i
Table of Contents
1 Public Key Configuration··························································································································1-1
Asymmetric Key Algorithm Overview······································································································1-1
Basic Concepts································································································································1-1
Key Algorithm Types ·······················································································································1-1
Asymmetric Key Algorithm Applications··························································································1-2
Configuring the Local Asymmetric Key Pair····························································································1-2
Creating an Asymmetric Key Pair ···································································································1-2
Displaying or Exporting the Local RSA or DSA Host Public Key····················································1-3
Destroying an Asymmetric Key Pair································································································1-3
Configuring the Public Key of a Peer······································································································1-3
Displaying and Maintaining Public Keys ·································································································1-5
Public Key Configuration Examples········································································································1-5
Configuring the Public Key of a Peer Manually···············································································1-5
Importing the Public Key of a Peer from a Public Key File······························································1-7