R211x-HP Flexfabric 11900 Security Command Reference

Table Of Contents
165
Table 21 Default local key pair names
T
yp
e Default name
RSA
Host key pair: hostkey
Server key pair: serverkey
DSA dsakey
ECDSA ecdsakey
Usage guidelines
The key algorithm must be the same as required by the security application.
The key modulus length must be appropriate (see Table 22)
. The longer the key modulus length, the
higher the security, and the longer the key generation time.
If you do not assign the key pair a name, the system assigns the default name to the key pair and marks
the key pair as default. You can also assign the default name to another key pair, but the system does not
mark the key pair as default.
The name of a key pair must be unique among all manually named key pairs that use the same key
algorithm, but can be the same as a key pair that uses a different key algorithm. If a name conflict occurs,
the system asks whether you want to overwrite the existing key pair.
The key pairs are automatically saved and can survive system reboots.
Table 22 A comparison of different types of asymmetric key pairs
T
yp
e Number of ke
y
p
airs
Modulus len
g
th
HP recommendation
RSA
In non-FIPS mode:
{ If you specify a key pair name, the
command creates a host key pair.
{ If you do not specify a key pair
name, the command creates one
server key pair and one host key
pair, and both key pairs use their
default names.
In FIPS mode:
If you do not specify a key pair name,
the command creates a host key pair.
In non-FIPS mode:
The value range is
512 to 2048 and
the default is1024,
in bits.
In FIPS mode:
2048 bits.
At least 768 bits
DSA
The command only creates one host key
pair.
In non-FIPS mode:
The value range is
512 to 2048 and
the default is1024,
in bits.
In FIPS mode:
2048 bits.
At least 768 bits
ECDSA
The command only creates one host key
pair.
192 bits. N/A
NOTE:
Only SSH 1.5 uses the RSA server key pair.