Packet Tracer - Configure And Verify Ntp

6 min read

Packet Tracer – Configure and Verify NTP

Network Time Protocol (NTP) is essential for synchronizing clocks across all devices in a network. Also, in Cisco Packet Tracer, you can practice NTP configuration on routers, switches, and hosts, then verify the time accuracy using simple commands. That said, this guide walks you through the entire process, from setting up the topology to troubleshooting common issues. By the end, you’ll know how to configure an NTP server, secure NTP communications, and confirm that devices stay in sync No workaround needed..

This changes depending on context. Keep that in mind.


Introduction

Accurate timekeeping is critical for many network functions: logging events, coordinating authentication, scheduling backups, and ensuring proper operation of protocols such as H.323 and VoIP. NTP allows devices to request the current time from a trusted source and adjust their local clocks accordingly. In a lab environment like Packet Tracer, configuring NTP helps students understand how routers and switches maintain time consistency and how to debug time-related problems And that's really what it comes down to..

Key Concepts Covered

  • NTP server and client roles
  • Configuring NTP on routers, switches, and PCs
  • Securing NTP with access lists and authentication
  • Verifying NTP status and troubleshooting

1. Setting Up the Lab Topology

Create a simple topology that includes:

Device Role Description
Router R1 NTP Server Provides the accurate time to other devices. So naturally,
Router R2 NTP Client Syncs its clock with R1. Worth adding:
Switch S1 NTP Client Uses R1 as its NTP server.
PC1 NTP Client Synchronizes with R1.

Steps

  1. Drag one router, another router, a switch, and a PC into the workspace.
  2. Connect the devices with copper straight‑through cables:
    • R1‑R2 (GigabitEthernet0/0)
    • R1‑S1 (GigabitEthernet0/1)
    • R1‑PC1 (FastEthernet0/0)
  3. Assign IP addresses:
    • R1: 192.168.1.1/24
    • R2: 192.168.1.2/24
    • S1: 192.168.1.3/24
    • PC1: 192.168.1.4/24
  4. Verify connectivity with ping from each device to the others.

2. Configuring the NTP Server (R1)

2.1 Basic NTP Configuration

On R1, enable NTP and set the local NTP clock:

R1> enable
R1# configure terminal
R1(config)# clock timezone PST -8
R1(config)# clock summer-time PDT recurring start-time 2:00 end-time 1:00 days-sun 2
R1(config)# ntp master 2
  • clock timezone sets the local time zone.
  • clock summer-time enables daylight saving adjustments.
  • ntp master 2 designates R1 as an NTP server with a reference ID of 2.

2.2 Securing the NTP Server

To prevent unauthorized NTP requests, create an access list and apply it to the NTP service:

R1(config)# access-list 10 permit 192.168.1.0 0.0.0.255
R1(config)# ntp access-group peer 10

Only devices in the 192.168.Here's the thing — 1. 0/24 network can peer with R1 Surprisingly effective..

2.3 Optional: Use an External NTP Server

If you have internet connectivity in Packet Tracer, you can point R1 to an external NTP server (e.g.That's why , `time. nist Not complicated — just consistent. Worth knowing..

R1(config)# ntp server time.nist.gov

This provides a more accurate reference than the local clock.


3. Configuring NTP Clients (R2, S1, PC1)

3.1 Router R2

R2> enable
R2# configure terminal
R2(config)# ntp server 192.168.1.1
R2(config)# ntp trusted-key 1

The ntp server command tells R2 to sync with R1. ntp trusted-key is optional but useful if you later enable authentication.

3.2 Switch S1

S1> enable
S1# configure terminal
S1(config)# ntp server 192.168.1.1

Switches support NTP for accurate logging and SNMP traps.

3.3 PC1

On a PC, open the command prompt and run:

C:\> w32tm /config /manualpeerlist:"192.168.1.1" /syncfromflags:manual /reliable:yes /update
C:\> net stop w32time
C:\> net start w32time
C:\> w32tm /resync

This sets the PC to use R1 as its NTP source and forces an immediate resynchronization.


