Yealink Forums

Full Version: Android NTP make it stop
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
52.172.27.135
133.243.238.244
129.250.35.250
202.65.114.202
188.93.95.100

so many android NTP servers being queried by my CP960s.

I've configured my own NTP servers on the devices so I don't know why your underlying android feels the need to ignore that setting and do whatever it wants.

Please fix it. This feels like amateur hour.
Are those static IP's or are those from an NTP server pool.

Can't you just point them to your country/time zone ntp?
(04-02-2019 04:35 PM)Chris708 Wrote: [ -> ]Are those static IP's or are those from an NTP server pool.

Can't you just point them to your country/time zone ntp?

the point is I've already pointed them to my internal NTP servers at the firmware level but these are showing up in wireshark/splunk data at the android level underneath the controllable firmware. they're being blocked by the firewall so it's not a huge deal but having a spot to manage NTP settings then ignoring those settings is dishonest in my opinion and should be fixed.

maybe this is why people historically don't install firmware on top of operating systems.
Reference URL's