HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 159

the key pair as, You can also assign the default name to another key pair, but the system does

Page 159 highlights

Usage guidelines The key algorithm must be the same as required by the security application. The key modulus length must be appropriate (see Table 22). The longer the key modulus length, the higher the security, and the longer the key generation time. If you do not assign the key pair a name, the system assigns the default name to the key pair and marks the key pair as default. You can also assign the default name to another key pair, but the system does not mark the key pair as default. The name of a key pair must be unique among all manually named key pairs that use the same key algorithm, but can be the same as a key pair that uses a different key algorithm. If a name conflict occurs, the system asks whether you want to overwrite the existing key pair. The key pairs are automatically saved and can survive system reboots. Table 22 A comparison of different types of asymmetric key pairs Type RSA (in non-FIPS mode) RSA (in FIPS mode) DSA (in non-FIPS mode) DSA (in FIPS mode) ECDSA Number of key pairs • If you specify a key pair name, the command creates a host key pair. • If you do not specify a key pair name, the command creates one server key pair and one host key pair, and both key pairs use their default names. Modulus length 512 to 2048 bits. 1024 by default. If you do not specify a key pair name, the command only creates a host key pair, 2048 bits. and the key pair uses the default name. The command only creates one host key 512 to 2048 bits. pair. 1024 by default. The command only creates one host key pair. 2048 bits. The command only creates one host key pair. 192 bits. HP recommendation At least 768 bits. N/A At least 768 bits. N/A N/A NOTE: Only SSH 1.5 uses the RSA server key pair. Examples # Create local RSA key pairs with default names. system-view [Sysname] public-key local create rsa The range of public key modulus is (512 ~ 2048). If the key modulus is greater than 512, it will take a few minutes. Press CTRL+C to abort. Input the modulus length [default = 1024]: Generating Keys 150

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321

150
Usage guidelines
The key algorithm must be the same as required by the security application.
The key modulus length must be appropriate (see
Table 22
). The longer the key modulus length, the
higher the security, and the longer the key generation time.
If you do not assign the key pair a name, the system assigns the default name to the key pair and marks
the key pair as
default
. You can also assign the default name to another key pair, but the system does not
mark the key pair as
default
.
The name of a key pair must be unique among all manually named key pairs that use the same key
algorithm, but can be the same as a key pair that uses a different key algorithm. If a name conflict occurs,
the system asks whether you want to overwrite the existing key pair.
The key pairs are automatically saved and can survive system reboots.
Table 22
A comparison of different types of asymmetric key pairs
Type
Number of key pairs
Modulus length
HP recommendation
RSA (in
non-FIPS
mode)
If you specify a key pair name, the
command creates a host key pair.
If you do not specify a key pair name,
the command creates one server key
pair and one host key pair, and both
key pairs use their default names.
512 to 2048 bits.
1024 by default.
At least 768 bits.
RSA
(in FIPS
mode)
If you do not specify a key pair name, the
command only creates a host key pair,
and the key pair uses the default name.
2048 bits.
N/A
DSA (in
non-FIPS
mode)
The command only creates one host key
pair.
512 to 2048 bits.
1024 by default.
At least 768 bits.
DSA
(in FIPS
mode)
The command only creates one host key
pair.
2048 bits.
N/A
ECDSA
The command only creates one host key
pair.
192 bits.
N/A
NOTE:
Only SSH 1.5 uses the RSA server key pair.
Examples
# Create local RSA key pairs with default names.
<Sysname> system-view
[Sysname] public-key local create rsa
The range of public key modulus is (512 ~ 2048).
If the key modulus is greater than 512, it will take a few minutes.
Press CTRL+C to abort.
Input the modulus length [default = 1024]:
Generating Keys...
...++++++
.++++++