HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 200

Configuring FIPS, Overview, Configuration restrictions and guidelines

Page 200 highlights

Configuring FIPS Overview Federal Information Processing Standards (FIPS), developed by the National Institute of Standard and Technology (NIST) of the United States, specify the requirements for cryptography modules. FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4" from low to high. Currently, the switch supports Level 2. Unless otherwise specified, FIPS in the document refers to FIPS 140-2. Configuration restrictions and guidelines When you configure FIPS, follow these restrictions and guidelines: • After the fips mode enable command is executed, the system prompts you to choose a reboot method. If you do not make a choice within 30 seconds, the system uses the manual reboot method by default. • Before you reboot the device to enter FIPS mode, the system automatically removes all key pairs configured in non-FIPS mode and all FIPS-incompliant digital certificates. FIPS-incompliant digital certificates refer to the MD5-based certificates with the modulus length of key pairs less than 2048 bits. You cannot log in to the device through SSH after the device enters FIPS mode. To log in to the device in FIPS mode through SSH, first log in to the device through a console port, and then create a key pair for the SSH server. • The password for entering the device in FIPS mode must comply with the password control policies, such as password length, complexity, and aging policy. When the aging timer for a password expires, the system prompts you to change the password. If you adjust the system time after the device enters FIPS mode, the login password might expire before the next login because the original system time is generally much earlier than the actual time. If you choose the automatic reboot method, set the system time before executing the fips mode enable command. If you choose the manual reboot method, set the system time before configuring the local username and password. • To use the manual reboot method to enter FIPS mode, you must delete the startup configuration file in binary format after you save the current configuration and specify it as the startup configuration file, and then reboot the device. Otherwise, the commands that are not supported by FIPS mode, if they are in the configuration file, are restored. • The system enters an intermediate state between when the fips mode enable command is executed and when the system is rebooted. If you choose the manual reboot method, do not execute any commands except for the reboot, save, and other commands for entering FIPS mode in the intermediate state. • To switch to non-FIPS mode, execute the undo fips mode enable command in system view, save the configuration, and reboot the device. • Configuration rollback is supported in FIPS mode and it is also supported between FIPS mode and non-FIPS mode. After a configuration rollback between FIPS mode and non-FIPS mode, delete the local user, configure a new local user (local user attributes including password, user role, and service type), save the current configuration file, specify it as the startup configuration file, and 191

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

191
Configuring FIPS
Overview
Federal Information Processing Standards (FIPS), developed by the National Institute of Standard and
Technology (NIST) of the United States, specify the requirements for cryptography modules. FIPS 140-2
defines four levels of security, simply named "Level 1" to "Level 4" from low to high. Currently, the switch
supports Level 2.
Unless otherwise specified,
FIPS
in the document refers to FIPS 140-2.
Configuration restrictions and guidelines
When you configure FIPS, follow these restrictions and guidelines:
After the
fips mode enable
command is executed, the system prompts you to choose a reboot
method. If you do not make a choice within 30 seconds, the system uses the manual reboot method
by default.
Before you reboot the device to enter FIPS mode, the system automatically removes all key pairs
configured in non-FIPS mode and all FIPS-incompliant digital certificates. FIPS-incompliant digital
certificates refer to the MD5-based certificates with the modulus length of key pairs less than 2048
bits. You cannot log in to the device through SSH after the device enters FIPS mode. To log in to the
device in FIPS mode through SSH, first log in to the device through a console port, and then create
a key pair for the SSH server.
The password for entering the device in FIPS mode must comply with the password control policies,
such as password length, complexity, and aging policy. When the aging timer for a password
expires, the system prompts you to change the password. If you adjust the system time after the
device enters FIPS mode, the login password might expire before the next login because the original
system time is generally much earlier than the actual time. If you choose the automatic reboot
method, set the system time before executing the
fips mode enable
command. If you choose the
manual reboot method, set the system time before configuring the local username and password.
To use the manual reboot method to enter FIPS mode, you must delete the startup configuration file
in binary format after you save the current configuration and specify it as the startup configuration
file, and then reboot the device. Otherwise, the commands that are not supported by FIPS mode, if
they are in the configuration file, are restored.
The system enters an intermediate state between when the
fips mode enable
command is executed
and when the system is rebooted. If you choose the manual reboot method, do not execute any
commands except for the
reboot
,
save
, and other commands for entering FIPS mode in the
intermediate state.
To switch to non-FIPS mode, execute the
undo fips mode enable
command in system view, save the
configuration, and reboot the device.
Configuration rollback is supported in FIPS mode and it is also supported between FIPS mode and
non-FIPS mode. After a configuration rollback between FIPS mode and non-FIPS mode, delete the
local user, configure a new local user (local user attributes including password, user role, and
service type), save the current configuration file, specify it as the startup configuration file, and