3com S7906E インストール手順

ページ / 2621
 
1-3 
 
Configuration of the public-key local create command can survive a reboot. 
The public-key local create rsa command generates two key pairs: one server key pair and one 
host key pair. Each key pair consists of a public key and a private key.  
The length of an RSA key modulus is in the range 512 to 2048 bits. After entering the public-key 
local create rsa command, you will be required to specify the modulus length. For security, a 
modulus of at least 768 bits is recommended. 
The public-key local create dsa command generates only one key pair, that is, the host key pair. 
The length of a DSA key modulus is in the range 512 to 2048 bits. After entering the public-key 
local create dsa command, you will be required to specify the modulus length. For security, a 
modulus of at least 768 bits is recommended. 
 
Displaying or Exporting the Local RSA or DSA Host Public Key 
You can display the local RSA or DSA host public key on the screen or export it to a specified file, so as 
to configure the local RSA or DSA host public key on the remote end. 
Follow these steps to display or export the local RSA or DSA host public key: 
To do… 
Use the command… 
Remarks 
Enter system view 
system-view 
— 
Display the local RSA host 
public key on the screen in a 
specified format, or export it to 
a specified file 
public-key local export rsa 
{ openssh ssh1 | ssh2 
filename ] 
Display the local DSA host 
public key on the screen in a 
specified format, or export it to 
a specified file 
public-key local export dsa 
{ openssh | ssh2 } [ filename ]
Select a command according to 
the type of the key to be 
exported. 
 
Destroying an Asymmetric Key Pair 
An asymmetric key pair may expire or leak. In this case, you need to destroy it and generate a new pair.  
Follow these steps to destroy an asymmetric key pair: 
To do… 
Use the command… 
Remarks 
Enter system view 
system-view 
— 
Destroy an asymmetric key pair 
public-key local destroy { dsa 
rsa } 
Required 
 
Configuring the Public Key of a Peer 
To authenticate the remote host, you need to configure the RSA or DSA public key of that peer on the 
local host.