software to use with the S100? NTP client software information and configuration details are available from http:// www.ntp-systems.com 3 Client software and configuration information for Unix platforms can be downloaded from http://www.ntp.org. SNTP client software is included with the S100 hardware. What are the main differences between SNTP and NTP clients? SNTP (Simple Network Time Protocol), based on RFC 1361/RFC 2030, gets its time from the specified time servers of the machine on which it is installed. NTP, Network Time Protocol, is based on RFCs 1305 and 1119, and can be configured to obtain and distribute the time on the network. It has a built-in algorithm that calculates the time accurately up to 1-10 milliseconds. The algorithm can be configured to obtain time from an alternate source in case the original time server fails or gets out of synchronization. 5 Is there a way to get GPS time instead of UTC time from the S100? The S100 normally provides UTC time. However, it can be configured to output GPS time— currently UTC + 13 seconds—by making several hardware changes to the unit. Contact your Symmetricom representative about this. What outputs are available on the S100? These are: • Dual Ethernet 10/100BaseT (RJ 45) • RS-232 Serial Console (DCE) • Sysplex timer port S100 User Guide – Rev. D – June 2005 109 SyncServer S100 • With an optional Rubidium oscillator installed, an IRIG time code output and an IRIG time code input are available from the Rubidium oscillator cable. On units without the Rubidium oscillator, a D-BNC Signal Breakout Cable BC11576-1000 provides a 1 PPS output, an IRIG time code output, and an IRIG time code input. How does the S100 handle Leap Second? Today’s clocks keep pace with one another to within two or three millionths of a second over a year’s time. However, the earth on its rotation can accumulate almost a full second of error in a year. This time is deleted (or added, if needed) as a leap second from (or to) the UTC time on the last day of June or December in the affected year. This way, the clocks stay in step with the earth’s rotation. The GPS satellites send notice of an upcoming leap second about two months in advance. The S100 receives this notice and, following NTP specifications, starts advising clients 24 hours in advance. At the leap second event, the S100 will add or delete the leap second from the transmitted time. Note: The S100 will do the same to an IEEE 1344 IRIG B signal. However, in the event of a leap second, if the time source is regular IRIG B, dial-up, 1PPS, or Freerun (including ACTS), you must pre-program the leap second event with the command leap so that the S100 can be notified and maintain time correctly. What signal strengths are required by the S100 receiver to start tracking? The S100 requires four satellite signals with strengths greater than 6 to turn the tracking LED on. After tracking, the S100 requires only one satellite signal to maintain its time. If it loses the fourth signal, the S100 enters a holdover state and continues providing time. How do I check versions of the software in the S100? To check the software version, use the web-based administrative interface main admin menu, System Status page. What is the maximum number of computers that can be networked to the S100? The S100 acts as a standalone time server. Average time to process the NTP request is less than 1 millisecond. Testing has shown the S100 can handle approximately 10,000 requests per second. However, clients running as Stratum 2 computers access the S100 in an interval of 64 to 65,536 seconds as the time progresses. The optimum number of computers is based on the capability of the network and on the acceptable level on load on the network. 110 S100 User Guide – Rev. D – June 2005 How many satellites are necessary for me to operate the S100? Four. The unit will usually track six to eight satellites. How do I know if the satellite signal strength is good? Any signal over 6 is good and usable by the S100. The unit will continue to track a satellite down to 3 once it has acquired it at a level 6 or over. 2 What is the maximum antenna cable length for use with the S100? A maximum length of 300 feet can be used with the standard (Bullet II) antenna. From 300– 500 feet, the High-gain Antenna option is required. If you need longer lengths, please contact Symmetricom Customer Assistance (see “Appendix D” on page 137). 3 Note: The GPS and bullet antennas and antenna cables described in this manual have been replaced as described in “Appendix E” on page 141. What are the available antenna cable lengths and antenna requirements? Use the following table: Cable length and Type Antenna 50-100 feet (15-30m), Belden RG-58 Standard Bullet-type 100-300 feet (30-91m), Belden 9913 Standard Bullet-type 100-300 feet (91-152m), Belden 9913 High-gain Over 500 feet (152m) Contact Symmetricom 5 Note: The bullet antenna cable described in this manual has been replaced as described in “Appendix E” on page 141. What are some guidelines for correctly cutting the cable, using splitters, and using cable connectors? Some critical “do’s and don’ts” are: • Do use pre-made kits from Symmetricom. • Do install the antenna where there are no obstructions—either on the roof, or an unobstructed view of at least 30-degrees above the horizon. • Do not split the antenna cable signal to try to use the signal to drive other GPS devices. • Do not cut the cable to a shorter length. Instead, bundle any excess cable. Correct antenna cable length—even if you do not “use it all”—is critical to proper S100 operation. The cable should have a gain within 15dB–25dB. S100 User Guide – Rev. D – June 2005 111 SyncServer S100 How many NTP requests can be processed by the S100 each second? More than 5,000 requests per second can be processed. Does the S100 support NTP v4? The S100 does incorporate the added functions of NTP v4. Specifically, the S100 supports the autokey scheme to secure the delivery of the NTP packets to NTP v4 clients as well as authentication of the server to the client. Can the S100 utilize a certificate from an external CA? The S100 can acquire a digital certificate from a public or private CA. The ability to generate a PKCS 10 certificate request is supported from the S100 secure web interface. How is the interface to the S100 secured? The S100 supports a https (SSL) interface for remote client management. What security functions are provided with the S100? • NTP v3: crypto check sum • NTP v4: Autokey • Https: SSL v3 (web based user interface) • SSH: SSL v3 remote login (secure terminal interface) Does the S100 support any functions to restrict user access to NTP service? Can the S100 set up clients' IP address to be connected? The S100 can be configured with a IP address-based restrict list to selectively deny NTP service to a subnet or a single network client. Refer to the “restrict” command in the NTP documentation. What is the bandwidth utilization (TCP/IP) each time an NTP client gets a time update from the NTP server? Standard NTP request is a 48-byte UDP packet and the reply is the same. NTP v3 authentication adds 12 or 16 bytes to that, on request and reply. NTP v4 adds about the same with a few extra overhead packets. 