HP VPN Firewall Appliances VPN Configuration Guide

316
8B2B
AA3BC3BCA80AAB5EE01986BD1EF64B42F17CCAE4A77F1EF999B2BF9C4A10203010001
=====================================================
Time of Key pair created: 09:50:07 2007/08/07
Key name: SERVER_KEY
Key type: RSA Encryption Key
=====================================================
Key code:
307C300D06092A864886F70D0101010500036B003068026100999089E7AEE9802002D9EB2D0433B87
BB61
58E35000AFB3FF310E42F109829D65BF70F7712507BE1A3E0BC5C2C03FAAF00DFDDC63D004B4490DA
CBA3
CFA9E84B9151BDC7EECE1C8770D961557D192DE2B36CAF9974B7B293363BB372771C2C1F020301000
1
# Export the RSA host public key HOST_KEY to a file named devicea.pub.
[DeviceA] public-key local export rsa ssh2 devicea.pub
2. Enable the FTP server function on Device A:
# Enable the FTP server function, and create an FTP user with the username ftp, password 123, and
user level 3. This user level makes sure the user has the permission to perform FTP operations.
[DeviceA] ftp server enable
[DeviceA] local-user ftp
[DeviceA-luser-ftp] password simple 123
[DeviceA-luser-ftp] service-type ftp
[DeviceA-luser-ftp] authorization-attribute level 3
[DeviceA-luser-ftp] quit
3. On Device B, get the public key file of Device A:
# From Device B, use FTP to log in to Device A, and get the public key file devicea.pub with the file
transfer mode of binary.
<DeviceB> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):ftp
331 Password required for ftp.
Password:
230 User logged in.
[ftp] binary
200 Type set to I.
[ftp] get devicea.pub
227 Entering Passive Mode (10,1,1,1,5,148).
125 BINARY mode data connection already open, transfer starting for /devicea.pub.
226 Transfer complete.
FTP: 299 byte(s) received in 0.189 second(s), 1.00Kbyte(s)/sec.
[ftp] quit
221 Server closing.
4. Import the host public key of Device A to Device B: