Enabling FIPS mode

Perform the following steps to enable FIPS mode.

Procedure

  1. Attach a management station (PC or terminal) to the management module serial (console) port using a serial cable.
    When the device is not in a console session, FIPS-related commands return errors.
  2. Verify that the device is in non-FIPS mode by using the fips show command.
    device(config)# fips show

    The fips show command lists the current configuration of the device and can be run in both FIPS mode and non-FIPS mode to establish whether the device is truly in FIPS mode.

    The output of the fips show command confirms that the device is in FIPS mode and identifies the device as either administratively or operationally in FIPS mode.
    Note

    Note

    If the Extreme device is in JITC mode, then you cannot enable FIPS on the device.

    The following example shows the output of the fips show command before the fips enable command is entered, and administrative status is off and operational status is off:

    For MLX device:

    device# fips show
    FIPS Validated Cryptographic Module
    MP FIPS Version: EXTR-NI-IP-CRYPTO-VER-4.0
    LP FIPS Version: EXTR-NI-LP-CRYPTO-VER-2.0
    LP IPsec FPGA FIPS Version: EXTR-NI-LP-FPGA-CRYPTO-VER-1.0

    For Extreme NetIron CER device:

    device# fips show
    FIPS Validated Cryptographic Module
    MP FIPS Version: EXTR-NI-IP-CRYPTO-VER-4.0
    LP FIPS Version: EXTR-NI-LP-CRYPTO-VER-2.0

    If the device is already in administrative FIPS mode, you can modify the FIPS policy. Refer to Modifying the FIPS policy.

  3. Use the fips enable command to place the device administratively in FIPS mode.
    device(config)# fips enable
    WARNING: This will enable FIPS on this device. Please refer
    : to the NetIron Federal Information Processing Standards Guide for
    : more details. Also, be advised that Software/Firmware Integrity checks
    : will always be performed on this device on subsequent reloads, even
    : if FIPS or Common Criteria is disabled in the future.
    Are you sure? (enter 'y' or 'n'): y
    device(config)# fips enable

    Syntax: [no] fips enable

    The following example shows the output of the fips enable command on MLX Series devices.

    device(config)# fips enable
    WARNING: This will enable FIPS on this device. Please refer
           : to the NetIron Federal Information Processing Standards Guide for
           : more details. Also, be advised that Software/Firmware Integrity checks
           : will always be performed on this device on subsequent reloads, even
           : if FIPS or Common Criteria is disabled in the future.
    Are you sure? (enter 'y' or 'n'): y
    This device is now running in FIPS administrative mode.
    At this time you can alter this system's FIPS default security policy
    and then enter FIPS operational mode.
    
    Note: Making changes to the default FIPS security policy weakens
    the security of the device and makes the device non-compliant with
    FIPS 140-2 Level 2, design assurance Level 3
    The default security policy defined in the FIPS
    Security Policy Document ensures that the device complies with all
    FIPS 140-2 specifications. Commands to alter the default security policy
    are available to the crypto-officer; however, <ph varref="Company_Name">Extreme</ph> does not recommend
    making changes to the default security policy at any time.
    =====================================
    
    To enter FIPS mode, complete the following steps:
    1. Optionally, configure FIPS policy commands that meets your network
       requirements. You must explicitly configure the following services if you
       want to use them when the device is operational in FIPS mode:
          - Allow TFTP access.
              Current status: Enabled
          - Allow SNMP Access to the Critical Security Parameter (CSP) MIB objects.
              Current status: Disabled
          - Allow access to all commands within the monitor mode.
              Current status: Disabled
          - Allow cleartext password display in some commands.
              Current status: Disabled
          - Retention of shared secret keys for all protocols and the host passwords.
              Current status: Retain
          - Retention of SSH RSA host keys.
              Current status: Clear
          - Retention of HTTPS RSA host keys and certificate.
              Current status: Clear
    
    2. Enter the "fips zeroize all" command, which zeroes out the shared secrets
        used by various networking protocols, including the host access passwords,
        SSH and HTTPS host-keys with the digital signature based on the configured
        FIPS Security Policy.
    3. Save the running configuration.
    4. Reload the device.
    5. Enter the "fips show" command to verify that the device entered
      FIPS or CC operational mode.
    =====================================
    
    In FIPS mode, the system will disable the following services or commands after
    reload:
    FIPS. Telnet server will be disabled.
          The "telnet server" command will be removed.
    FIPS. SSL Client will be enabled.
    FIPS. TLS version 1.0 will be disabled.(Applicable for MLX & CER devices)                      
    FIPS. SCP will be enabled.
          The "ip ssh scp disable" command will be removed.
    FIPS. FIPS Configuration "boot system {slot1|slot2} <file>" will be removed
          as FIPS mode does not allow system to boot from Storage Card.
    FIPS. Configuration "lp boot system {slot1|slot2} <file> <slot>" will be
          removed as FIPS mode does not allow system to boot from Storage Card.
    FIPS. Configuration "boot system tftp <ip> <file>" will be removed as FIPS
          mode does not allow system to boot from TFTP.
    FIPS. Configuration "enable password-display" will be removed.
    FIPS. HTTP server will be disabled. The "web-management http" command will
          be removed.
    FIPS. HTTPS server will change as follows:
          -SSL 3.0 and TLS 1.0 will be disabled.
          -TLS version 1.1 and greater will be used.(Applicable only for MLX devices)
          -RC4 cipher will be disabled.
          -Passwords will be required; the "web-management allow-no-password"
            command will be removed.
    FIPS. SNMP server will change as follows:
          -SNMP support for v1 and v2 versions will be disabled.
          -For SNMPv3 version authentication and privacy is mandatory,
           and MD5 authentication key and DES privacy password will be disabled.
    FIPS. NTP md5 authentication will be disabled.
    FIPS. HTTP Client will be disabled.
    FIPS. Passwords/Keys which don't comply with FIPS standards will be removed
          on reload.
    FIPS. Please see FIPS config guide for complete details.
    