112 S100 User Guide – Rev. D – June 2005 Depending on the type of client software, requests can be made by a client anywhere from 1 per minute to 1 per day but a good average for Unix clients is 1 every 15 minutes and 1 every 60 minutes per Windows client. So, for every 1,000 clients (guessing 90% Windows and 10% Unix), you would see 900 packets per hour from the Windows clients and 400 packets per hour from the Unix clients. Or, 1300 packets / hours * (48 bytes/packet request + 48 bytes/packet response) = 124800 bytes/hour or about 35 bytes/sec. A generous estimate would be about one 48-byte packet per second (UDP) for every 1,000 clients. So, the network bandwidth for NTP over a 10Mbit network is very small and even less over higher rate networks, 100Mbit, 1Gbit, or 10Gbit. 2 Is NTP v4 compatible with Network Address Translation (NAT) gateways? NTP v4 autokey sessions do not work when the client and/or server are installed on a network behind a Network Address Translation (NAT) gateway. S100 users who wish to use NTP v4 should be aware that a NAT device cannot exist between the client and server. 3 This issue is addressed in the IETF draft doc Public key Cryptography for the Network Time Protocol - Version 2, at http://www.eecis.udel.edu/~mills/database/rfc/draftietf-stime-ntpauth-04.txt. Specifically, there are some scenarios where the use of endpoint IP addresses may be difficult or impossible. These include configurations where network address translation (NAT) devices are in use or when addresses are changed during an association lifetime due to mobility constraints. For Autokey, the only restriction is that the addresses visible in the transmitted packet must be the same as those used to construct the autokey sequence and key list and that these addresses be the same as those visible in the received packet. How does the S100 clock behave when a leap second is introduced? 5 NTP uses binary time so there is no concept of an hour, minute, or second count. NTP counts the number of seconds since Jan. 1, 1900 UTC time. When a leap second is introduced, the same major time will appear in the NTP packet for two seconds. The fractional minor time will cycle through twice. How-to’s and Tips Here are some guideposts to often-asked “how to” questions. Some answers will direct you to another part of this material, in Chapter 4, where there is more detail. S100 User Guide – Rev. D – June 2005 113 SyncServer S100 How to install NTP v4 on a UNIX system Requirements: A Unix system with compiler, standard tools and openssl installed. 1. 2. Download NTP tarball from www.ntp.org Extract the source using tar -xvf 3. Run the configuration and specify autokey using ./configure --withcrypto=autokey 4. Run make. 5. Make install. How to configure an NTP v4 client to connect to an NTP v4 server with the autokey scheme 1. 2. Create or modify /etc/ntp.conf and add a server line using vi (server autokey) Run ntpd and verify proper operation. How to verify NTP v4 autokey client connectivity with an NTP v4 server To confirm that a secure NTP v4 session with autokey has been established with a server, do one of the following : 1. 2. ntpdc command showpeer and look for the auth flag 3. Run ntpd -ddd and watch output for crypto statements and packet sizes ntpq command associations and look for auth category (ok) How to install your S100 All information about this is covered in “Installing Your S100” on page 19. How to get time using dial-up See “Dialup Settings dialog” on page 38 for details about this. How to get time using GPS See “GPS” on page 35. 114 S100 User Guide – Rev. D – June 2005 How to install your GPS antenna See “Installing the GPS Antenna” on page 23. How to acquire and install SymmTime™ To acquire SymmTime, download this free software from http://www.ntp-systems.com/symmtime.asp Directions on its installation are found in “Installing SymmTime” on page 49. 2 Use the quick “How to” guide This is found in “Introduction and Overview” on page 1 of this book. 3 How to change the root password The S100 is shipped with a default root password of symmetricom. For security reasons, it is a very good idea to change that password immediately. To change the root password, use the following steps: 1. 2. 3. Use HyperTerminal or Tera Term (included on the enclosed CD) on the serial port, or SecureShell using PuTTY (included on the enclosed CD). Log in as User root with Password symmetricom. Type the command passwd, all lower-case (UNIX commands are always case-sensitive). You will be prompted to type your new password, and then to type it again to confirm. This is what you will see: 5 [root@syncserv1 /root]# passwd New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully [root@syncserv1 /root]# Note: The password command “prefers” passwords containing a random variety of letters and numbers, and no common words. So if you use a recognizable word as the new password, you may get an error message that looks like this: [root@syncserv1 /root]# passwd New UNIX password: BAD PASSWORD: it is based on a dictionary word Retype new UNIX password: S100 User Guide – Rev. D – June 2005 115 SyncServer S100 passwd: all authentication tokens updated successfully [root@syncserv1 /root]# This is really an advisory in the form of an error message. The S100 will still accept a “dictionary” word as your password, despite this error message. However, we suggest that you take its advice seriously and use a random combination of letters and numbers. How to get information about NTP To learn more about NTP, use the following links: • http://www.ntp.org • http://www.faqs.org/rfcs/rfc1305.html Solutions This section offers solutions to some situations you may run into as you use the S100. If you need assistance contact Customer Assistance (see “Appendix D” on page 137). The S100 does not respond to ping command Use the S100 web interface to ping your client (see “Ping” on page 74). If your client cannot be reached with the ping command, the S100 provides a traceroute utility to show the path data is taking. Also check the Ethernet 10/100baseT cable connections between the RJ45 connector and the hub or network. The S100 does not respond to NTP queries If the S100 can be pinged, but it doesn’t respond to NTP queries, then verify that the NTP software on your computers is set up properly, and also verify that the client has the correct IP address of the S100. I cannot establish a serial connection with the S100 Make sure that the connection is made with the front panel serial console in the S100. Make sure you are using the correct COM port on your management PC (com1). 116 S100 User Guide – Rev. D – June 2005 Also check that the configuration settings are set to a VT100 ASCII terminal using 9600, 8, N, 1 and hardware flow control. Try pinging the S100 from your management PC, and the PC from the S100. Then use traceroute (see “Traceroute” on page 75) to check the path between the two; this should give you some useful data that will solve the problem. My S100 won’t track satellites 2 Possible cause of tracking problems: How to fix: Antenna not positioned correctly Be sure antenna is on the roof or location with at least a 30-degree view above the horizon, and at least two meters above other active receiving antennas and shielded from transmitting antennas Cable is cut to the wrong length, causing dB gain problems Replace with cable of correct length Incorrect connector(s) at the end(s) of the cable(s) or along the cable run, causing dB gain problems Replace with correct connector Incorrect use of splitters, including signal splitting to another GPS device or cable cut to wrong length Replace with splitter that does not “share” signal, on a cable of correct length 3 5 S100 User Guide – Rev. D – June 2005 117 SyncServer S100 118 S100 User Guide – Rev. D – June 2005 Appendix A S100 Specifications Note: The GPS antenna described in this manual has been replaced as described in “Appendix E” on page 141. 