244
Time of Key pair created: 09:50:07 2012/03/07
Key name: SERVER_KEY
Key type: RSA Encryption Key
=====================================================
Key code:
307C300D06092A864886F70D0101010500036B003068026100999089E7AEE9802002D9EB2D0433B87
BB6158E35000AFB3FF310E42F109829D65BF70F7712507BE1A3E0BC5C2C03FAAF00DFDDC63D004B44
90DACBA3CFA9E84B9151BDC7EECE1C8770D961557D192DE2B36CAF9974B7B293363BB372771C2C1F0
203010001
# Export the RSA host public key HOST_KEY to a file named
devicea.pub
.
[DeviceA] public-key local export rsa ssh2 devicea.pub
2.
On Device A, enable the FTP server function, create an FTP user with the username
ftp
, password
123
, and user level
3
. This user level guarantees that the user has the permission to perform FTP
operations.
[DeviceA] ftp server enable
[DeviceA] local-user ftp
[DeviceA-luser-ftp] password simple 123
[DeviceA-luser-ftp] service-type ftp
[DeviceA-luser-ftp] authorization-attribute level 3
[DeviceA-luser-ftp] quit
3.
On Device B, use FTP to log in to Device A, and get the public key file
devicea.pub
with the file
transfer mode of binary.
<DeviceB> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):ftp
331 Password required for ftp.
Password:
230 User logged in.
[ftp] binary
200 Type set to I.
[ftp] get devicea.pub
227 Entering Passive Mode (10,1,1,1,5,148).
125 BINARY mode data connection already open, transfer starting for /devicea.pub.
226 Transfer complete.
FTP: 299 byte(s) received in 0.189 second(s), 1.00Kbyte(s)/sec.
[ftp] quit
221 Server closing.
4.
Import the host public key of Device A to Device B:
# Import the host public key of Device A from the key file
devicea.pub
to Device B.
<DeviceB> system-view
[DeviceB] public-key peer devicea import sshkey devicea.pub
# Display the host public key of Device A on Device B.
[DeviceB] display public-key peer name devicea
=====================================