HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 202

Configuration changes in FIPS mode, SSH, SNMPv3, and IPsec do not support DES, 3DES, RC4, and MD5.

Page 202 highlights

5. Delete the FIPS-incompatible local user service types Telnet and FTP. 6. Enable FIPS mode. 7. Select the manual reboot method. 8. Save the configuration file and specify it as the startup configuration file. 9. Delete the startup configuration file in binary format (an .mdb file). 10. Reboot the device. The system enters in FIPS mode. You can use the configured username and password to log in to the device in FIPS mode. To enable FIPS mode, complete the following tasks: • If you choose the manual reboot method, accomplish the required configurations, including configuring password control and a local user. For more information, see "Manual reboot." • If you choose the automatic reboot method and saving the current configuration is required, execute the save command before you enable FIPS mode. To enable FIPS mode: Step 1. Enter system view. 2. Enable FIPS mode. Command system-view fips mode enable Remarks N/A By default, the FIPS mode is disabled. Configuration changes in FIPS mode When the system enters in FIPS mode, the following changes occur: • The user login authentication mode can only be scheme. • The FTP/TFTP server and client are disabled. • The Telnet server and client are disabled. • SNMPv1 and SNMPv2c are disabled. Only SNMPv3 is available. • The SSH server does not support SSHv1 clients. • The generated RSA and DSA key pairs must have a modulus length of 2048 bits. • SSH, SNMPv3, and IPsec do not support DES, 3DES, RC4, and MD5. • The keys must contain at least 15 characters and 4 compositions of uppercase and lowercase letters, digits, and special characters. This requirement applies to the following passwords (the last two passwords are for password control): { AAA server's shared key { IKE per-shared key { SNMPv3 authentication key { Password for a device management local user { Password for switching user roles 193

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

193
5.
Delete the FIPS-incompatible local user service types Telnet and FTP.
6.
Enable FIPS mode.
7.
Select the manual reboot method.
8.
Save the configuration file and specify it as the startup configuration file.
9.
Delete the startup configuration file in binary format (an
.mdb
file).
10.
Reboot the device.
The system enters in FIPS mode. You can use the configured username and password to log in to
the device in FIPS mode.
To enable FIPS mode, complete the following tasks:
If you choose the manual reboot method, accomplish the required configurations, including
configuring password control and a local user. For more information, see "
Manual reboot
."
If you choose the automatic reboot method and saving the current configuration is required, execute
the
save
command before you enable FIPS mode.
To enable FIPS mode:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable FIPS mode.
fips mode enable
By default, the FIPS mode is
disabled.
Configuration changes in FIPS mode
When the system enters in FIPS mode, the following changes occur:
The user login authentication mode can only be
scheme
.
The FTP/TFTP server and client are disabled.
The Telnet server and client are disabled.
SNMPv1 and SNMPv2c are disabled. Only SNMPv3 is available.
The SSH server does not support SSHv1 clients.
The generated RSA and DSA key pairs must have a modulus length of 2048 bits.
SSH, SNMPv3, and IPsec do not support DES, 3DES, RC4, and MD5.
The keys must contain at least 15 characters and 4 compositions of uppercase and lowercase letters,
digits, and special characters. This requirement applies to the following passwords (the last two
passwords are for password control):
{
AAA server's shared key
{
IKE per-shared key
{
SNMPv3 authentication key
{
Password for a device management local user
{
Password for switching user roles