2 S100 Data Sheet Specifications Component Specifics Description Network Interface Ethernet over 10/100Base-T IEEE 802.3 specifications Connection Dual 10/100BaseT, Twisted Pair RJ45 Time Protocols NTP v2 (RFC 1119), NTP v3 (RFC 1305), NTP v4 (IETF Draft Standard), SNTP (RFC 2030), Time Protocol (RFC 868), Daytime Protocol (RFC 867) IRIG-B (120,122,123) Supported Protocols SNMP v3, TCP/IP, MD5 Authentication (NTP), SNMP v1 (RFC 1157), DHCP (RFC 2131), SSH (Secure Shell), HTTP/HTML/HTTPS (RFC 2616) Serial Connection Serial Port RS-232/DB9 DTE Software Time Utility (MS Windows) SymmTime™ (www.ntp-systems.com/ symmtime.asp) Timing Accuracy Network 1–10 milliseconds, typical GPS <1 microsecond ( relative to UTC, GPS tracking) Dial-up service <1-10 milliseconds, on sync Oscillator Rate stability: 5 x 10-7 Channels and Frequency Eight, C/A code Cable Type 50 feet (15.25m) /RG58 Antenna Size: 3.04”d x 2.94”h (7.72cm x 7.47cm) Operating temperature: -40°C to +85°C Acquisition <5 minutes A/C Power In 100–240VAC, Auto-switching 50-60 Hz Size and Weight 1.75”H x 17.0”W x 18”D (4.45cm x 43.2cm x 45.7cm) 1U Height Rack Mount, 18 lbs. (8.2Kg) GPS Input Chassis S100 User Guide – Rev. D – June 2005 3 5 119 SyncServer S100 S100 Data Sheet Specifications Component Specifics Description Operating & Storage Environments Temperature and Humidity 0°C to +45°C/5-95% @ 40°C Options Long Antenna Cable (Belden 9913), Lightning Arrester, High-gain GPS Antenna, GPS In-Line Amplifier, Rack Mount Slides Pin Descriptions P1: Ethernet RJ45 Description: 8-pin Phone Jack, Mfr: AMP, Part # 555153-1 Pin Number Description 1 TX (+) 2 TX (-) 3 RX (+) 4 N/C 5 N/C 6 RX (-) 7 N/C 8 N/C P3: Serial A (Data Terminal Port/DTE) Description: 9-pin “D” Plug, Mfr: AMP, Part # 869436 Pin Number Description 1 RS-232 Data Carrier Detect (in) 2 RS-232 Receive Data (in) 3 RS-232 Transmit Data (out) 4 RS-232 Data Terminal Ready (out) 5 Ground 6 RS-232 Data Set Ready (in) 7 RS-232 Request to Send (out) 8 RS-232 Clear to Send (in) 9 RS-232 Ring Indicator (in) 120 S100 User Guide – Rev. D – June 2005 Appendix B Time Glossary Access Control 2 The mechanisms of limiting entry to resources based on users’ identities and their membership in various predefined groups. The network resources with these access restrictions typically are servers, directories, and files. ACTS Automated Computer Time System, a NIST service that provides announced time by telephone. Advanced Encryption Standard (AES) 3 Developed by NIST and private companies, this standard is 256-bit based and is a stronger defense for sensitive material when compared to 40-bit or 128-bit. Algorithm A clearly specified mathematical process for computation, or set of rules, which, if followed, gives a prescribed result. ANSI American National Standards Institute, the organization responsible for approving US standards in many categories, including computers and communications. Standards approved by this organization are often called ANSI standards. Antiwarrant 5 Attribute certificate that has the same expire date as its valid date; in other words, it was never valid. This is still sent, at times, because it contains other information that the system needs. See also Warrant API Application Program Interface. This interface allows software developers to write their software so that it can communicate with the computer's operating system or other programs. ASCII American Standards Code Information Interchange, a code in which each alphanumeric character is represented as a number from 0 to 127, in binary code so the computer can understand it. Its simplicity allows diverse computers to understand one another. ATM Asynchronous Transfer Mode, or ATM switching. This is a type of packet switching that makes it possible to transmit data at high speeds over a network. It also allows dynamic S100 User Guide – Rev. D – June 2005 121 SyncServer S100 allocation of bandwidth, meaning users get only the bandwidth they need and are charged accordingly. Attribute Certificate A type of certificate that emphasizes certification of access rights and constraints. This is in contrast to Identity Certificate, which binds a distinguished name (DN) and a public key. Commonly, attribute certificates are issued with short validity periods and do not contain a public key value. Audit Trail A series of events, usually kept in and managed by a computer-based log, that give proof of a defined activity. Authentication The process by which people (or applications) who receive a certificate can verify the identity of the certificate’s owner and the validity of the certificate. Certificates are used to identify the author of a message or an entity such as a Web server or StampServer. Authorization The granting of access rights to a user, program, or process. Once you have authenticated a user, the user may be allowed different types of access or activity. BCD Binary Coded Decimal. Also called packed decimal, this is the representation of a number using 0s and 1s, or four-bit binary numbers. So the number 29 would be encoded as 0010 1001. Bureau International de l’Heure (BIPM) The worldwide organization that coordinates standard frequencies and time signals, the BIPM maintains Coordinated Universal Time (UTC). Calibration To fix the graduations of time measurement against the established national standard, including any periodic corrections that should be made. CDMA Code Division Multiple Access, a technique of multiplexing, also called spread spectrum, in which analog signals are converted into digital form for transmission. CDSA Common Data Security Architecture describes the security structure for an entire network. It is unique to each network because security is managed differently for each. Certificate Certificates are used to verify the identity of an individual, organization, Web server, or hardware device. They are also used to ensure non-repudiation in business transactions, as well as enable confidentiality through the use of public-key encryption. 122 S100 User Guide – Rev. D – June 2005 Certificate Authority (CA) A trusted entity that issues a certificate after verifying the identity of the person or program or process that the certificate is intended to identify. A CA also renews and revokes certificates and, at regular intervals, generates a list of revoked certificates. Certificate Extension An extension of the X.509 standard that lets the certificate hold additional identifying information. 2 Certificate Request A request containing a user’s public key, distinguished name (DN), and other data that is submitted to a Certificate Authority (CA) in order to receive a certificate. Certificate Revocation List (CRL) CRLs list certificates that have been revoked by a particular CA. Revocation lists are vital when certificates have been stolen, for example. 3 Certification Path A specified sequence of issued certificates necessary for the user to get their key. Confidentiality Keeping secret data from unauthorized eyes. Content Filtering A filter that screens out data by checking (for example) URLs or key words. Coordinated Universal Time (UTC) The international time standard is called Coordinated Universal Time or, more commonly, UTC, for “Universal Time, Coordinated”. This standard has been in effect since being decided upon in 1972 by worldwide representatives within the International Telecommunication Union. UTC is maintained by the Bureau International de l’Heure (BIPM), which forms the basis of a coordinated dissemination of standard frequencies and time signals. The acronyms UTC and BIPM are each a compromise among all the participating nations. 