Operation Manual – SSHH3C S5100-SI/EI Series Ethernet Switches Chapter 1 SSH Configuration1-11Table 1-5 Follow these steps to create key pairs:To do... Use the command... RemarksEnter system view system-view —Generate anRSA key pairs public-key local create rsaGeneratekey pair(s) Generate a DSAkey pair public-key local create dsaRequiredBy default, no keypairs aregenerated.Note:z The command for generating a key pair can survive a reboot. You only need toconfigure it once.z It takes more time to encrypt and decrypt data with a longer key, which, however,ensures higher security. Therefore, specify the length of the key pair accordingly.z Some third-party software, for example, WinSCP, requires that the modulo of apublic key must be greater than or equal to 768. Therefore, a local key pair of morethan 768 bits is recommended.II. Destroying key pairsThe RSA or DSA keys may be exposed, and you may want to destroy the keys andgenerate new ones.Follow these steps to destroy key pairs:To do… Use the command… RemarksEnter system view system-view —Destroy theRSA key pairs public-key local destroy rsaDestroykey pair(s) Destroy theDSA key pair public-key local destroy dsaOptional1.3.5 Creating an SSH User and Specifying an Authentication TypeThis task is to create an SSH user and specify an authentication type. Specifying anauthentication type for a new user is a must to get the user login.An SSH user is represented as a set of user attributes on the SSH server. This set isuniquely identified with the SSH username. When a user logs in to the SSH server fromthe SSH client, a username is required so that the server can looks up the database for