beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 108

background image

i

Table of Contents

Public Key Configuration············································································································································· 1

Asymmetric Key Algorithm Overview ·····························································································································1

Basic Concepts ·························································································································································1

Key Algorithm Types ················································································································································1

Asymmetric Key Algorithm Applications················································································································2

Configuring the Local Asymmetric Key Pair ···················································································································2

Creating an Asymmetric Key Pair···························································································································2

Displaying or Exporting the Local RSA or DSA Host Public Key·········································································3

Destroying an Asymmetric Key Pair ·······················································································································3

Configuring the Public Key of a Peer······························································································································3

Displaying and Maintaining Public Keys························································································································4

Public Key Configuration Examples ································································································································5

Configuring the Public Key of a Peer Manually····································································································5

Importing the Public Key of a Peer from a Public Key File···················································································6