5 CR See Certificate Request Credential(s) Much like a photo ID or birth certificate, electronic credentials are recognized as proof of a party's identity and security level. Examples: certificate, logon ID, secure ID, and so forth. Cross-Certificate Two or more Certificate Authorities (CAs) that issue certificates (cross-certificates) to establish a trust relationship between themselves. Cryptography See Encryption S100 User Guide – Rev. D – June 2005 123 SyncServer S100 Data Encryption Standard (DES) Encryption method in which both the sender and receiver of a message share a single key that decrypts the message. Symmetricom Secure Network Time Protocol (SS/NTP) The protocol created by Symmetricom, based on NTP, that includes additional security features. DCLS Direct Current Level Shift, or digital IRIG. See also: IRIG Decryption The transformation of unintelligible data (“ciphertext”) into original data (“clear text”). Denial of Service When a network is flooded with traffic through any of a variety of methods, the systems cannot respond normally, so service is curtailed or denied. This is a favorite technique of network saboteurs. DES See Data Encryption Standard (DES) DHCP Dynamic Host Configuration Protocol is a standards-based protocol for dynamically allocating and managing IP addresses. DHCP runs between individual computers and a DHCP server to allocate and assign IP addresses to the computers as well as limit the time for which the computer can use the address. Diffie-Hellman A key-agreement algorithm used to create a random number that can be used as a key over an insecure channel. Digital Certificates Digital Certificates are issued by a Certificate Authority (CA), which verifies the identification of the sender. The certificate is attached to an electronic message, so the recipient knows the sender is really who they claim to be. Digital Fingerprint Similar to digital signature, a digital fingerprint is the encryption of a message digest with a private key. Digital Signature Like a digital certificate, a digital signature is a data string that is verified by a Certificate Authority, and is attached to an electronic message so that it can verify that the sender is really who they claim to be. The difference between a digital certificate and a digital signature is found in how the message is encrypted and decrypted. 124 S100 User Guide – Rev. D – June 2005 Digital Signature Algorithm (DSA) The asymmetric algorithm that is at the core of the digital signature standard. DSA is a publickey method based on the discrete logarithm problem. Digital Signature Standard (DSS) A NIST standard for digital signatures, used to authenticate both a message and the signer. DSS has a security level comparable to RSA (Rivest-Shamir-Adleman) cryptography, having 1,024-bit keys. Digital Time-Stamp See Time-Stamp 2 Directory The directory is the storage area for network security information such as keys or server names. DSA See Digital Signature Algorithm (DSA). 3 SS/NTP Symmetricom Secure Network Time Protocol, the protocol created by Symmetricom, based on NTP, that includes additional security features. DSS See Digital Signature Standard (DSS) DTT Symmetricom Temporal Token Element Manager (ENMTMS) Software that manages the components of an application. 5 Encryption The transformation of clear data (clear text) into unintelligible data (ciphertext). Asymmetric encryption, also known as Public Key encryption, allows for the trading of information without having to share the key used to encrypt the information. Information is encrypted using the recipient’s public key and then the recipient decrypts the information with their private key. Symmetric encryption, also known as Private Key encryption, allows information to be encrypted and decrypted with the same key. Thus the key must be shared with the decrypting party. Anyone who intercepts the key can also use it. Ephemeris Time Time obtained from observing the motion of the moon around the earth. FIPS Federal (US) Information Processing Standards are a set of standards for document processing and for working within documents. Some commonly-used FIPS standards are 140-1, 140-2, and 180. S100 User Guide – Rev. D – June 2005 125 SyncServer S100 Firewall Firewalls are software and hardware systems that define access between two networks, offering protection from outside data that could be harmful, such as a virus sent using the Internet. GMT Greenwich Mean Time, the mean solar time of the meridian of Greenwich, England, used until 1972 as a basis for calculating standard time throughout the world. GPS Global Positioning System. The GPS is a constellation of ~29 (or more) US Department of Defense satellites orbiting the earth twice a day. Hash Also called “hash function” or hashing, used extensively in many encryption algorithms. Hashing transforms a string of characters usually into a shorter, fixed-length value or key. Information in a database is faster to search when you use a hashed key, than if you were to try to match the original data. HTML HyperText Markup Language, the computer language used to create pages for the World Wide Web. HTTP HyperText Transfer (or Transport) Protocol, the protocol most often used to transfer information from World Wide Web servers to users of the Web. HTTPS HTTP over an SSL connection. Identity Certificate Also called Digital Certificates. The hash creates a message digest based on the contents of the message. The message is then encrypted using the publisher's private key, then it is appended to the original message. IEEE Institute of Electrical and Electronic Engineers, an international organization that sets standards for electrical and computer engineering. IETF Internet Engineering Task Force, an international organization which sets standards for Internet protocols in their Request for Comment (RFC) papers. These papers are numbered (RFC 1305, RFC 868, and so on) and are referred to by engineers worldwide as they work on technologies that support IETF standards. 126 S100 User Guide – Rev. D – June 2005 IKE Internet Key Exchange, a security system that uses a private key and an exchange key that encrypts private keys. Passwords are delivered over the Internet. In-band Authentication When you use PKI—which involves public keys and a private key— for authentication, it is called in-band authentication. See also: Out-of-band Authentication Integrity 2 Data that has retained its integrity has not been modified or tampered with. IPSec Internet Protocol Security describes the IETF protocols that protect the secure exchange of packets on the IP layer. IRIG 3 InteRange Instrumentation Group is an analog standard for serial time formats. Irrefutable See Non-repudiation ITU International Telecommunications Union, the international organization that sets standards for data communication. Key An alphanumeric string that encrypts and decrypts data. Key Escrow A secure storage maintained by a trusted third party, which holds keys. 5 Key Generation Creation of a key. Key Management The process by which keys are created, authenticated, issued, distributed, stored, recovered, and revoked. Key Pair Two integrated keys: one public, one private. Key Recovery The process of recovering a private decryption key from a secure archive for the purposes of recovering data that has been encrypted with the corresponding encryption key. S100 User Guide – Rev. D – June 2005 127 SyncServer S100 L1 Band, L2 Band Each Navstar GPS satellite currently transmits in two dedicated frequency bands: L1 and L2, which is centered on 1227.6 MHz. L1 carries one encrypted signal, as does L2, both being reserved for the military. L1 also carries one unencrypted signal, for civilian use. LAN Local area network (LAN): A data communications system that (a) lies within a limited spatial area, (b) has a specific user group, (c) has a specific topology, and (d) is not a public switched telecommunications network, but may be connected to one. Note 