216
=====================================================
Time of Key pair created: 09:50:07 2007/08/07
Key name: SERVER_KEY
Key type: RSA Encryption Key
=====================================================
Key code:
307C300D06092A864886F70D0101010500036B003068026100999089E7AEE9802002D9EB2D0433B87BB6158E3
5000AFB3FF310E42F109829D65BF70F7712507BE1A3E0BC5C2C03FAAF00DFDDC63D004B4490DACBA3CFA9E84B
9151BDC7EECE1C8770D961557D192DE2B36CAF9974B7B293363BB372771C2C1F0203010001
2.
Configure Router B.
# Configure the host public key of Router A on Router B. In public key code view, enter the host public
key of Router A. The host public key is the content of HOST_KEY displayed on Router A using
display
public-key local dsa public.
<RouterB> system-view
[RouterB] public-key peer Routera
Public key view: return to System View with "peer-public-key end".
[RouterB-pkey-public-key] public-key-code begin
Public key code view: return to last view with "public-key-code end".
[RouterB-pkey-key-
code]30819F300D06092A864886F70D010101050003818D0030818902818100D90003FA95F5A44A2A2CD3F814
F9854C4421B57CAC64CFFE4782A87B0360B600497D87162D1F398E6E5E51E5E353B3A9AB16C9E766BD995C669
A784AD597D0FB3AA9F7202C507072B19C3C50A0D7AD3994E14ABC62DB125035EA326470034DC078B2BAA3BC3B
CA80AAB5EE01986BD1EF64B42F17CCAE4A77F1EF999B2BF9C4A10203010001
[RouterB-pkey-key-code] public-key-code end
[RouterB-pkey-public-key] peer-public-key end
# Display the host public key of Router A saved on Router B.
[RouterB] display public-key peer name Routera
=====================================
Key Name : Routera
Key Type : RSA
Key Module: 1024
=====================================
Key Code:
30819F300D06092A864886F70D010101050003818D0030818902818100D90003FA95F5A44A2A2CD3F814F9854
C4421B57CAC64CFFE4782A87B0360B600497D87162D1F398E6E5E51E5E353B3A9AB16C9E766BD995C669A784A
D597D0FB3AA9F7202C507072B19C3C50A0D7AD3994E14ABC62DB125035EA326470034DC078B2BAA3BC3BCA80A
AB5EE01986BD1EF64B42F17CCAE4A77F1EF999B2BF9C4A10203010001
Importing a remote host's public key from a public key file
Network requirements
, to prevent illegal access, Router B authenticates Router A through a digital
signature. Before configuring authentication parameters on Router B, configure the public key of Router
A on Router B.
•
Configure Router B to use the asymmetric key algorithm of RSA for identity authentication of Router
A.
•
Import the host public key of Router A from the public key file to Router B.