Operation Manual – NTPH3C S5600 Series Ethernet Switches Chapter 1 NTP Configuration1-12refers to query of state of the NTP service, including alarm information,authentication status, clock source information, and so on.z synchronization: Synchronization right. This level of right permits the peer deviceto synchronize its clock to the local switch but does not permit the peer device toperform control query.z server: Server right. This level of right permits the peer device to performsynchronization and control query to the local switch but does not permit the localswitch to synchronize its clock to the peer device.z peer: Peer access. This level of right permits the peer device to performsynchronization and control query to the local switch and also permits the localswitch to synchronize its clock to the peer device.From the highest NTP service access-control right to the lowest one are peer, server,synchronization, and query. When a device receives an NTP request, it will performan access-control right match in this order and use the first matched right.1.4.1 Configuration PrerequisitesPrior to configuring the NTP service access-control right to the local switch for peerdevices, you need to create and configure an ACL associated with the access-controlright. For the configuration of ACL, refer to ACL Configuration in Security Volume.1.4.2 Configuration ProcedureFollow these steps to configure the NTP service access-control right to the local devicefor peer devices:To do… Use the command… RemarksEnter system view system-view —Configure the NTPservice access-controlright to the local switch forpeer devicesntp-service access{ peer | server |synchronization |query } acl-numberOptionalpeer by defaultNote:The access-control right mechanism provides only a minimum degree of securityprotection for the local switch. A more secure method is identity authentication.1.5 Configuring NTP AuthenticationIn networks with higher security requirements, the NTP authentication function must beenabled to run NTP. Through password authentication on the client and the server, the