Displaying And Maintaining Public Keys; Public Key Configuration Examples; Configuring A Remote Host's Public Key Manually - HP 5120 SI Series Security Configuration Manual

Hide thumbs Also See for 5120 SI Series:
Table of Contents

Advertisement

Displaying and maintaining public keys

To do...
Display the public keys of the local
key pairs
Display the public keys of the
remote hosts

Public key configuration examples

Unless otherwise noted, devices in the configuration examples are operating in non-FIPS mode.

Configuring a remote host's public key manually

Network requirements
As shown in
signature. Before configuring authentication parameters on Device B, configure the public key of Device
A on Device B.
Configure Device B to use the asymmetric key algorithm of RSA for identity authentication of Device
A.
Manually configure the host public key of Device A on Device B.
Figure 74 Network diagram for manually configuring a remote host's public key
Configuration procedure
1.
Configure Device A:
# Create RSA key pairs on Device A.
<DeviceA> system-view
[DeviceA] public-key local create rsa
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Press CTRL+C to abort.
Input the bits of the modulus[default = 1024]:
Generating Keys...
++++++
++++++
++++++++
++++++++
Use the command...
display public-key local { dsa |
rsa } public [ | { begin | exclude |
include } regular-expression ]
display public-key peer [ brief |
name publickey-name ] [ | { begin
| exclude | include }
regular-expression ]
Figure
79, to prevent illegal access, Device B authenticates Device A through a digital
215
Remarks
Available in any view

Advertisement

Table of Contents
loading

Table of Contents