Dustin,
Not all documents are written the same and there is always room for clarity. In this case, the document you referenced did not have all of the available options included.
Here is an example point-to-point client/server NTP topology. C8000v0...
Dustin,
Keep in mind that those are just examples using the basic capabilities of NTP authentication. Please see other documents, such as System Management Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9300 Switches) - in this case, i...
The C9200-24PB and C9200-48PB increase the available VRFs up to 32.
See Release Notes for Cisco Catalyst 9200 Series Switches, Cisco IOS XE Amsterdam 17.2.x - Cisco for more information. From a hardware perspective, the switches are a bit heavier an...
The requirement for SHA-1 and SHA-2 variants is detailed in NET0813, which can be found at public.cyber.mil (as of today). This STIG does have a caveat, near the end, that permits the use of MD5 on systems that cannot configure SHA authentication. ...