Domain Time II offers exclusive security features to ensure that your network's time is correct and resistant to both intentional and inadvertent
    interference from other sources.
    
    

    Full Client Control Panel Applet - Security Settings Tab
    
    
    Denial of Service (Flooding) Protection
    Automatic protection against Denial of Service (DoS) attacks.
    
    
    
    
    Access Permissions
    Control which machines can communicate with your client.
    
    
  
  
  Advanced - Command Restrictions
  When you click on the Advanced button on the Security tab, you'll be presented with the Command Restrictions 
  dialog window.  You can use these settings to restrict what kind of Domain Time II control and sync messages your client listens for on the network.
  
  

  The Domain Time II Full Client - Command Restrictions Page
  
  The default protocol restriction settings assure both maximum functionality and a high degree of security; in most cases you will have no need to adjust them from the defaults.  
  Domain Time II components communicate with each other primarily through directed communication, and are therefore highly resistant to spoofing and malign 
  interference.  
  
  The Domain Time II protocol command restriction capability is intended for use by system administrators in environments where an extra level of 
  security is required, such as running a Client on the open Internet.  Using the restrictions list, you can determine exactly what Domain Time II protocol 
  command messages the service is allowed to listen for.  Think of the command restriction list as an application-level "firewall" allowing in only the 
  desired Domain Time II commands and blocking any others.  Keep in mind that the restriction list only affects incoming DTII protocol commands - outgoing 
  commands are not affected.
  
  
Warning:
  Disabling protocol commands can have unintended consequences on the operation of your entire time distribution network, including the prevention 
  of cascade triggers and sync notifications, which may result in inaccurate clocks.  Problems resulting from disabled protocol messages can be quite 
  hard to troubleshoot later, particulary by the next system administrator after you.  Make adjustments only if you understand and require them, and be 
  sure you document the changes so you can maintain the consistency and smooth operation of your time network.
   
   
  
  
   
 Proceed to the Log Settings page
 Proceed to the Log Settings page
 Back to the Time Sources page
 Back to the Time Sources page