HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Configuration Guide - Page 29

FIPS compliance, Logging in through the console/AUX port locally

Page 29 highlights

FIPS compliance The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. In FIPS mode, the device does not support Telnet login. Logging in through the console/AUX port locally To configure console/AUX login, complete the following tasks: Task Remarks (Required.) Configuring login authentication: • Disabling authentication for console/AUX login (not supported in FIPS mode) • Configuring password authentication for console/AUX login (not supported in FIPS mode) • Configuring scheme authentication for console/AUX login Configure one authentication mode as required. In FIPS mode, the device supports only the scheme mode. (Optional.) Configuring common console/AUX user interface settings N/A The console/AUX login configuration is effective only for users who log in after the configuration is completed. Disabling authentication for console/AUX login (not supported in FIPS mode) Step Command 1. Enter system view. system-view 2. Enter console/AUX user-interface { aux | console } user interface view. first-number [ last-number ] 3. Disable authentication. authentication-mode none 4. Assign a user role. user-role role-name Remarks N/A N/A The defaults are as follows: • Console user interface-Authentication is disabled. • AUX user interface-Authentication is disabled if the device started up with the default configuration file, and password authentication is enabled if the device started up with empty configuration. For more information about empty configuration and the default configuration file, see "Managing configuration files." By default, a console/AUX login user is assigned the user role network-admin. 22

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155

22
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about
FIPS mode, see
Security Configuration Guide
.
In FIPS mode, the device does not support Telnet login.
Logging in through the console/AUX port locally
To configure console/AUX login, complete the following tasks:
Task
Remarks
(Required.) Configuring login authentication:
Disabling authentication for console/AUX login (not supported in FIPS mode)
Configuring password authentication for console/AUX login (not supported in
FIPS mode)
Configuring scheme authentication for console/AUX login
Configure one
authentication mode as
required.
In FIPS mode, the device
supports only the scheme
mode.
(Optional.)
Configuring common console/AUX user interface settings
N/A
The console/AUX login configuration is effective only for users who log in after the configuration is
completed.
Disabling authentication for console/AUX login (not supported
in FIPS mode)
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter console/AUX
user interface view.
user-interface
{
aux
|
console
}
first
-
number
[
last-number
]
N/A
3.
Disable
authentication.
authentication-mode none
The defaults are as follows:
Console user interface
—Authentication
is disabled.
AUX user interface
—Authentication is
disabled if the device started up with
the default configuration file, and
password authentication is enabled if
the device started up with empty
configuration.
For more information about empty
configuration and the default configuration
file, see "
Managing configuration files
."
4.
Assign a user role.
user-role
role-name
By default, a console/AUX login user is
assigned the user role network-admin.