R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101

114
To do… Use the command…
Remarks
Import the host public key from the
public key file
public-key peer keyname import
sshkey filename
Required
Follow these steps to manually configure the peer public key on the local device:
To do… Use the command…
Remarks
Enter system view system-view
Specify a name for the public key
and enter public key view
public-key peer keyname
Required
Enter public key code view
public-key-code begin
Configure the peer public key Type or copy the key
Required
Spaces and carriage returns are allowed
between characters.
Return to public key view public-key-code end
Required
When you exit public key code view, the
system automatically saves the public key.
Return to system view peer-public-key end
Displaying and maintaining public keys
To do… Use the command…
Remarks
Display the public keys of the local asymmetric
key pairs
display public-key local rsa public
Available in any
view
Display the specified or all peer public keys on
the local device
display public-key peer [ brief | name
publickey-name ]
Public key configuration examples
Manually specifying the peer public key on the local device
Network requirements
As shown in Figure 103, to prevent illegal access, LB B (the local device) authenticates LB A (the peer
device) through a digital signature. Before configuring authentication parameters on LB B, configure the
public key of LB A on LB B.
Configure LB B to use the asymmetric key algorithm of RSA to authenticate LB A.
Manually specify the host public key of LB A's public key pair on LB B.
Figure 103 Network diagram for manually specifying a peer public key