1-3Key pairs created with the public-key local create command are saved automatically and can survivesystem reboots.Displaying or Exporting the Local RSA or DSA Host Public KeyDisplay the local RSA or DSA host public key on the screen or export it to a specified file. Then, you canconfigure the local RSA or DSA host public key on the remote end so that the remote end can use thehost public key to authentication the local end through digital signature.Follow these steps to display or export the local RSA or DSA host public key:To do… Use the command… RemarksEnter system view system-view —Display the local RSA hostpublic key on the screen in aspecified format, or export it toa specified filepublic-key local export rsa{ openssh | ssh1 | ssh2 }[ filename ]Display the local DSA hostpublic key on the screen in aspecified format, or export it toa specified filepublic-key local export dsa{ openssh | ssh2 } [ filename ]Select a command according tothe type of the key to beexported.Destroying an Asymmetric Key PairAn asymmetric key pair may expire or leak. In this case, you need to destroy it and generate a new pair.Follow these steps to destroy an asymmetric key pair:To do… Use the command… RemarksEnter system view system-view —Destroy an asymmetric key pair public-key local destroy { dsa| rsa } RequiredConfiguring the Public Key of a PeerTo enable your local host to authenticate a remote host, configure the RSA or DSA public key of thatpeer on the local host by following either of the methods:z Configure it manually: View the peer's host public key by the display command or other means onthe remote host and record the public key. On the local host, input or copy the key data in publickey code view.z Import it from a public key file: Obtain a copy of the peer's public key file through FTP or TFTP (inbinary mode) first, and then import the public key from the file. During the import process, thesystem automatically converts the public key to a string in PKCS (Public Key CryptographyStandards) format.