Consistent date and timestamping across a network is critical for system wide access control, security, communications, scheduling, alarms, and events. Network time uses the NTP protocol that provides the correct current UTC time.
Network Time on WorkStation, Enterprise Server, and Enterprise Central
The network time settings on WorkStation, Enterprise Server, and Enterprise Central are configured through the operating system settings on the computer where WorkStation, Enterprise Server, or Enterprise Central are installed. For more information on how to configure network time settings, refer to the manufacturer’s manual for the operating system.
Network Time Server on a SmartX Server
To configure SmartX server network time settings, you have to log on to the SmartX server through WorkStation. When logged in, the SmartX server has a
Date & Time
view where you configure the network time server addresses.
When configuring the SmartX server network time server address, you can define two time server addresses: primary time server and secondary time server. If the SmartX server fails to connect to the primary time server, it tries to synchronize its clock with the secondary.
Authenticated Network Time Servers
To increase the security of your system, you can use authenticated network time. By using authenticated network time, you decrease the risk that someone will tamper with your time setting.
To be able to use authenticated network time, you connect your EcoStruxure BMS server to an authenticated time server. You need the secure key ID and and key value password that is provided by the authenticated time server administrator.
You can use the lead/shadow relationship to transfer the authenticated time server setting and its secure key ID and key value password from the lead server or you can configure the secure time server manually on your EcoStruxure BMS server. When you use the lead/shadow relationship the Enterprise Server transfers the setting for the time server to the SmartX server. The SmartX server then uses the authenticated time server configuration to go online and get the correct time from the secure time server.
The lead/shadow relationship can also be used to transfer the settings from the time server on an Enterprise Central to an Enterprise Server.
action_zoom_plus_stroke
Figure:
The lead and shadow relationship.