Any other combination is not supported in FIPS mode. Using other FIPS signature algorithms
in certificates affecting IPsec can cause tunnels to fail. Restrictions to cryptographic
algorithms are listed in the System Configuration guide.
Initial System Startup Process Flow
Figure 10
loader and BOF image and configuration files are successfully located.
Basic System Configuration Guide
→ SHA-256
→ SHA-384
→ SHA-512
displays the process start your system. Note that this example assumes that the boot
Boot Options
199