R3303-HP HSR6800 Routers Security Configuration Guide

98
Connection limit configuration task list,367
Contacting HP,94
C
ontrolled/uncontrolled port and port authorization
status,73
C
ontrolling access of portal users,131
Co
nventions,95
Cr
eating a connection limit policy,367
Cr
eating a local asymmetric key pair,206
Cr
eating a user profile,187
D
D
estroying a local asymmetric key pair,208
De
stroying the local RSA key pair,227
Disa
bling next payload field checking,294
Displa
ying and maintaining 802.1X,97
Dis
playing and maintaining AAA,53
Displa
ying and maintaining attack detection and
protection,12
Displa
ying and maintaining connection limiting,368
Displa
ying and maintaining EAD fast deployment,106
Displa
ying and maintaining FIPS,61
Displa
ying and maintaining IKE,294
Displa
ying and maintaining IP source guard,26
Displa
ying and maintaining IPsec,267
Displa
ying and maintaining MAC authentication,114
Displa
ying and maintaining password control,196
Displa
ying and maintaining PKI,228
Displa
ying and maintaining port security,175
Displa
ying and maintaining portal,14 0
Displa
ying and maintaining session management,365
Displa
ying and maintaining SSH,321
Displa
ying and maintaining TCP attack protection,22
Displa
ying and maintaining user profile,188
Displa
ying and maintaining Web filtering,376
Displa
ying and recording the host public key
information,207
Displa
ying or exporting the local host public key,206
Displa
ying public keys,210
Displa
ying the host public key in a specific format and
saving it to a file,207
Dy
namic IPv4 source guard by DHCP relay
configuration example,30
Dy
namic IPv4 source guard by DHCP snooping
configuration example,29
E
E
AD fast deployment configuration example,107
Ena
bling 802.1X,87
Ena
bling a user profile,188
Ena
bling ALG,354
Ena
bling EAP relay or EAP termination,88
Ena
bling FIPS mode,61
Ena
bling Layer 3 portal authentication,13 0
Ena
bling password control,192
Ena
bling port security,169
Ena
bling protection against Naptha attacks,22
Ena
bling source MAC consistency check for ND
packets,53
E
nabling the periodic online user re-authentication
function,94
Ena
bling the proxy detection function,92
Ena
bling the SYN Cookie feature,21
Ena
bling traffic statistics on an interface,12
Expor
ting an RSA key pair,208
Expor
ting an RSA key pair
To copy a local RSA key pair to another device, you
must export the RSA key pair on the local device and
then import it to the target router. For information about
importing an RSA key pair, see "Importing an RSA key
pair."
To export an RSA key pair:
Step
Command
Remarks
Enter system view.
system-view
N/A
Export an RSA key pair in PEM format.
public-key local export rsa name key-name pem
{ 3des-cbc | aes-cbc-128 | aes-cbc-192 | aes-cbc-256
| des-cbc } password
The command displays the public key and private key
of the exported RSA key pair in PEM format on the
terminal. The private key is encrypted using the
encryption algorithm and password specified in the
command.
You cannot export the default RSA key pair.