Destroying A Local Asymmetric Key Pair; Specifying The Peer Public Key On The Local Device - HP 6125G Configuration Manual

Security configuration guide
Hide thumbs Also See for 6125G:
Table of Contents

Advertisement

Destroying a local asymmetric key pair

You may need to destroy a local asymmetric key pair and generate a new pair when an intrusion event
has occurred, the storage media of the device is replaced, the asymmetric key has been used for a long
time, or the local certificate expires. For more information about the local certificate, see
PKI."
To destroy a local asymmetric key pair:
Step
1.
Enter system view.
2.
Destroy a local asymmetric key pair.

Specifying the peer public key on the local device

In some applications, such as SSH, to enable the local device to authenticate a peer device, specify the
peer public key on the local device. The device supports up to 20 peer public keys.
For information about displaying or exporting the host public key, see
host public
key."
Take one of the following methods to specify the peer public key on the local device:
Method
Import the public key from a public
key file (recommended)
Manually configure the public
key—enter or copy the key data
To import the host public key from a public key file to the local device:
Step
1.
Enter system view.
2.
Import the host public key from the public key file.
To manually configure the peer public key on the local device:
Command
system-view
public-key local destroy { dsa | rsa }
Prerequisites
3.
Save the host public key of the
intended asymmetric key pair
in a file.
4.
Transfer a copy of the file
through FTP or TFTP in binary
mode to the local device.
Display and record the public
key of the intended asymmetric
key pair.
If the peer device is an HP
device, use the display
public-key local public
command to view and record
its public key. A public key
displayed by other methods for
the HP device may not be in a
correct format.
Command
system-view
public-key peer keyname import sshkey filename
150
"Configuring
"Displaying or exporting the local
Remarks
During the import process, the
system automatically converts the
public key to a string in Public Key
Cryptography Standards (PKCS)
format.
The recorded public key must
be in the correct format, or the
manual configuration of a
format-incompliant public key
will fail.
Always use the first method if
you are not sure about the
format of the recorded public
key.

Advertisement

Table of Contents
loading

This manual is also suitable for:

6125 blade switch series

Table of Contents