1: LANs are usually restricted to relatively small areas, such as rooms, buildings, ships, and aircraft. Note 2: An interconnection of LANs within a limited geographical area, such as a military base, is commonly referred to as a campus area network. An interconnection of LANs over a city-wide geographical area is commonly called a metropolitan area network (MAN). An interconnection of LANs over large geographical areas, such as nationwide, is commonly called a wide area network (WAN). Note 3: LANs are not subject to public telecommunications regulations. LDAP The Lightweight Directory Access Protocol is the standard Internet protocol for accessing directory servers over a network. Leap Seconds Today’s scientists and engineers have perfected clocks based on a resonance in Cesium atoms to an accuracy of better than one part in 10 trillion. These clocks keep pace with each other to within one two- or three-millionth of a second over a year’s time. The earth, on the other hand, can accumulate nearly a full second of error during a given year. To keep coordinated with the rotation of the earth, this error is added to (or deleted from) UTC time as a leap second, on the last day of the June or December in that year. MD5 An algorithm for creating a cryptographic hash (or “fingerprint”) of a message or of data. Message Authentication Code (MAC) A MAC is a function that takes a variable length input and a key to produce a fixed-length output. Message Digest The hash of a message. See also: Hash MIB Management Information Base, a database on the network that tracks, records, and corrects performance for each device on the network. MTBF Mean Time Between Failure, a measure of reliability. The longer the time span between failures, the more reliable the device. 128 S100 User Guide – Rev. D – June 2005 Multiplexing Process during which two or more signals are combined into one; at the other end, signals are “unbundled” by a demultiplexer. TDM is Time Division Multiplexing, FDM is Frequency Division Multiplexing, and CDMA is Code Division Multiple Access. National Measurement Institute (NMI) Also known as National Metrology Institute(s), the National Measurement Institute(s) is the national authority in each country that is usually recognized as the source of official time. Network Time Management System (NTMS) Symmetricom's architecture for the use of its family of products. 2 NIST National Institute of Standards and Technology, the National Measurement Institute in the United States. NIST produces standards for security and cryptography (see FIPS documents). NMI Server 3 National Measurement Institute Server NOC A Network Operations Center is a centralized point of network management within a largescale data network. Non-repudiation The time-stamp creates an evidentiary trail to a reliable time source that prevents a party in a transaction from later denying when the transaction took place. Notarization Certification of the identity of the party in a transaction based on identifying credentials. NTMS 5 Network Time Management System is a Symmetricom network management platform that provides secure management of infrastructure devices. NTP Network Time Protocol is a protocol that provides a reliable way of transmitting and receiving the time over the TCP/IP networks. The NTP, defined in IETF RFC 1305, is useful for synchronizing the internal clock of the computers to a common time source. OCSP Online Certificate Status Protocol, a protocol defined in RFC 2560, enables applications to check the status of a certificate every time the certificate is used. OID Object Identifier S100 User Guide – Rev. D – June 2005 129 SyncServer S100 Online validation A way of validating a key each time before it is used to verify that it has not expired or been revoked. OSI Operations System Interface Out-of-band Authentication When authentication is performed using relatively insecure methods, such as over the telephone, it is called out-of-band authentication. In-band authentication, which uses PKI, is preferred. See also: In-band Authentication PCI Peripheral Component Interconnect, a local bus that supports high-speed connection with peripherals. It plugs into a PCI slot on the motherboard. PKCS Public Key Cryptography Standards. These standards allow compatibility among different cryptographic products. PKI Public Key Infrastructure. The PKI includes the Certificate Authority (CA), key directory, and management. Other components such as key recovery, and registration, may be included. The result is a form of cryptography in which each user has a Public Key and a Private Key. Messages are sent encrypted with the receiver's public key; the receiver decrypts them using the private key. PKI Certificate See Digital Certificates PKIX Extended Public Key Infrastructure, or PKI with additional features approved by the IETF. Private Key This is a secret key, known to only one of the parties involved in a transaction. PSTN Public Switched Telephone Network, a voice and data communications service for the general public that uses switched lines. Public Key Messages are sent encrypted with the recipient's public key, which is known to others; the recipient decrypts them using their private key. 130 S100 User Guide – Rev. D – June 2005 Public Key Certificate Certificate in the form of data that holds a public key, authentication information, and private key information. RA A Registration Authority (RA) does not issue certificates, but does the required identification for certain certificate data. Resolution 2 Resolution of a time code refers to the smallest increment of time, whether it is days, hours, seconds, or other. Revocation The withdrawing of a certificate by a Certificate Authority before its expiration date or time. Also see Certificate Revocation List (CRL) Risk Management 3 The tasks and plans that help avoid security risk, and if security is breached, helps minimize damage. Root CA A Certificate Authority (CA) whose certificate is self-signed; that is, the issuer and the subject are the same. A root CA is at the top of a hierarchy. Root Time Trust Authority (RTTA) Also called Root Time Trust Services, these are end user organizations who provide time calibration and auditing services. Examples include Seiko Instruments, Inc., and Sovereign Time. RSA 5 The RSA (Rivest-Shamir-Andleman) algorithm is a public-key encryption technology developed by RSA Data Security. SHA-1 Secure Hash Algorithm is an algorithm developed by the US National Institute of Standards and Technology (NIST). SHA-1 is used to create a cryptographic hash of a message or data. It has a larger message digest, so it is considered to be somewhat stronger than MD5. Smart card A card the size of a credit card, which holds a microprocessor that stores information. S/MIME Secure Multipurpose Internet Mail Extensions. The standard for secure messaging. S100 User Guide – Rev. D – June 2005 131 SyncServer S100 SNMP Simple Network Management Protocol is the Internet standard protocol for network management software. It monitors devices on the network, and gathers device performance data for management information (data)bases (“MIB”). Solar Time Time based on the revolution of the earth around the sun. SSL Secure Sockets Layer, a protocol that allows secure communications on the World Wide Web/Internet. SSL Client Authentication Part of the SSL “handshake” process, when the client responds to server requests for a key. SSL-LDAP Secure Sockets Layer-Lightweight Directory Access Protocol. SSL Server Authentication Part of the SSL “handshake” process, when the server informs the client of its certificate (and other) preferences. Stratum Levels These are standards set