HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 161

Displaying and maintaining public keys, Public key configuration examples

Page 161 highlights

Step Command 1. Enter system view. system-view 2. Specify a name for the public key and enter public key view. public-key peer keyname 3. Enter public key code view. public-key-code begin 4. Configure the peer public key. Enter or copy the key 5. Return to public key view. 6. Return to system view. public-key-code end peer-public-key end Remarks N/A N/A N/A Spaces and carriage returns are allowed between characters, but are not saved. When you exit public key code view, the system automatically saves the public key. N/A Displaying and maintaining public keys Task Display the local public keys. Display the specified or all peer public keys on the local device. Command Remarks display public-key local { dsa | rsa } public [ | { begin | exclude | include } regular-expression ] Available in any view display public-key peer [ brief | name publickey-name ] [ | { begin | exclude | include } regular-expression ] Available in any view Public key configuration examples Manually specifying the peer public key on the local device Network requirements As shown in Figure 43, to prevent illegal access, Device B (the local device) authenticates Device A (the peer device) through a digital signature. Before configuring authentication parameters on Device B, configure the public key of Device A on Device B. • Configure Device B to use the asymmetric key algorithm of RSA. • Manually specify the host public key of Device A's public key pair on Device B. Figure 43 Network diagram Configuration procedure 1. Configure Device A; # Create local RSA key pairs on Device A, setting the modulus length to the default, 1024 bits. 151

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

151
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Specify a name for the public
key and enter public key view.
public-key peer
keyname
N/A
3.
Enter public key code view.
public-key-code begin
N/A
4.
Configure the peer public key.
Enter or copy the key
Spaces and carriage returns are
allowed between characters, but
are not saved.
5.
Return to public key view.
public-key-code end
When you exit public key code
view, the system automatically
saves the public key.
6.
Return to system view.
peer-public-key end
N/A
Displaying and maintaining public keys
Task
Command
Remarks
Display the local public keys.
display public-key local
{
dsa
|
rsa
}
public
[
|
{
begin
|
exclude
|
include
}
regular-expression
]
Available in any view
Display the specified or all peer
public keys on the local device.
display public-key peer
[
brief
|
name
publickey-name
] [
|
{
begin
|
exclude
|
include
}
regular-expression
]
Available in any view
Public key configuration examples
Manually specifying the peer public key on the local device
Network requirements
As shown in
Figure 43
, to prevent illegal access, Device B (the local device) authenticates Device A (the
peer device) through a digital signature. Before configuring authentication parameters on Device B,
configure the public key of Device A on Device B.
Configure Device B to use the asymmetric key algorithm of RSA.
Manually specify the host public key of Device A's public key pair on Device B.
Figure 43
Network diagram
Configuration procedure
1.
Configure Device A;
# Create local RSA key pairs on Device A, setting the modulus length to the default, 1024 bits.