- NTP connections should only be used via authentication
- Increases likelihood of reliable timesource
- Lessens chance of attackers broadcasting incorrect time
- Red Hat Enterprise Linux 5
- Red Hat Enterprise Linux 6
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.