using the Network Time Protocol RFC 1305. The highest level are Stratum 0 devices such as GPS, which get their time from a primary time source such as a national atomic clock. Stratum 1 servers source their time from a Stratum 0 device. Stratum 2 and beyond obtain their time from Stratum 1 servers. The further removed in stratum layers a network is from a primary source, the greater the chance of signal degradations due to variations in communications lines and other factors. Sysplex Timer The Sysplex Timer provides a synchronized Time-of-Day clock for multiple attached computers. TCCert Time Calibration Certificate TCP/IP A mainstay of the Internet, the Transmission Control Protocol (TCP) provides dependable communication and multiplexing. It is connection-oriented, meaning it requires that a connection be established data transfer. It sits on top of the Internet Protocol (IP), which provides packet routing. This is connectionless, meaning each data packet has its source and destination data embedded, so it can bounce around a network and still get to its destination. Telnet Telnet is a terminal emulation application protocol that enables a user to log in remotely across a TCP/IP network to any host supporting this protocol. The keystrokes that the user 132 S100 User Guide – Rev. D – June 2005 enters at the computer or terminal are delivered to the remote machine, and the remote computer response is delivered back to the user’s computer or terminal. TFTP TFTP is a UDP-based, connectionless protocol. Time Signing The process by which a StampServer issues a digital signature of the time stamp, then encrypts it. Time-Stamp 2 A record mathematically linking a piece of data to a time and date. Time-Stamp Request The client computer or application sends a time-stamp request to a StampServer. Time-Stamp Token 3 The essential part of the time-stamp. It contains the time, the message digest/the message imprint (hash), and it is signed to verify the accuracy of that time. In detail, it is a signed data object where the encapsulated content is a TSTInfoObject, thus it verifies the stamp as coming from the device you submitted it to, and it is bound to the file you are working with. Time-Stamping Authority An authorized device that issues time-stamps, and its owner. TLS Transport Layer Security, security that protects the OSI layer that is responsible for reliable end-to-end data transfer between end systems. Token See Time-Stamp Token 5 Tool box A group of software applications that have similar functions. TMC See Time Master Clock (TMC) TPC Third-party Certificate See also: Certificate TPCA Third-party Certification/Certificate Authority. See also: Certificate Authority (CA) S100 User Guide – Rev. D – June 2005 133 SyncServer S100 Traceability Traceability infers that the time standard used on the Time StampServer was set using time directly or indirectly from a National Measurement Institute (NMI). Transaction An activity, such as a request or an exchange. Triple-DES Also called Triple Data Encryption Algorithm (TDEA), Data Encryption Standard is an algorithm that encrypts blocks of data. Trust In the network security context, trust refers to privacy (the data is not viewable by unauthorized people), integrity (the data stays in its true form), non-repudiation (the publisher cannot say they did not send it), and authentication (the publisher--and recipient--are who they say they are). NMI Server NMI Server, or NMI Server, is a standalone secure server based on the Master Clock, which is dedicated to the creation of trusted UTC time at the NMI. Time StampServer (TSS) Symmetricom’s Time StampServer (TSS) services time-stamp requests from applications, transactions, or computer logs. Time Master Clock (TMC) Symmetricom’s Master Clock is a Rubidium-based master clock synchronized to UTC time and certified by a National Measurement Institute (NMI). TSA See Time-Stamping Authority TSP Time-Stamp Protocol TSR See Time-Stamp Request UDP/IP User Datagram Protocol/Internet Protocol is a communications protocol that provides service when messages are exchanged between computers in a network that uses the Internet Protocol. It is an alternative to the Transmission Control Protocol. USNO U.S. Naval Observatory, in Washington, D.C., where the atomic clock that serves as the official source of time for the United States is maintained. 134 S100 User Guide – Rev. D – June 2005 UTC See Coordinated Universal Time (UTC) Vault Secure data storage facility. Verification The process of making sure the identity of the parties involved in a transaction is what they claim it to be. Virus 2 An unwanted program that hides “behind” legitimate code, and which is activated when the legitimate program is activated. VPN Virtual Private Network, a way that authorized individuals can gain secure access to an organization's intranet, usually over the Internet. 3 W3C The World Wide Web Consortium, based at the Massachusetts Institute of Technology (MIT), is an international organization that creates standards for the World Wide Web. WAN Wide area network (WAN): A physical or logical network that provides data communications to a larger number of independent users than are usually served by a local area network (LAN) and is usually spread over a larger geographic area than that of a LAN. Note 1: WANs may include physical networks, such as Integrated Services Digital Networks (ISDNs), X.25 networks, and T1 networks. Note 2: A metropolitan area network (MAN) is a WAN that serves all the users in a metropolitan area. WANs may be nationwide or worldwide. Warrant 5 An attribute certificate that attests to the time of the device. It is used to adjust the clock. See also: PKI Certificate Wireless Application Protocol (WAP) Wireless Application Protocol, a worldwide standard for applications used on wireless communication networks. WPKI Wireless Public Key Infrastructure WTLS Wireless Transport Layer Security X.509 The ITU's X.509 standard defines a standard format for digital certificates, the most-widely used PKI standard. S100 User Guide – Rev. D – June 2005 135 SyncServer S100 X.509 v3 Certificate Extension The X.509 standard with extended features approved by the IETF. 136 S100 User Guide – Rev. D – June 2005 Appendix D Customer Assistance Symmetricom's Customer Assistance Centers are a centralized resource to handle all your customer needs. Our Centers are staffed with logistics personnel to handle product quotes, order status and scheduling as well as technical personnel for technical support, installations or service quotes. 2 Technical support is operated as a fee-based service, either under contract or on an hourly basis. Visa, Mastercard are accepted as well as Purchase Orders from established customers. 3 US Assistance Center For the United States, Canada, Latin America, Caribbean, and the Pacific Rim (including Asia, Australia and New Zealand) call: Tel +1 888 367 7966 (+1 888 FOR SYMM) or +1 408 428 7907 (Worldwide) Customer Service For product quotes, service quotes, installations, order status and scheduling 7:00 am to 5:00 pm Pacific Time, Monday through Friday, excluding U.S. Holidays. 