R3204P16-HP Load Balancing Module Security Configuration Guide-6PW101
114
To do… Use the command…
Remarks
Import the host public key from the
public key file
public-key peer keyname import
sshkey filename
Required
Follow these steps to manually configure the peer public key on the local device:
To do… Use the command…
Remarks
Enter system view system-view —
Specify a name for the public key
and enter public key view
public-key peer keyname
Required
Enter public key code view
public-key-code begin
—
Configure the peer public key Type or copy the key
Required
Spaces and carriage returns are allowed
between characters.
Return to public key view public-key-code end
Required
When you exit public key code view, the
system automatically saves the public key.
Return to system view peer-public-key end —
Displaying and maintaining public keys
To do… Use the command…
Remarks
Display the public keys of the local asymmetric
key pairs
display public-key local rsa public
Available in any
view
Display the specified or all peer public keys on
the local device
display public-key peer [ brief | name
publickey-name ]
Public key configuration examples
Manually specifying the peer public key on the local device
Network requirements
As shown in Figure 103, to prevent illegal access, LB B (the local device) authenticates LB A (the peer
device) through a digital signature. Before configuring authentication parameters on LB B, configure the
public key of LB A on LB B.
• Configure LB B to use the asymmetric key algorithm of RSA to authenticate LB A.
• Manually specify the host public key of LB A's public key pair on LB B.
Figure 103 Network diagram for manually specifying a peer public key