beautypg.com

Displaying and maintaining public keys, Public key configuration examples, Configuring the public key of a peer manually – H3C Technologies H3C S7500E Series Switches User Manual

Page 200: Network requirements

background image

11-5

In this task, you can configure the RSA server public key of the peer. However, the public key

configured cannot be used for identity authentication in SSH applications, which use the RSA

host public key. For more information about SSH, see SSH2.0 Configuration in the Security

Configuration Guide.

Follow these steps to import the host public key of a peer from the public key file:

To do…

Use the command…

Remarks

Enter system view

system-view

Import the host public key of a

peer from the public key file

public-key peer keyname

import sshkey filename

Required

Displaying and Maintaining Public Keys

To do…

Use the command…

Remarks

Display the public keys of the

local key pairs

display public-key local
{ dsa | rsa } public

Display the public keys of the

peers

display public-key peer
[ brief | name
publickey-name ]

Available in any view

Public Key Configuration Examples

Configuring the Public Key of a Peer Manually

Network requirements

As shown in

Figure 11-2

, to prevent illegal access, Device B authenticates Device A through

digital signature. Before configuring authentication parameters on Device B, configure the

public key of Device A on Device B. More specifically,

z

Configure Device B to use the asymmetric key algorithm of RSA for identity authentication

of Device A.

z

Manually configure the host public key of Device A on Device B.

Figure 11-2 Network diagram for manually configuring the public key of a peer