Download full document:

ntpparam

Configuration for NTP parameter resource.

Properties

(click to see Operations)

Name Data Type PermissionsDescription
authentication<String>Read-writeApply NTP authentication, which enables the NTP client (NetScaler) to verify that the server is in fact known and trusted.<br>Default value: YES<br>Possible values = YES, NO
trustedkey<Double[]>Read-writeKey identifiers that are trusted for server authentication with symmetric key cryptography in the keys file.<br>Minimum value = 1<br>Maximum value = 65534
autokeylogsec<Double>Read-writeAutokey protocol requires the keys to be refreshed periodically. This parameter specifies the interval between regenerations of new session keys. In seconds, expressed as a power of 2.<br>Default value: 12<br>Minimum value = 0<br>Maximum value = 32
revokelogsec<Double>Read-writeInterval between re-randomizations of the autokey seeds to prevent brute-force attacks on the autokey algorithms.<br>Default value: 16<br>Minimum value = 0<br>Maximum value = 32

Operations

(click to see Properties)

UPDATE | UNSET | GET (ALL)

Some options that you can use for each operations:

  • Getting warnings in response: NITRO allows you to get warnings in an operation by specifying the "warning" query parameter as "yes". For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:

    http://<netscaler-ip-address>/nitro/v1/config/login?warning=yes

    If any, the warnings are displayed in the response payload with the HTTP code "209 X-NITRO-WARNING".

  • Authenticated access for individual NITRO operations: NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,

    To do this, you must specify the username and password in the request header of the NITRO request as follows:

    X-NITRO-USER:<username>

    X-NITRO-PASS:<password>

    Note: In such cases, make sure that the request header DOES not include the following:

    Cookie:NITRO_AUTH_TOKEN=<tokenvalue>

Note:

Mandatory parameters are marked in red and placeholder content is marked in <green>.

update

URL: http://<NSIP>/nitro/v1/config/

HTTP Method: PUT

Request Payload:

{
"params": {
      "warning":<String_value>,
      "onerror":<String_value>"
},
sessionid":"##sessionid",
"ntpparam":{
      "authentication":<String_value>,
      "trustedkey":<Double[]_value>,
      "autokeylogsec":<Double_value>,
      "revokelogsec":<Double_value>,
}}

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": }

unset

URL: http://<NSIP>/nitro/v1/config/

HTTP Method: POST

Request Payload:

object={
"params":{
      "warning":<String_value>,
      "onerror":<String_value>,
      "action":"unset"
},
"sessionid":"##sessionid",
"ntpparam":{
      "authentication":true,
      "trustedkey":true,
      "autokeylogsec":true,
      "revokelogsec":true,
}}

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": }

get (all)

URL: http://<NSIP>/nitro/v1/config/ntpparam

HTTP Method: GET

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": <String_value>, "ntpparam": [ {
      "authentication":<String_value>,
      "trustedkey":<Double[]_value>,
      "autokeylogsec":<Double_value>,
      "revokelogsec":<Double_value>

}]}