The NTP server uses NTP that is based on identifier authentication and information integrity authentication mechanisms. Otherwise, the NTP server cannot be configured. If any node is faulty, restore the node first. For details, see Deleting the Active-Standby Two-Node Cluster System.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |