Entering A Peer Public Key; Displaying And Maintaining Public Keys; Examples Of Public Key Management; Example For Entering A Peer Public Key - HP FlexFabric 5930 Series Security Configuration Manual

Hide thumbs Also See for FlexFabric 5930 Series:
Table of Contents

Advertisement

Step
2.
Import a peer host public key
from a public key file.

Entering a peer public key

Step
1.
Enter system view.
2.
Specify a name for the peer
public key and enter public
key view.
3.
Type or copy the key.
4.
Return to system view.

Displaying and maintaining public keys

Execute display commands in any view.
Task
Display local public keys.
Display peer public keys.

Examples of public key management

Example for entering a peer public key

Network requirements
As shown in
signature. Before configuring authentication parameters on Device B, configure the public key of Device
A on Device B.
Configure Device B to use the asymmetric key algorithm of RSA to authenticate Device A.
Manually specify the host public key of Device A on Device B.
Command
public-key peer keyname import sshkey
filename
Command
system-view
public-key peer keyname
N/A
peer-public-key end
Figure
16, to prevent illegal access, Device B authenticates Device A through a digital
Command
display public-key local { dsa | ecdsa | rsa } public [ name
key-name ]
display public-key peer [ brief | name publickey-name ] [ name
key-name ]
64
Remarks
By default, no peer host
public key exists.
Remarks
N/A
By default, no peer host public key exists.
You can use spaces and carriage returns,
but the system does not save them.
When you exit public key view, the
system automatically saves the public
key.

Advertisement

Table of Contents
loading

Table of Contents