5 Technical Support For technical support 24 hours a day, 7 days a week, every day of the year contact us at: support@symmetricom.com EMEA Assistance Center For Europe, Middle East, and Africa, call: Tel +44 (0) 1189 699 799 or +1 408 428 7907 (Worldwide) S100 User Guide – Rev. D – June 2005 137 SyncServer S100 Customer Service For product quotes, service quotes, installations, order status and scheduling 8:00 am to 5:00 pm Greenwhich Mean Time, Monday through Friday, excluding UK Holidays. Technical Support For technical support 24 hours a day, 7 days a week, every day of the year, contact us at: emea_support@symmetricom.com Comments, complaints and suggestions are always gladly accepted. customer_relations@symmetricom.com 138 S100 User Guide – Rev. D – June 2005 Appendix C Declaration of Conformity DECLARATION OF CONFORMITY In accordance with ISO/IEC GUIDE 22 and EN 45014 Symmetricom, Inc. 3750 Westwind Blvd. Santa Rosa, Ca. 95403 USA Declares that the 2 3 MODEL S100 NETWORK TIME SERVER MODEL NO. S100 MODEL NO. S100/GPS MODEL NO. S100/RB MODEL NO. S100/GRB/GPS CONFORMS TO THE FOLLOWING EUROPEAN UNION DIRECTIVES: Safety 73/23/EEC Low Voltage Safety as amended by 93/68/EEC EN 60950 (Edition 1992) as amended by A1:1993, A2:1993, A3:1995, A4:1997 Electromagnetic Compatibility 89/336/EEC Electromagnetic Compatibility as amended by 92/31/EEC, 93/68/EEC, 98/13/EC EN55022 (1998) EMC Emissions for ITE, Class A EN55024 (1998) EMC Immunity for ITE, Class A EN61000-3-2 (1995) Harmonic Current Emissions as amended by A1 (1998), A2 (1998) EN61000-3-3 (1995) Voltage Fluctuation and Flicker Immunity as amended by A1 (1998) 5 Note: The Model XLi is compliant with the supplied standard antenna. Initial Certification Issued: First Date of Marketing with CE Mark: 01 August 2003 01 August 2003 Certification Updated: 13 November 2003 I declare that the equipment specified above conforms to the above Directives and Standards. 13 Novembert 2003 Robert Mengelberg Quality Engineer Date Name Title Signature I declare that the equipment specified above conforms to the above Directives and Standards. European Representative: Company Name and Address Date Name S100 User Guide – Rev. D – June 2005 Title Signature 139 SyncServer S100 1 FCC NOTICE AND COMPLIANCE STATEMENT Class A Symmetricom, Inc. 3750 Westwind Blvd. Santa Rosa, Ca. 95403 USA Declares that the following Model: MODEL S100 NETWORK TIME SERVER MODEL NO. S100 MODEL NO. S100/GPS MODEL NO. S100/RB MODEL NO. S100/GRB/GPS CONFORM TO THE FOLLOWING FCC NOTICE: This device has been tested and found to fully compliant with the limits with the FCC Part 15, Subpart B, Section 15.109 and ICES-003 Class A Limits, using the CISPR 22:1997 specifications and ANSI C63.4:1992 Test Methods. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy and, if installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio or television reception, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the computer and receiver. • Connect the computer into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. Caution: Any changes or modifications not expressly approved by the grantee of this device could void the user’s authority to operate the equipment. FCC Compliance Statement This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Note: The Model XLi is compliant with the supplied standard antenna. I declare that the equipment specified above conforms to the above Directives and Standards. 01 August 2003 Date 140 Robert Mengelberg Name Quality Engineer Title Signature S100 User Guide – Rev. D – June 2005 Appendix E 1 Antenna Replacement Please note that the GPS antenna equipment described in this manual has been superseded by the following Standard Antenna Kit, consisting of: • One wide-range 5-12 VDC L1 antenna 2 • One 50 ft. length of Belden 9104 coaxial cable with BNC(m) and TNC(m) connectors • Adaptors are included for GPS receivers that have a non-BNC antenna connector The Antenna Kit can be ordered with optional cable lengths and accessories. Please note the following when setting up longer cable runs: 3 • Using Belden 9104, the maximum cable length without amplification is 150 feet • Using Belden 9104, the maximum cable length using the optional in-line amplifier is 300 feet • For cable runs longer than 300 feet, an optional GPS Down/Up Converter kit is available Other GPS Antenna Options: • A Lightning Arrestor kit • A 1:2 splitter (distributes the signal from a single antenna to two GPS receivers) 5 S100 User Guide – Rev. D – June 2005 141 SyncServer S100 1 142 S100 User Guide – Rev. D – June 2005 Index 1 Numerics 1PPS 65 A 2 About This Book 1 Access Control 121 ACTS 103, 121 Operation 104 Add New Relationships panel 58 Address 59 3 Admin Alarms 80 Admin Interface 54 Base Menu 55 Expanded menu 56 Administration 76 Admin Users 77 Logs 81 Restart Web Interface 77 Shutdown/Reboot 76 Time Zones 78, 79 Administrator Log-In 31 Advanced Keys/Certificates 64 ntp.conf 63 5 Advanced Encryption Standard (AES) 121 Alarms 80 Algorithm 121 Allow Broadcast Address 75 AM 66 ANSI 121 Antenna Cable length 23 Antenna Replacement Kit 141 Antiwarrant 121 API 121 ASCII 121 ATM 121 S100 User Guide – Rev. D – June 2005 143 SyncServer S100 Attribute Certificate 122 1 Audit Trail 122 authdelay 62 Authentication 122 Authentication fields 59 Authorization 122 Autokey 10, 59, 93 Automated Computer Time Service (ACTS) 103 B Base UDP Port 75 Battery Status 70 BC11576-1000 14, 22 bc635/637 PCI board 65, 72 BCD 122 BIPM 3 Boot Log 82 Broadcast client role 59 Broadcast role 59 Broadcastdelay 62 Bureau International de l’Heure (BIPM) 122 Burst 59 C Calibration 122 Cancel Pending Shutdown 76 Case-blind 81 CDMA 122 CDSA 122 Certificate 122 Certificate Authority 11 Certificate Authority (CA) 123 Certificate Extension 123 Certificate Request 11, 64, 112 Certificate Request Message 123 Certificate Revocation List (CRL) 123 Certification Path 123 Chassis 119 Client role 59 144 S100 User Guide – Rev. D – June 2005 Client Software 10 Clock Settings 70 1 Clock Value 70 Code Modulation 67 Code Type 66 Collapse 84 Confidentiality 123 Config Wizard 32, 80 Configuration Change alarm 80 2 Configuring NTP 45 Connecting the Rubidium Option 24 Connections 20 Content Filtering 123 Control Settings 71 3 Coordinated Universal Time (UTC) 123 Credential(s) 123 CRM 123 Cross-Certificate 123 Cryptochecksum 93 Cryptography 123 Current Leap Seconds 66 Customer Assistance 137 Customer Service 137, 138 D DAC Value 70 5 Data Encryption Standard (DES) 124 Daylight Savings Time 66 Daytime Protocol (RFC 867) 89 D-BNC Signal Breakout Cable 22, 45 D-BNC Signal Breakout Cable BC11576-1000 14 DC 66 DCLS 124 Declaration of Conformity 139 Decryption 124 Default gateway 73 Default password 54 Default user name 54 S100 User Guide – Rev. D – June 2005 145 SyncServer S100 Denial of Service 124 1 DES 124 DHCP 73, 124 Dial-up 103 Dialup Backup dialog 35 Dialup Settings dialog 35, 39, 46 Diffie-Hellman 10, 124 Digital Analog Converter 70 Digital Certificates 124 Digital Fingerprint 124 Digital Signature 124 Digital Signature Algorithm (DSA) 125 Digital Signature Standard (DSS) 125 Digital time-stamp 125 Directory 125 Disc Control 71 Disc Gain 71 Disciplining control 71 Display only the last __ lines 81 Disposal Instructions 6 DNS Nameservers 73 DSA 125 DSS 125 DTT 125 Dynamic Host Configuration Protocol 73 E Electrical Safety Instructions 6 Element Manager (ENMTMS) 125 E-mail Address 80 EMEA Assistance Center 137 Encryption 59, 125 Engine Time 70 Ephemeris Time 125 eth0 72 Ethernet 28 Event Capture Lockout 71 Event Capture Source 71 146 S100 User Guide – Rev. D – June 2005 Event Control 71 Event Edge 71 1 Event Input 22 F Falling edge 71 File System Check on Reboot 76 Filter 81 FIPS 125 2 Firewall 126 Flywheeling alarms 80 Free Running 65 Frequency Output 71 Functionality, network 28 3 G Generate Keys 64 Generator Time Offset 67 Global Positioning System (GPS) 3, 65, 126 Antenna installation 23 Lost time signal 10 Glossary 121 GMT 126 GPS Health 67 GPS Position 69 GPS Receiver 119 GPS Signal Strength 68 5 GPS Time 69 GPS Time Format 66 GPS Week 11 GPS Week Number 69 GPS/UTC Offset 69 H Hack/crack 126 Hardware setup 21, 23 Hash 126 HeartBeat 71 Heartbeat 22 HeartBeat Counter 71 S100 User Guide – Rev. D – June 2005 147 SyncServer S100 HeartBeat Mode 71 1 Help 84 Host 58, 74, 75 Hostname 73 How do I...? 1 How to Acquire and install SymmTime™ 115 Acquire Time 30 Change the root password 115 Configure an NTP v4 client 114 Get info about NTP 116 Get time using dial-up 114 Get time using GPS 114 Install NTPv4 on a UNIX system 114 Install your GPS antenna 115 Install your SyncServer 114 Log on to the interface 30 See how SyncServer works 9 Set the IP address 26 Verify NTP v4 autokey client connectivity 114 How-tos and Tips 113 HTML 126 HTTP 126 HTTPS 126 HyperTerminal 25 I iBurst 59 Identity Certificate 126 IEEE 126 IEEE 1344 66 IEEE Daylight Savings Flag 66 IETF 3, 4, 126 IKE 127 Important Safety Instructions! 