H3C Technologies H3C S5120 Series Switches User Manual
Page 511

i
Table of Contents
1 Public Key Configuration··························································································································1-1
Asymmetric Key Algorithm Overview······································································································1-1
Basic Concepts································································································································1-1
Key Algorithm Types ·······················································································································1-1
Configuring the Local Asymmetric Key Pair····························································································1-2
Creating an Asymmetric Key Pair ···································································································1-2
Destroying an Asymmetric Key Pair································································································1-3
Configuring the Public Key of a Peer ······································································································1-3
Displaying and Maintaining Public Keys ·································································································1-5
Public Key Configuration Examples········································································································1-5