H3C LS-3100-52P-OVS-H3 Operation Manual - Table of Contents
i
Table of Contents
1 Public Key Configuration··························································································································1-1
Public Key Algorithm Overview···············································································································1-1
Basic Concepts································································································································1-1
Key Algorithm Types ·······················································································································1-1
Asymmetric Key Algorithm Applications··························································································1-1
Configuring the Local Asymmetric Key Pair····························································································1-2
Creating an Asymmetric Key Pair ···································································································1-2
Displaying or Exporting the Local RSA or DSA Host Public Key ····················································1-3
Destroying an Asymmetric Key Pair································································································1-3
Configuring the Public Key of a Peer ······································································································1-3
Displaying and Maintaining Public Keys ·································································································1-4
Public Key Configuration Examples········································································································1-5
Configuring the Public Key of a Peer Manually ···············································································1-5
Importing the Public Key of a Peer from a Public Key File······························································1-6