It is important to note that configuring authentication doesn’t require clients to use authentication
— it merely enables them to do so. Our NTP servers will still answer requests that are not
authenticated, so we’ll want to use access lists to control access as well (coming in the next lab).
Our first step in turning on authentication is to enable it on R1. Recall from above that we’re
going to use the key “ThereIsTimeForEverything” (bonus points for the first person to leave a
comment below telling me who that quote is from!):