No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Advanced O&M Command Reference

OceanStor 2000, 5000, and 6000 V3 Series V300R006

This document is applicable to OceanStor 2200 V3, 2600 V3 Video Surveillance Edition, 2600 V3, 5300 V3, 5500 V3, 5600 V3, 5800 V3, and 6800 V3. Based on the CLI, this document describes how to use various commands classified by functionsand how to set the CLI and manage the storage system through these commands. The document that you browse online matches the latest C version of the product. Click Download to download documents of other C versions.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Replacing the Default Public or Private Key Pair

Replacing the Default Public or Private Key Pair

Currently, only the ibc_os_hsuser can use digital signature RSA to use SSH to log in to the device without a password on the heartbeat port. To ensure account security, it is recommended that you replace the default ibc_os_hs public/private key pair with your own key pair. You can generate a public/private key pair as instructed by the following or use other tools to generate one. Currently, the ibc_os_hs user only supports RSA.

Operation

  1. On a device running Linux, log in as root, run the ssh-keygen -t rsa command to generate a public/private key pair, and press Enter to accept all the default settings. A private key file id_ras and a public key file id_rsa.pub are generated and are saved in the /root/.ssh/id_rsa file, as shown in Replacing the Default Public or Private Key Pair.
    Figure B-1 Generating a public/private key pair
  2. Run the mv command to rename the public key file id_rsa.pub to authorized_keys.

    mv /root/.ssh/id_rsa.pub /root/.ssh/authorized_keys

  3. Run getremotefile to upload private key file id_rsa and public key file authorized_keys to the /home/permitdir directory of each controller on disk arrays.
  4. Log in to the controllers and enter the developer mode by running the following command:

    admin:/>change user_mode current_mode user_mode=developer

    developer:/> \\ Login succeeds.

    Switch to the minisystem mode, run changeibckey to replace the public and private keys of ibc_os_hs, and store the keys to disks.

    Figure B-2 Replacing the public and private keys of ibc_os_hs
Translation
Download
Updated: 2019-07-12

Document ID: EDOC1000138402

Views: 609066

Downloads: 695

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next