iTable of Contents1 Public Key Configuration··························································································································1-1Asymmetric Key Algorithm Overview······································································································1-1Basic Concepts································································································································1-1Key Algorithm Types ·······················································································································1-1Asymmetric Key Algorithm Applications··························································································1-1Configuring the Local Asymmetric Key Pair····························································································1-2Creating an Asymmetric Key Pair ···································································································1-2Displaying or Exporting the Local RSA or DSA Host Public Key ····················································1-3Destroying an Asymmetric Key Pair································································································1-3Configuring the Public Key of a Peer ······································································································1-3Displaying and Maintaining Public Keys ·································································································1-4Public Key Configuration Examples········································································································1-5Configuring the Public Key of a Peer Manually···············································································1-5Importing the Public Key of a Peer from a Public Key File······························································1-6