No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Advanced O&M Command Reference

OceanStor 2800 V5 V500R007

This document is applicable to OceanStor 2800 V5. Based on the CLI, this document describes how to use various commands classified by functions and how to set the CLI and manage the storage system through these commands. The document that you browse online matches the latest C version of the product. Click Download to download documents of other C versions.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Replacing the Default Public or Private Key Pair

Replacing the Default Public or Private Key Pair

Currently, only the ibc_os_hsuser can use digital signature RSA to use SSH to log in to the device without a password on the heartbeat port. To ensure account security, it is recommended that you replace the default ibc_os_hs public/private key pair with your own key pair. You can generate a public/private key pair as instructed by the following or use other tools to generate one. Currently, the ibc_os_hs user only supports RSA.


  1. On a device running Linux, log in as root, run the ssh-keygen -t rsa command to generate a public/private key pair, and press Enter to accept all the default settings. A private key file id_ras and a public key file are generated and are saved in the /root/.ssh/id_rsa file, as shown in Figure B-1.
    Figure B-1 Generating a public/private key pair
  2. Run the mv command to rename the public key file to authorized_keys.
    mv /root/.ssh/ /root/.ssh/authorized_keys
  3. Run getremotefile to upload private key file id_rsa and public key file authorized_keys to the /home/permitdir directory of each controller on disk arrays.
  4. Log in to the controllers and enter the developer mode by running the following command:
    admin:/>change user_mode current_mode user_mode=developer
    developer:/> \\ Login succeeds.

    Switch to the minisystem mode, run changeibckey to replace the public and private keys of ibc_os_hs, and store the keys to disks.

    Figure B-2 Replacing the public and private keys of ibc_os_hs
Updated: 2020-01-17

Document ID: EDOC1000181575

Views: 730043

Downloads: 32

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next