Enabling Fips Mode - HP SN3000B Administrator's Manual

Brocade fabric os administrator's guide - supporting fabric os v7.0.1 (53-1002446-01, march 2012)
Hide thumbs Also See for SN3000B:
Table of Contents

Advertisement

C
Preparing the switch for FIPS

Enabling FIPS mode

1. Log in to the switch using an account with securityadmin permissions.
2. Enter the sshutil delpubkeys and sshutil delprivkey commands to remove legacy OpenSSH DSA
3. Optional: Select the appropriate authentication method based on your needs:
4. Optional: Set the authentication protocols.
5. Install the LDAP CA certificate on the switch and Microsoft Active Directory server. Refer to
6. Enter the ipFilter
528
Disable in-flight encryption.
Disable IPsec for Ethernet and IPsec for FCIP.
Disable in-band management.
Disable root access.
Enable the KATs and the conditional tests.
Enable FIPS.
keys.
These keys, which were previously the default, do migrate to Fabric OS v7.0.0 but are no longer
supported in FIPS mode. You must remove them to remain FIPS compliant.
NOTE
Support for RSA keys is retained. You can implement RSA keys using the sshutil command.
If the switch is set for RADIUS, enter the aaaConfig
command to modify each server to use only PEAP-MS-CHAPv2 as the authentication
protocol.
The RADIUS server must also be configured to use only PEAP-MS-CHAPv2. Note that
among the Windows RADIUS servers supported, only Windows 2000- and Windows
2003-based RADIUS servers may be used in a FIPS-compliant configuration.
If the switch is set for LDAP, refer to the instructions in
page 524.
a. Enter the authUtil
--
the DHCHAP and FCAP authentication protocols.
b. Enter the authUtil
--
group to 1, 2, 3, or 4.
"LDAP certificates for FIPS mode"
show command and verify that no active IP filter policy permits access to
--
telnet, HTTP, or RPC ports, even if a higher priority policy explicitly denies such access. If an
active IP policy does permit any of these ports, you must modify or deactivate the policy. Create
separate policies for ipv4 and ipv6, and block access on Telnet, HTTP, and RPC ports.
a. Enter the ipFilter command to create IP Filter policies for IPv4 and IPv6. Refer to
an IP Filter policy"
on page 153.
b.
Add rules to each IP Filter policy, see
can use the following modifications to the rule to block access to telnet, HTTP, and RPC
ports:
set -h sha1 command to set the hash type for MD5, which is used in
set -g n command (where n represents the DH group) to set the DH
on page 526.
"Adding a rule to an IP Filter policy"
change or aaaConfig
--
--
"Setting up LDAP for FIPS mode"
on page 159. You
Fabric OS Administrator's Guide
remove
on
"Creating
53-1002446-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os v7.0.1

Table of Contents