Domain Time II offers exclusive security features to ensure that your network's time is correct and resistant to both intentional and inadvertent
interference from other sources.
Full Client Control Panel Applet - Security Settings Tab
Denial of Service (Flooding) Protection
Automatic protection against Denial of Service (DoS) attacks.
Access Permissions
Control which machines can communicate with your client.
Advanced - Command Restrictions
When you click on the Advanced button on the Security tab, you'll be presented with the Command Restrictions
dialog window. You can use these settings to restrict what kind of Domain Time II control and sync messages your client listens for on the network.
The Domain Time II Full Client - Command Restrictions Page
The default protocol restriction settings assure both maximum functionality and a high degree of security; in most cases you will have no need to adjust them from the defaults.
Domain Time II components communicate with each other primarily through directed communication, and are therefore highly resistant to spoofing and malign
interference.
The Domain Time II protocol command restriction capability is intended for use by system administrators in environments where an extra level of
security is required, such as running a Client on the open Internet. Using the restrictions list, you can determine exactly what Domain Time II protocol
command messages the service is allowed to listen for. Think of the command restriction list as an application-level "firewall" allowing in only the
desired Domain Time II commands and blocking any others. Keep in mind that the restriction list only affects incoming DTII protocol commands - outgoing
commands are not affected.
Warning:
Disabling protocol commands can have unintended consequences on the operation of your entire time distribution network, including the prevention
of cascade triggers and sync notifications, which may result in inaccurate clocks. Problems resulting from disabled protocol messages can be quite
hard to troubleshoot later, particulary by the next system administrator after you. Make adjustments only if you understand and require them, and be
sure you document the changes so you can maintain the consistency and smooth operation of your time network.
Proceed to the Log Settings page
Back to the Time Sources page