No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Advanced O&M Command Reference

OceanStor 5000, 5000F, 6000, and 6000F V5 Series V500R007

This document is applicable to OceanStor 5110 V5, 5110F V5, 5300 V5, 5500 V5, 5600 V5, 5800 V5, 6800 V5, 5300F V5, 5500F V5, 5600F V5, 5800F V5, and 6800F V5. Based on the CLI, this document describes how to use various commands classified by functionsand how to set the CLI and manage the storage system through these commands.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Replacing the Default Public or Private Key Pair

Replacing the Default Public or Private Key Pair

Currently, only the ibc_os_hsuser can use digital signature RSA to use SSH to log in to the device without a password on the heartbeat port. To ensure account security, it is recommended that you replace the default ibc_os_hs public/private key pair with your own key pair. You can generate a public/private key pair as instructed by the following or use other tools to generate one. Currently, the ibc_os_hs user only supports RSA.


  1. On a device running Linux, log in as root, run the ssh-keygen -t rsa command to generate a public/private key pair, and press Enter to accept all the default settings. A private key file id_ras and a public key file are generated and are saved in the /root/.ssh/id_rsa file, as shown in Replacing the Default Public or Private Key Pair.
    Figure B-1 Generating a public/private key pair
  2. Run the mv command to rename the public key file to authorized_keys.

    mv /root/.ssh/ /root/.ssh/authorized_keys

  3. Run getremotefile to upload private key file id_rsa and public key file authorized_keys to the /home/permitdir directory of each controller on disk arrays.
  4. Log in to the controllers and enter the developer mode by running the following command:

    admin:/>change user_mode current_mode user_mode=developer

    developer:/> \\ Login succeeds.

    Switch to the minisystem mode, run changeibckey to replace the public and private keys of ibc_os_hs, and store the keys to disks.

    Figure B-2 Replacing the public and private keys of ibc_os_hs
Updated: 2019-07-11

Document ID: EDOC1000181619

Views: 631289

Downloads: 252

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next