4. Verifying NTP Configuration

4.1 On Routers and Switches

Use show ntp status and show ntp associations:

R2# show ntp status

You should see:

Clock is synchronized
Reference ID: 192.168.1.1
Stratum: 2
Reference time: 2026-05-16 10:15:00

show ntp associations lists all peers:

R2# show ntp associations

The output will display the peer address, stratum, and reachability.

4.2 On the Switch

S1# show ntp status
S1# show ntp associations

The switch will report similar information Took long enough..

4.3 On the PC

C:\> w32tm /query /status

The output should show:

Source: 192.168.1.1
Stratum: 2

5. Common Troubleshooting Steps

Symptom Likely Cause Fix
No time synchronization NTP server unreachable Verify IP addresses, ping R1 from clients.
Clock drift NTP server not set as master Ensure ntp master on R1 and ntp server on clients.
Access denied ACL blocks NTP Update access list to permit NTP (port 123). Think about it:
Authentication errors Keys mismatched or not configured Configure ntp authentication-key and ntp trusted-key consistently.
Client shows “Not synchronized” NTP client not allowed to peer Confirm ntp access-group on server allows client's subnet.

6. Enhancing NTP Security

6.1 NTP Authentication

  1. Create a key on the server:

    R1(config)# ntp authentication-key 1 md5 MySecretKey
    
  2. Enable authentication on the server:

    R1(config)# ntp authentication
    
  3. Configure clients to use the key:

    R2(config)# ntp authentication-key 1 md5 MySecretKey
    R2(config)# ntp trusted-key 1
    

6.2 Using Authenticated Access Lists

R1(config)# access-list 10 permit 192.168.1.0 0.0.0.255 eq 123
R1(config)# ntp access-group peer 10

This ensures only authenticated traffic on UDP port 123 Worth keeping that in mind..


7. Advanced Topics

7.1 NTP Stratum Hierarchy

  • Stratum 0: Unsynchronized reference clocks (atomic clocks).
  • Stratum 1: Devices directly connected to Stratum 0.
  • Stratum 2: Devices synchronized to Stratum 1.

In the lab, R1 acts as Stratum 1, while R2, S1, and PC1 become Stratum 2.

7.2 NTP Forwarding and Redundancy

If you have multiple NTP servers, configure routers to use the best source:

R2(config)# ntp server 192.168.1.1 prefer
R2(config)# ntp server 192.168.1.5

The prefer keyword tells the router to choose R1 over other servers.

7.3 Monitoring NTP Health

Use SNMP or syslog to monitor NTP status. To give you an idea, on a router:

R2(config)# snmp-server community public ro

Then poll the NTP OIDs to detect drift or synchronization failures.


8. FAQ

Q1: Why does my PC show “Clock is unsynchronized” even after configuring NTP?
A1: Ensure the Windows Time service is running and that the PC’s firewall allows UDP 123. Re‑run w32tm /resync.

Q2: Can a switch act as an NTP server?
A2: Some switches support NTP server mode, but many only function as clients. Check the device documentation Which is the point..

Q3: What happens if two NTP servers have conflicting times?
A3: Devices typically choose the server with the lowest stratum and highest reachability. You can use the prefer keyword to resolve conflicts.

Q4: How do I reset NTP configuration on a router?
A4: Use no ntp server <ip> to remove peers and no ntp master to stop the server role.


Conclusion

Configuring and verifying NTP in Packet Tracer equips you with the practical skills needed to maintain accurate time across a network—a foundation for reliable logs, authentication, and synchronization. Day to day, by following the steps above, you’ll set up a secure, hierarchical NTP environment, verify its operation, and troubleshoot common pitfalls. Mastering NTP not only strengthens your networking knowledge but also prepares you for real‑world deployments where precise timekeeping is non‑negotiable Nothing fancy..

It sounds simple, but the gap is usually here.

New Additions

Fresh from the Desk

Curated Picks

Keep the Thread Going

Thank you for reading about Packet Tracer - Configure And Verify Ntp. We hope the information has been useful. Feel free to contact us if you have any questions. See you next time — don't forget to bookmark!
⌂ Back to Home