Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.

Page 1911

 246 
 
Task  Remarks 
Configuring a local 
asymmetric key pair on the 
local device   Creating a local asymmetric key pair  
Required 
Displaying or exporting the local host public key Optional 
Destroying a local asymmetric key pair Optional 
Specifying the peer public key on the local device  Optional 
 
Creating a local asymmetric key pair 
When you create an asymmetric key pair on the local device, follow these guidelines: 
•  Create an asymmetric key pair of the proper type to work with a target...

Page 1912

 247 
If your local device functions to authenticate the peer device, you must specify the peer public key on the 
local device. For more information, see Specifying the peer public key on the local device .
  
Displaying and recording the host public key information 
To display the local public key:  
Task Command Remarks 
Display the local RSA public keys. display public-key local
 rsa  public  
[ |  { begin |  exclude | include } 
regular-expression  ] 
Available in any view. 
Use at least one...

Page 1913

 248 
Destroying a local asymmetric key pair 
You may need to destroy a local asymmetric key pair and generate a new pair when an intrusion event 
has occurred, the storage media of the device is repl aced, the asymmetric key has been used for a long 
time, or the local certificate expires. For more information about the local certificate, see 
1Configuring 
PKI . 
To destroy a local asymmetric key pair: 
 
Step Command 
1.   Enter system view. 
system-view 
2.  Destroy a local asymmetric key pair....

Page 1914

 249 
Step Command Remarks 
1.  Enter system view. 
system-view  N/A 
2.  Specify a name for the public 
key and enter public key view.  public-key peer 
keyname N/A 
3.  Enter public key code view. 
public-key-code begin  N/A 
4.  Configure the peer public key. 
Type or copy the key  Spaces and carriage returns are 
allowed between characters. 
5.
  Return to public key view. 
public-key-code end  When you exit public key code 
view, the system automatically 
saves the public key. 
6.
  Return to system...

Page 1915

 250 
[DeviceA] public-key local create rsa 
The range of public key size is (512 ~ 2048). 
NOTES: If the key modulus is greater than 512, 
It will take a few minutes. 
Press CTRL+C to abort. 
Input the bits of the modulus[default = 1024]: 
Generating Keys... 
++++++ 
++++++ 
++++++++ 
++++++++ 
# Display the public keys of the local RSA key pairs. 
[DeviceA] display public-key local rsa public 
 
===================================================== 
Time of Key pair created: 09:50:06  2012/03/07 
Key...

Page 1916

 251 
[DeviceB-pkey-key-code] public-key-code end 
[DeviceB-pkey-public-key] peer-public-key end 
# Display the host public key of Device A saved on Device B. 
[DeviceB] display public-key peer name devicea 
 
===================================== 
  Key Name  : devicea 
  Key Type  : RSA 
  Key Module: 1024 
===================================== 
Key Code: 
30819F300D06092A864886F70D010101050003818D0030818902818100D90003FA95F5A4\
4A2A2CD3F...

Page 1917

 252 
# Display the public keys of the local RSA key pairs. 
[DeviceA] display public-key local rsa public 
 
===================================================== 
Time of Key pair created: 09:50:06  2012/03/07 
Key name: HOST_KEY 
Key type: RSA Encryption Key 
===================================================== 
Key code: 
30819F300D06092A864886F70D010101050003818D0030818902818100D90003FA95F5A4\
4A2A2CD3F
814F9854C4421B57CAC64CFFE4782A87B0360B600497D87162D1F398E6E5E51E5E353B3A\
9AB16C9E7...

Page 1918

 253 
200 Type set to I. 
[ftp] get devicea.pub 
227 Entering Passive Mode (10,1,1,1,5,148). 
125 BINARY mode data connection already open, transfer starting for /dev\
icea.pub. 
226 Transfer complete. 
FTP: 299 byte(s) received in 0.189 second(s), 1.00Kbyte(s)/sec. 
[ftp] quit 
221 Server closing. 
4. Import the host public key  of Device A to Device B: 
# Import the host public key of  Device A from the key file devicea.pub to Device B. 
 system-view 
[DeviceB] public-key peer devicea import sshkey...

Page 1919

 254 
Configuring PKI 
Overview 
The Public Key Infrastructure (PKI) is a general security infrastructure used to provide information security 
through public key technologies.  
PKI, also called asymmetric key infrastructure, uses a key pair to encrypt and decrypt the data. The key 
pair consists of a private key and a public key. The private key must be kept secret but the public key 
needs to be distributed. Data encrypted by one of  the two keys can only be decrypted by the other. 
A key problem with...

Page 1920

 255 
such as phone, disk, and email. As different CAs might use different methods to examine the 
binding of a public key with an entity, make su re that you understand the CA policy before 
selecting a trusted CA fo r certificate request. 
PKI architecture 
A PKI system consists of entities, a CA, a regi stration authority (RA) and a PKI repository. 
Figure 94  PKI architecture 
 
 
•  Entity 
An entity is an end user of PKI products or serv ices, such as a person, an organization, a device, 
or a...
Start reading HP 5500 Ei 5500 Si Switch Series Configuration Guide

Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide

All HP manuals