H3C Technologies H3C SecPath F1000-E User Manual
Page 108

i
Table of Contents
Public Key Configuration············································································································································· 1
Asymmetric Key Algorithm Overview ·····························································································································1
Basic Concepts ·························································································································································1
Key Algorithm Types ················································································································································1
Asymmetric Key Algorithm Applications················································································································2
Configuring the Local Asymmetric Key Pair ···················································································································2
Creating an Asymmetric Key Pair···························································································································2
Displaying or Exporting the Local RSA or DSA Host Public Key·········································································3
Destroying an Asymmetric Key Pair ·······················································································································3
Configuring the Public Key of a Peer······························································································································3
Displaying and Maintaining Public Keys························································································································4
Public Key Configuration Examples ································································································································5
Configuring the Public Key of a Peer Manually····································································································5
Importing the Public Key of a Peer from a Public Key File···················································································6