Fortinet white logo
Fortinet white logo

Administration Guide

Cryptographic hash function authentication support

Cryptographic hash function authentication support

Cryptographic hash function authentication support allows the NTP client to verify that severs are known and trusted and not intruders masquerading (accidentally or intentionally) as legitimate servers.

The supported cryptographic hash functions include:

  • MD5: Supported by NTPv3 for authentication.

  • MD5, SHA-1, and SHA-256: Supported by NTPv4, providing stronger security and greater flexibility.

Note

Cryptographic hash function authentication support is only available for NTP clients, not NTP servers.

To configure authentication on a FortiGate NTP client:
config system ntp
    set ntpsync enable
    set type custom
    set syncinterval 1
    config ntpserver
        edit "883502"
            set server "10.1.100.11"
            set authentication enable
            set key-type MD5
            set key **********
            set key-id 1
        next
    end
end

Command

Description

authentication <enable | disable>

Enable/disable MD5/SHA1/SHA256 authentication (default = disable).

key-type

Select NTP authentication type (default = MD5):

  • MD5: Enable MD5(NTPv3) authentication.

  • SHA1: Enable SHA1(NTPv4) authentication.

  • SHA256: Enable SHA256(NTPv4) authentication.

key <passwd>

Key for MD5(NTPv3)/SHA1(NTPv4)/SHA256(NTPv4) authentication. Enter a password value.

key-id <integer>

Key ID for authentication. Enter an integer value from 0 to 4294967295.

To confirm that NTP authentication is set up correctly:
# diagnose sys ntp status
synchronized: yes, ntpsync: enabled, server-mode: disabled
ipv4 server(10.1.100.11) 10.1.100.11 -- reachable(0xff) S:4 T:6 selected
server-version=4, stratum=3

If NTP authentication is set up correctly, the server version is equal to 4.

Cryptographic hash function authentication support

Cryptographic hash function authentication support

Cryptographic hash function authentication support allows the NTP client to verify that severs are known and trusted and not intruders masquerading (accidentally or intentionally) as legitimate servers.

The supported cryptographic hash functions include:

  • MD5: Supported by NTPv3 for authentication.

  • MD5, SHA-1, and SHA-256: Supported by NTPv4, providing stronger security and greater flexibility.

Note

Cryptographic hash function authentication support is only available for NTP clients, not NTP servers.

To configure authentication on a FortiGate NTP client:
config system ntp
    set ntpsync enable
    set type custom
    set syncinterval 1
    config ntpserver
        edit "883502"
            set server "10.1.100.11"
            set authentication enable
            set key-type MD5
            set key **********
            set key-id 1
        next
    end
end

Command

Description

authentication <enable | disable>

Enable/disable MD5/SHA1/SHA256 authentication (default = disable).

key-type

Select NTP authentication type (default = MD5):

  • MD5: Enable MD5(NTPv3) authentication.

  • SHA1: Enable SHA1(NTPv4) authentication.

  • SHA256: Enable SHA256(NTPv4) authentication.

key <passwd>

Key for MD5(NTPv3)/SHA1(NTPv4)/SHA256(NTPv4) authentication. Enter a password value.

key-id <integer>

Key ID for authentication. Enter an integer value from 0 to 4294967295.

To confirm that NTP authentication is set up correctly:
# diagnose sys ntp status
synchronized: yes, ntpsync: enabled, server-mode: disabled
ipv4 server(10.1.100.11) 10.1.100.11 -- reachable(0xff) S:4 T:6 selected
server-version=4, stratum=3

If NTP authentication is set up correctly, the server version is equal to 4.