Chapter 9: Configuration
System
Quantum DXi6900 User’s Guide 328
Figure205:Sample Public Key Page
d. Click Apply.
The "Successfully performed Security action" message appears.
e. Click OK.
The new key appears in the AvailableSSHPublicKeys table (see Figure 206 below).
Figure206:Available SSH Public Keys Table
The AvailableSSHPublicKeys table contains the following information:
Alias Name of key.
Fingerprint Short sequence of bytes used to identify a public key.
EditanSSHPublicKey