R3166-R3206-HP High-End Firewalls VPN Configuration Guide-6PW101
123
To do… Use the command…
Remarks
Configure a public key of the
peer
Type or copy the key
Required
Spaces and carriage returns are allowed
between characters.
Return to public key view public-key-code end
—
When you exit public key code view, the
system automatically saves the public key.
Return to system view peer-public-key end —
Follow these steps to import the host public key of a peer from the public key file:
To do… Use the command…
Remarks
Enter system view system-view —
Import the host public key of a peer
from the public key file
public-key peer keyname import
sshkey filename
Required
Displaying and maintaining public keys
To do… Use the command…
Remarks
Display the public keys of the local
key pairs
display public-key local { dsa |
rsa } public
Available in any view
Display the public keys of the peers
display public-key peer [ brief |
name publickey-name ]
Public key configuration examples
Configuring the public key of a peer manually
Network requirements
As shown in Figure 69, Firewall A is authenticated by Firewall B when accessing Firewall B, so the public
key of Firewall A should be configured on Firewall B in advance.
In this example:
• RSA is used.
• The host public key of Firewall A is configured manually on Firewall B.
Figure 69 Network diagram for manually configuring the public key of a peer
Configuration procedure
1. Configure Firewall A