Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 80

Configuring cipher suite selection using RACADM, FIPS mode, Enabling FIPS Mode

Page 80 highlights

• Tools and Procedures to verify and validate the resultant Cipher Suite Configuration to ensure that the results align with the expectations and requirements. NOTE: Before you configure the Advanced Settings for TLS Cipher Suites, ensure that you are using a supported web browser. To add custom cipher strings: 1. In iDRAC web interface, go to Overview > iDRAC Settings > Network > Service to access the web server settings. 2. Click Set Cipher String under the Customer Cipher String option. Set Custom Cipher String page is displayed on the screen. 3. In the Custom Cipher String field, enter a valid string and select Set Cipher String. NOTE: For more information about cipher strings, see www.openssl.org/docs/man1.0.2/apps/ciphers.html. 4. Click Apply. Setting the custom cipher string terminates the current iDRAC session. Wait for a few minutes before you open new iDRAC session. Configuring cipher suite selection using RACADM To configure cipher suite selection using RACADM, use any one of the following commands: • racadm set idrAC.webServer.customCipherString ALL:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES256- GCM-SHA384 • racadm set idrAC.webServer.customCipherString ALL:-DHE-RSA-CAMELLIA256-SHA • racadm set idrAC.webServer.customCipherString ALL:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES256- SHA256:+AES256-GCM-SHA384:-DHE-RSA-CAMELLIA256-SHA For more information about these objects, see iDRAC RACADM Command Line Interface Reference Guide available at dell.com/ idracmanuals. FIPS mode FIPS is a computer security standard that United States government agencies and contractors must use. Starting from version iDRAC 2.40.40.40, iDRAC supports enabling FIPS mode. iDRAC will be officially certified to support FIPS mode in the future. Difference between FIPS-mode supported and FIPSvalidated Software that has been validated by completing the Cryptographic Module Validation Program is referred to as FIPS-validated. Because of the time it takes to complete FIPS-validation, not all versions of iDRAC are validated. For information about the latest status of FIPSvalidation for iDRAC, see the Cryptographic Module Validation Program page on the NIST website. Enabling FIPS Mode CAUTION: Enabling FIPS mode resets iDRAC to factory-default settings. If you want to restore the settings, back up the server configuration profile (SCP) before you enable FIPS mode, and restore the SCP after iDRAC restarts. NOTE: If you reinstall or upgrade iDRAC firmware, FIPS mode gets disabled. Enabling FIPS mode using web interface 1. On the iDRAC web interface, navigate to Overview > iDRAC Settings > Network. 2. Click Advanced Settings next to Options. 3. In FIPS Mode, select Enabled and click Apply. 4. A message appears prompting you to confirm the change. Click OK. iDRAC restarts in FIPS mode. Wait for at least 60 seconds before you reconnect to iDRAC. 80 Configuring iDRAC

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

Tools and Procedures to verify and validate the resultant Cipher Suite Configuration to ensure that the results align
with the expectations and requirements.
NOTE:
Before you configure the Advanced Settings for TLS Cipher Suites, ensure that you are using a supported web
browser.
To add custom cipher strings:
1.
In iDRAC web interface, go to
Overview
>
iDRAC Settings
>
Network
>
Service
to access the web server settings.
2.
Click
Set Cipher String
under the
Customer Cipher String
option.
Set Custom Cipher String
page is displayed on the screen.
3.
In the
Custom Cipher String
field, enter a valid string and select
Set Cipher String
.
NOTE:
For more information about cipher strings, see
www.openssl.org/docs/man1.0.2/apps/ciphers.html
.
4.
Click
Apply
.
Setting the custom cipher string terminates the current iDRAC session. Wait for a few minutes before you open new iDRAC session.
Configuring cipher suite selection using RACADM
To configure cipher suite selection using RACADM, use any one of the following commands:
racadm set idrAC.webServer.customCipherString ALL:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES256-
GCM-SHA384
racadm set idrAC.webServer.customCipherString ALL:-DHE-RSA-CAMELLIA256-SHA
racadm set idrAC.webServer.customCipherString ALL:!DHE-RSA-AES256-GCM-SHA384:!DHE-RSA-AES256-
SHA256:+AES256-GCM-SHA384:-DHE-RSA-CAMELLIA256-SHA
For more information about these objects, see
iDRAC RACADM Command Line Interface Reference Guide
available at
dell.com/
idracmanuals
.
FIPS mode
FIPS is a computer security standard that United States government agencies and contractors must use. Starting from version iDRAC
2.40.40.40, iDRAC supports enabling FIPS mode.
iDRAC will be officially certified to support FIPS mode in the future.
Difference between FIPS-mode supported and FIPS-
validated
Software that has been validated by completing the Cryptographic Module Validation Program is referred to as FIPS-validated. Because of
the time it takes to complete FIPS-validation, not all versions of iDRAC are validated. For information about the latest status of FIPS-
validation for iDRAC, see the Cryptographic Module Validation Program page on the NIST website.
Enabling FIPS Mode
CAUTION:
Enabling FIPS mode resets iDRAC to factory-default settings. If you want to restore the settings, back up
the server configuration profile (SCP) before you enable FIPS mode, and restore the SCP after iDRAC restarts.
NOTE:
If you reinstall or upgrade iDRAC firmware, FIPS mode gets disabled.
Enabling FIPS mode using web interface
1.
On the iDRAC web interface, navigate to
Overview
>
iDRAC Settings
>
Network
.
2.
Click
Advanced Settings
next to
Options
.
3.
In
FIPS Mode
, select
Enabled
and click
Apply
.
4.
A message appears prompting you to confirm the change. Click
OK
.
iDRAC restarts in FIPS mode. Wait for at least 60 seconds before you reconnect to iDRAC.
80
Configuring iDRAC