Field descriptions – Alcatel Carrier Internetworking Solutions Omni Switch/Router User Manual
Page 302
![background image](/manuals/39732/302/background.png)
NTP Statistics Menu
Page 12-24
Field Descriptions
The following section describes the fields displayed using the
ntpstat
command.
system uptime
. The number of seconds the local
NTP
server has been associated with the
switch.
time since reset
. The number of seconds since the last time the local
NTP
server was restarted.
bad stratum in packet
. The number of
NTP
packets received that had a corrupted stratum bit in
the data of the packet.
old version packets
. The number of
NTP
packets received that were of an older version of
NTP
(either version 1 or 2).
new version packets
. The number of
NTP
packets received that were version 3 of
NTP
.
unknown version number
. The number of
NTP
packets received for which the version was
unknown (most likely due to packet corruption).
bad packet length
. The number of
NTP
packets received that did not fit the
NTP
packet struc-
ture (most likely due to packet corruption).
packets processed
. The total number of
NTP
packets processed.
bad authentication
. The number of
NTP
packets rejected because they did not meet authentica-
tion standards.
limitation rejects
. The number of
NTP
packets rejected because there were restrictions set on
their point of origin. For information on setting restrictions, see Create Restrict Entry/Add Flags
to Entry on page 12-39.
Display Server Statistics Associated with Particular Peer(s)
The
ntppstat
command allows you to view statistics for a specific
NTP
peer. To view statistics
for a peer, enter the
ntppstat
command as shown:
ntppstat
where
is the address of the peer for which you want to view statistics. For exam-
ple, to view statistics for a peer with IP address 131.218.18.4, enter the following:
ntppstat 131.216.18.4
A screen similar to the following displays:
remote host
: 131.216.18.4
local interface
: 0.0.0.0
time last received
: 9s
time until next send
: 6s
reachability change
: 2973s
packets sent
: 184
packets received
: 181
bad authentication
: 2
bogus origin
: 2
duplicate
: 6
bad dispersion
: 69
bad reference time
: 1
candidate order
: 1