HP Brocade BladeSystem 4/12 HP StorageWorks Fabric OS 6.x administrator guide - Page 131

Preparing the switch for FIPS, Overview of steps, Block Telnet, HTTP, and RPC using

Page 131 highlights

Table 41 FIPS mode restrictions Features FIPS mode Non-FIPS mode DH-CHAP/FCAP hashing algorithms Signed firmware Configupload/ download/ supportsave/ firmwaredownload IPsec Radius auth protocols SHA-1 MD5 and SHA-1 Mandatory firmware signature validation SCP only Optional firmware signature validation FTP and SCP Usage of AES-XCBC, MD5 and DH group 1 No restrictions are blocked PEAP-MSCHAPv2 CHAP, PAP, PEAP-MSCHAPv2 Preparing the switch for FIPS The following functionalities are blocked in FIPS mode. Therefore, it is important to prepare the switch by disabling these functionalities prior to enabling FIPS. • The root account is blocked in FIPS mode. Therefore, all root only functionalities will not be available. • HTTP, Telnet, RPC, SNMP protocols need to be disabled. Once these are blocked, you cannot use these protocols to read or write data from and to the switch • Configdownload and firmwaredownload using an FTP server will be blocked. See Table 41 on page 130 for a complete list of restrictions between FIPS and non-FIPS mode. IMPORTANT: Only roles with SecurityAdmin and Admin can enable FIPS mode. Overview of steps 1. Optional: Configure RADIUS server 2. Optional: Configure authentication protocols 3. Block Telnet, HTTP, and RPC 4. Disable BootProm access 5. Configure the switch for signed firmware 6. Disable root access 7. Enable FIPS To enable FIPS mode: 1. Log in to the switch using an account assigned the admin or securityAdmin role. 2. Optional: If the switch is set for RADIUS, modify each server to use only peap-mschapv2 as the authentication protocol using the aaaconfig --change or aaaconfig --remove command. 3. Optional: Set the authentication protocols a. Type the following command to set the hash type for MD5 which is used in authentication protocols DHCHAP and FCAP: authutil --set -h sha1 b. Set the DH group to 1 or 2 or 3 or 4 using authutil --set -g , where the DH group is represented by . 4. Block Telnet, HTTP, and RPC using the ipfilter policy command. You will need to create an IPFilter policy for each protocol. a. Create an IP Filter rule for each protocol, see "To create an IP Filter policy:" on page 116. Fabric OS 6.x administrator guide 131

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514

Fabric OS 6.x administrator guide
131
Preparing the switch for FIPS
The following functionalities are blocked in FIPS mode. Therefore, it is important to prepare the switch by
disabling these functionalities prior to enabling FIPS.
The root account is blocked in FIPS mode. Therefore, all root only functionalities will not be available.
HTTP, Telnet, RPC, SNMP protocols need to be disabled. Once these are blocked, you cannot use these
protocols to read or write data from and to the switch
Configdownload
and
firmwaredownload
using an FTP server will be blocked.
See
Table 41
on page 130 for a complete list of restrictions between FIPS and non-FIPS mode.
IMPORTANT:
Only roles with SecurityAdmin and Admin can enable FIPS mode.
Overview of steps
1.
Optional:
Configure RADIUS server
2.
Optional
: Configure authentication protocols
3.
Block Telnet, HTTP, and RPC
4.
Disable BootProm access
5.
Configure the switch for signed firmware
6.
Disable root access
7.
Enable FIPS
To enable FIPS mode:
1.
Log in to the switch using an account assigned the admin or securityAdmin role.
2.
Optional:
If the switch is set for RADIUS, modify each server to use only
peap-mschapv2
as the
authentication protocol using the
aaaconfig --change
or
aaaconfig --remove
command.
3.
Optional:
Set the authentication protocols
a.
Type the following command to set the hash type for MD5 which is used in authentication protocols
DHCHAP and FCAP:
authutil --set -h sha1
b.
Set the DH group to 1 or 2 or 3 or 4 using
authutil --set -g <n>
, where the DH group is
represented by <n>.
4.
Block Telnet, HTTP, and RPC using the
ipfilter
policy command.
You will need to create an IPFilter policy for each protocol.
a.
Create an IP Filter rule for each protocol, see ”
To create an IP Filter policy:
” on page116.
DH-CHAP/FCAP
hashing algorithms
SHA-1
MD5 and SHA-1
Signed firmware
Mandatory firmware signature validation
Optional firmware signature
validation
Configupload/
download/
supportsave/
firmwaredownload
SCP only
FTP and SCP
IPsec
Usage of AES-XCBC, MD5 and DH group 1
are blocked
No restrictions
Radius auth protocols
PEAP-MSCHAPv2
CHAP, PAP, PEAP-MSCHAPv2
Table 41
FIPS mode restrictions
Features
FIPS mode
Non-FIPS mode