After you have enabled Common Criteria Administrative mode on the device, you can display the information with the fips show command.
Device#fips show
FIPS Validated Cryptographic Module
MP FIPS Version: EXTR-NI-MP-CRYPTO-VER-4.0
LP FIPS Version: EXTR-NI-LP-CRYPTO-VER-2.0
LP IPsec FPGA FIPS Version: EXTR-NI-LP-FPGA-CRYPTO-VER-1.0
FIPS mode : Administrative status ON: Operational status OFF
FIPS CC mode: Administrative status ON: Operational status OFF
System Specific:
OS monitor access status is: Disabled
Management Protocol Specific:
Telnet server : Disabled
Telnet client : Disabled
TFTP client : Disabled
HTTPS SSL 3.0 TLS 1.0 : Disabled
SNMP v1, v2c, v3 : Disabled
SNMP Access to security objects: Disabled
Password Display : Disabled
Any AAA server (including :
TACACS, None) : Disabled
Critical security Parameter updates across FIPS boundary:
(i.e. during "fips zeroize" ..., or "no fips enable") :
Protocol Shared secret and host passwords: Clear
SSH RSA Host keys : Clear
HTTPS RSA Host Keys and Signature : Clear

Note
The HTTPS RSA host keys and signature are for the MLXe chassis only; not available for the NetIron CER device.device# fips show
FIPS Validated Cryptographic Module
MP FIPS Version: EXTR-NI-MP-CRYPTO-VER-4.0
LP FIPS Version: EXTR-NI-LP-CRYPTO-VER-2.0
LP IPsec FPGA FIPS Version: EXTR-NI-LP-FPGA-CRYPTO-VER-1.0
FIPS mode : Administrative status ON: Operational status ON
FIPS CC mode: Administrative status ON: Operational status ON
System Specific:
OS monitor access status is: Disabled
Management Protocol Specific:
Telnet server : Disabled
Telnet client : Disabled
TFTP client : Disabled
HTTPS SSL 3.0 TLS 1.0 : Disabled
SNMP v1, v2c, v3 : Disabled
SNMP Access to security objects: Disabled
Password Display : Disabled
Any AAA server (including :
TACACS, None) : Disabled
Critical security Parameter updates across FIPS boundary:
(i.e. during "fips zeroize" ..., or "no fips enable") :
Protocol Shared secret and host passwords: Clear
SSH RSA Host keys : Clear
HTTPS RSA Host Keys and Signature : Clear
| Field | Description |
|---|---|
| OS monitor access status is |
The following policy allows full access to the OS monitor mode. This includes read, write access for debug purposes: fips policy allow monitor-full-access. |
| Telnet server | Telnet client and server are always disabled in FIPS CC Operational mode. |
| Telnet client | Telnet client and server are always disabled in FIPS CC Operational mode. |
| TFTP client | To allow TFTP access in FIPS mode, use fips policy allow tftp-access. |
| HTTPS SSL 3.0 TLS 1.0 | Always disabled in FIPS mode. |
| SNMP v1, v2c, v3 |
Always disabled in FIPS CC mode. |
| SNMP |
SNMP Access is disabled in FIPS CC mode. |
| Password Display | Disabled in FIPS CC mode. |
| Any AAA server |
To allow any AAA server (including RADIUS and TLS support for TACACS+ servers) to be used in FIPS CC mode, use fips policy allow common-criteria aaa-server-any. |
| Protocol shared secret and host passwords |
To retain the protocol shared secrets and host access passwords between FIPS mode and non-FIPS mode, use fips policy retain shared-secrets. |
| HTTPS DSA Host keys |
To retain the SSH RSA host keys between FIPS mode and non-FIPS mode, use fips policy retain rsa-host-keys (for MLX platform only). |

Note
Making changes to the default FIPS security policy weakens the security of the device and makes the device non-compliant with FIPS 140-2. The default security policy defined in the FIPS Security Policy document ensures that the device complies with all FIPS 140-2 specifications. Commands to alter the default security policy are available to the Crypto-officer; however, Extreme does not recommend making changes to the default security policy at any time.