19 In-band Authentication 127 installations 137 Installing Your SyncServer S100 13 Integrity 127 Interface NTP Status 61 Web-based 8, 53 International Bureau of Weights and Measures (BIPM) 3 Internet Protocol 59 148 S100 User Guide – Rev. D – June 2005 IP address 73 IP Forwarding 73 1 IPSec 127 IRIG 65, 127 IRIG A 66 IRIG B 66, 104 Irrefutable 127 Issue Alarms 80 ITU 127 2 J Jam Control 70 Jam synchronization 70 Jitter 62 3 K Kalman filter 71 Key 59, 127 Key Escrow 127 Key Generation 127 Key Management 127 Key Pair 127 Key Recovery 127 L L1 Band, L2 Band 128 LAN 128 5 LDAP 128 Leap Second 10 Leap Indicator 62 Leap Seconds 128 Line numbers 81 Lithium Battery Disposal Instructions 6 Local area network 128 Local clock phase shifting 71 Local Domain 73 Local Offset 66 Log Out 31, 85 S100 User Guide – Rev. D – June 2005 149 SyncServer S100 Logging Off 85 1 Logging On 30 Logs 81 M Mail forwarder 80 Mail Log 82 Main Settings 65 Manycast client role 59 Manycast server role 59 Maximum Poll Interval 59 MD5 128 Message 76 Message Authentication Code (MAC) 128 Message Digest 128 MIB 128 Minimum Poll Interval 59 Mode 66 Model Info 72 Modem phone number 35, 39, 46 Modulation Type 66 MTBF 128 Multicast client role 59 Multiplexing 129 N NASA 36 66 National Institute of Standards and Technology (NIST) 103 National Measurement Institute 5, 129 National Measurement Institutes 5 Network configuration 58 Network Interface 72, 119 Network Time Management System (NTMS) 129 Network Time Protocol (RFC 1305 and RFC 1119) 90 Networking 72 ifconfig Output 74 Ping 74 TCP/IP Configuration 72 Traceroute 75 NIST 9, 103, 129 150 S100 User Guide – Rev. D – June 2005 NMIServer 129, 134 No filter 81 1 NOC 129 Non-repudiation 129 Notarization 129 NTMS 129 NTP 4, 5, 7, 10, 42, 90, 129 Authentication 93 Authenticator 93 How it defines the authentication process 94 Leap Indicator 91 Message Data 91 Mode 92 Network Time Protocol 90 NTP Data Format 90 Originate Timestamp 93 Poll Interval 92 Receive Time stamp 93 Reference Clock Identifier 92 Reference Timestamp 92 Stratum 92 Synchronizing Dispersion 92 Synchronizing Distance 92 Transmit Time stamp 93 Version 91 2 3 NTP Dialup 60 NTP Keys/Certificates dialog 64 NTP Log 81 NTP Server Test dialog 60 NTP Start/Stop 61 NTP Status 61 NTP Test 60 5 NTPD Help 53, 84 NTPv3 93 NTPv4 7, 10, 94 O OCSP 129 OID 129 One Pulse Per Second (1PPS) 65 Online validation 130 Operating and Storage Environments 120 order status 137 order status and scheduling 137 Oscillator 65, 70 S100 User Guide – Rev. D – June 2005 151 SyncServer S100 Oscillator disciplining function gain value 71 1 OSI 130 Out-of-band Authentication 130 outputs 109 P Password, default 31 Paste Certificate 65 PCI 130 Peer role 58 Phase Control 71 Pin Descriptions 120 Ping count 75 PKCS 130 PKI 130 PKI Certificate 130 PKIX 130 Power Connection 19 Precision 62, 92 Prefer 59 Private Key 130 Product Overview 7 product quotes 137 Propagation Delay 66 Prune 81 PSTN 130 Public Domain xNTP Package 94 Public Key 130 Public Key Certificate 131 Q Quiet 75 quotes 137 R RA 131 Rack Mounting 19 Real-Time Clock 66 Reboot 76 152 S100 User Guide – Rev. D – June 2005 Reference ID 62 Reference Time 61, 62 1 Registers 71 Regular expression 81 Remove all but the last __ lines 81 replacement kit, antenna 141 Reset 73, 77 Resolution 131 Response Wait Timeout 75 2 Revocation 131 RFC 1119 10 RFC 1305 4, 90 Rising edge 71 Risk Management 131 3 Role 58 Root CA 131 Root delay 62 Root Dispersion 62 Root Dispersion Version 3 92 Root Distance 62 Root Distance Version 3 92 Root Trust Time Services (RTTS) 131 Route 75 RSA 131 RTC 66 5 S S/MIME 131 Safety Instructions 6 Scheduled Leap Event Flag 66 Scheduled Leap Event Time 66 Search 81 Search Domains 73 Search NTPD Manual 84 Seconds of Week 69 Secure NTP 10 Serial Connection 24, 119 Serial port 21 S100 User Guide – Rev. D – June 2005 153 SyncServer S100 Server role 59 1 service quotes 137 Setup Complete screen 38, 45, 48 SHA-1 131 Simple Network Time Protocol (RFC 1361) 90 Simple Status screen 30 Skip Name Lookup 76 Smart card 131 SNMP 8, 132 SNTP 10, 90 Solar Time 132 Source Network Interface 75 Special Safety Instructions 6 Spread-spectrum signal 23 SS/NTP 125 ss_profile 88 SSL 132 SSL Client Authentication 132 SSL Server Authentication 132 SSL-LDAP 132 Stability 62 Static IP 73 Stratum 4, 9, 62 Levels 4 Stratum Levels 132 Subnet mask 73 Symmetricom Secure Network Time Protocol (SS/NTP) 124 SymmTime™ client 10 SymmTime™ Time Utility 49 SyncServer How it uses the Sysplex timer 87 SyncServer Operations and Time-Related Protocols 87 SyncServer Product Specifications 119 SyncServer S100 Accessories 15 Photo of 1 The technology 7 Sysplex Timer 87, 132 SYSPLEX_PROGRAM environment variable 88 System Flags 62 154 S100 User Guide – Rev. D – June 2005 System Information 36 System Information dialog 39, 46 1 System Peer 61 System Peer Mode 61 System Status screen 57 System Tests 37 System Tests dialog 44 T 2 TCCert 132 TCP/IP 10, 132 Technical Support 3, 137, 138 Telnet 132 Test Results dialog 37, 41, 44, 48 TFTP 133 3 Time Sources 7 Time Code Input 22 Time Code Out 67 Time Code Output 22 Time Distribution 10 Time Distribution Model 9 Time Format 66 Time Glossary 121 Time Master Clock (TMC) 134 Time Protocols 87 5 Time Signing 133 Time Source, choosing 33 Time StampServer (TSS) 134 Time to Live 59 Timecode Settings 66 Time-of-fix 69 Time-Stamp 133 Time-Stamp Request 133 Time-Stamp Token 133 Time-Stamping Authority 133 Timing Accuracy 119 Timing Configuration 57 Timing Engine 65 S100 User Guide – Rev. D – June 2005 155 SyncServer S100 TLS 133 1 TMC 133 Token 133 Tool box 133 TPC 133 TPCA 133 Traceability 134 Transaction 134 Transmission Control Protocol (TCP) 89 Triple-DES 134 Trust 134 TSA 134 TSP 134 TSR 134 U U.S. Naval Observatory 5 UDP/IP 134 University of Delaware 53, 84 Update 73 Upload Certificate 64 US Assistance Center 137 User Datagram Protocol (UDP) 89 User name, default 31 Using the Online Help 3 USNO 134 UTC 3, 5, 135 V Vault 135 Verification 135 Version 59 Virus 135 VPN 135 W W3C 135 Wait time 75 WAN 135 156 S100 User Guide – Rev. D – June 2005 Warrant 135 Web-based interface 51 1 When 76 Wide area network 135 Wireless Application Protocol (WAP) 135 WPKI 135 WTLS 135 X 2 X Coordinate 69 X.509 11, 135 X.509 v3 Certificate Extension 136 Y Y Coordinate 69 3 Year 66 Z Z Coordinate 69 5 S100 User Guide – Rev. D – June 2005 157 SyncServer S100 1 158 S100 User Guide – Rev. D – June 2005
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Page Mode : UseOutlines XMP Toolkit : 3.1-701 Producer : Acrobat Distiller 7.0 (Windows) Create Date : 2005:06:21 17:41:56Z Creator Tool : FrameMaker 7.0 Modify Date : 2005:06:21 17:55:28-07:00 Metadata Date : 2005:06:21 17:55:28-07:00 Format : application/pdf Creator : rdlugyhegwer Title : s100v1.3.book Document ID : uuid:2cf36ce1-1743-4157-b70a-226439804167 Instance ID : uuid:9f99fa07-ce88-4e17-8ad6-0d0f73bc97e1 Page Count : 166 Author : rdlugyhegwerEXIF Metadata provided by EXIF.tools