HP A 5120 Manual
Here you can view all the pages of manual HP A 5120 Manual. The HP manuals for Switch are available online for free. You can easily download all the documents as PDF.
Page 191
181 To do… Use the command… Remarks Enter system view system-view — Display the local RSA host public key on the screen in a specified format, or export it to a specified file public-key local export rsa { openssh | ssh1 | ssh2 } [ filename ] Select a command according to the type of the key to be exported. Display the local DSA host public key on the screen in a specified format or export it to a specified file public-key local export dsa { openssh | ssh2 } [ filename ] Destroying...
Page 192
182 To do… Use the command… Remarks Import the peer host public key from the public key file public-key peer keyname import sshkey filename Required Follow these steps to configure a peer public key manually: To do… Use the command… Remarks Enter system view system-view — Specify a name for a peer public key and enter public key view public-key peer keyname Required Enter public key code view public-key-code begin — Configure the peer host or server public key Type or copy the key...
Page 193
183 Configure Device B to use the asymmetric key algorithm of RSA for identity authentication of Device A. Manually configure the host public key of Device A on Device B. Figure 52 Network diagram for manually configuring a peer public key Configuration procedure 1. Configure Device A. # Create RSA key pairs on Device A. system-view [DeviceA] public-key local create rsa The range of public key size is (512 ~ 2048). NOTES: If the key modulus is greater than 512, It will...
Page 194
184 2. Configure Device B. # Configure the host public key of Device A on Device B. In public key code view, input the host public key of Device A. The host public key is the content of HOST_KEY displayed on Device A using the display public-key local dsa public command. system-view [DeviceB] public-key peer devicea Public key view: return to System View with peer-public-key end. [DeviceB-pkey-public-key] public-key-code begin Public key code view: return to last view with...
Page 195
185 # Create RSA key pairs on Device A. system-view [DeviceA] public-key local create rsa The range of public key size is (512 ~ 2048). NOTES: If the key modulus is greater than 512, It will take a few minutes. Press CTRL+C to abort. Input the bits of the modulus[default = 1024]: Generating Keys... ++++++ ++++++ ++++++++ ++++++++ # Display the public keys of the created RSA key pairs. [DeviceA] display public-key local rsa public =====================================================...
Page 196
186 [DeviceB-luser-ftp] authorization-attribute level 3 [DeviceB-luser-ftp] quit 3. Upload the public key file of Device A to Device B. # FTP the public key file devicea.pub to Device B with the file transfer mode of binary. ftp 10.1.1.2 Trying 10.1.1.2 ... Press CTRL+K to abort Connected to 10.1.1.2. 220 FTP service ready. User(10.1.1.2:(none)):ftp 331 Password required for ftp. Password: 230 User logged in. [ftp] binary 200 Type set to I. [ftp] put devicea.pub 227 Entering Passive...
Page 197
187 PKI configuration PKI overview The Public Key Infrastructure (PKI) is a general security infrastructure used to provide information security through public key technologies. PKI, also called asymmetric key infrastructure, uses a key pair to encrypt and decrypt the data. The key pair consists of a private key and a public key. The private key must be kept secret but the public key needs to be distributed. Data encrypted by one of the two keys can only...
Page 198
188 statement (CPS). A CA policy can be acquired through out-of-band means such as phone, disk, and email. As different CAs might use different methods to check the binding of a public key with an entity, make sure that you understand the CA policy before selecting a trusted CA for certificate request. PKI architecture A PKI system consists of entities, a CA, a registration authority (RA), and a PKI repository. Figure 54 PKI architecture Entity An entity is...
Page 199
189 VPN A virtual private network (VPN) is a private data communication network built on the public communication infrastructure. A VPN can leverage network layer security protocols—for example, IPsec— in conjunction with PKI-based encryption and digital signature technologies for confidentiality. Secure email Emails require confidentiality, integrity, authentication, and non-repudiation. PKI can address these needs. The secure email protocol that is developing rapidly is...
Page 200
190 Task Remarks Configuring an access control policy Optional Configuring an entity DN A certificate is the binding of a public key and the identity information of an entity, where the identity information is identified by an entity distinguished name (DN). A CA identifies a certificate applicant uniquely by entity DN. An entity DN is defined by these parameters: Common name of the entity. Country code of the entity, a standard 2-character code. For example, CN...