    FIPS. Configuration "enable aaa console" will be disabled temporarily to
          allow console access to configure SSH parameters. It can be
          re-enabled after SSH is confirmed operational
          Current status of "enable aaa console" is: Disabled
    
    =====================================
    Additionally, in FIPS  only operational mode, the system will have the
    following restrictions
    FIPS. Configuration for CLI logging "logging cli-command" will be removed.
    

    The following example shows the output of the fips enable command on the Extreme NetIron CER devices.

    device(config)# fips enable
    WARNING: This will enable FIPS on this device. Please refer
           : to the NetIron Federal Information Processing Standards Guide for
           : more details. Also, be advised that Software/Firmware Integrity checks
           : will always be performed on this device on subsequent reloads, even
           : if FIPS or Common Criteria is disabled in the future.
    Are you sure? (enter 'y' or 'n'): y
    This device is now running in FIPS administrative mode.
    At this time you can alter this system's FIPS default security policy
    and then enter FIPS operational mode.
    
    Note: Making changes to the default FIPS security policy weakens
    the security of the device and makes the device non-compliant with
    FIPS 140-2 Level 2, design assurance Level 3
    The default security policy defined in the FIPS
    Security Policy Document ensures that the device complies with all
    FIPS 140-2 specifications. Commands to alter the default security policy
    are available to the crypto-officer; however, <ph varref="Company_Name">Extreme</ph> does not recommend
    making changes to the default security policy at any time.
    =====================================
    
    To enter FIPS mode, complete the following steps:
    1. Optionally, configure FIPS policy commands that meets your network
       requirements. You must explicitly configure the following services if you
       want to use them when the device is operational in FIPS mode:
          - Allow TFTP access.
              Current status: Enabled
          - Allow SNMP Access to the Critical Security Parameter (CSP) MIB objects.
              Current status: Enabled
          - Allow access to all commands within the monitor mode.
              Current status: Enabled
          - Allow cleartext password display in some commands.
              Current status: Disabled
          - Retention of shared secret keys for all protocols and the host passwords.
              Current status: Retain
          - Retention of SSH RSA host keys.
              Current status: Retain
    
    2. Enter the "fips zeroize all" command, which zeroes out the shared secrets
        used by various networking protocols, including the host access passwords,
        SSH and HTTPS host-keys with the digital signature based on the configured
        FIPS Security Policy.
    3. Save the running configuration.
    4. Reload the device.
    5. Enter the "fips show" command to verify that the device entered
      FIPS or CC operational mode.
    =====================================
    
    In FIPS mode, the system will disable the following services or commands after
    reload:
    FIPS. Telnet server will be disabled.
          The "telnet server" command will be removed.
    FIPS. SSL Client will be enabled.
    FIPS. SCP will be enabled.
          The "ip ssh scp disable" command will be removed.
    
    FIPS. SNMP server will change as follows:
          -SNMP support for v1 and v2 versions will be disabled.
          -For SNMPv3 version authentication and privacy is mandatory,
           and MD5 authentication key and DES privacy password will be disabled.
    FIPS. NTP md5 authentication will be disabled.
    FIPS. HTTP Client will be disabled.
    FIPS. Passwords/Keys which don‘t comply FIPS standards will be removed
          on reload.
    FIPS. Please see FIPS config guide for complete details.
    
    FIPS. Configuration "enable aaa console" will be disabled temporarily to
          allow console access to configure SSH parameters. It can be
          re-enabled after SSH is confirmed operational
          Current status of "enable aaa console" is: Disabled
    
    =====================================
    Additionally, in FIPS  only operational mode, the system will have the
    following restrictions
    FIPS. Configuration for CLI logging "logging cli-command" will be removed.
    device#
  4. Verify the status of the device as administratively in FIPS mode by using the fips show command.
    The following example shows the output of the fips show command on a MLX Series device after the fips enable command is entered and administrative status is on and operational status is off.
    device# fips show
    FIPS Validated Cryptographic Module
    MP FIPS Version: EXTR-NI-IP-CRYPTO-VER-4.0
    LP FIPS Version: EXTR-NI-LP-CRYPTO-VER-2.0
    FIPS mode   : Administrative status ON: Operational status ON
    FIPS CC mode: Administrative status OFF: Operational status OFF
    
    System Specific:
    OS monitor access status is: Disabled
    
    Management Protocol Specific:
    Telnet server                  : Disabled
    Telnet client                  : Disabled
    TFTP client                    : Enabled
    HTTPS SSL 3.0                  : Disabled
    SNMP v1, v2, v2c               : Disabled
    SNMP Access to security objects: Disabled
    Password Display               : Disabled
    Critical security Parameter updates across FIPS boundary:
    (i.e. during "fips zeroize" ..., or "no fips enable")   :
    Protocol Shared secret and host passwords: Retain
    SSH RSA Host keys                        : Clear
    HTTPS RSA Host Keys and Signature        : Clear
    

    The following example shows the output of the fips show command on an Extreme NetIron CER device after the fips enable command is entered and administrative status is on and operational status is off:

    device# fips show
    FIPS Validated Cryptographic Module
    MP FIPS Version: EXTR-NI-IP-CRYPTO-VER-4.0
    FIPS mode   : Administrative status ON: Operational status ON
    FIPS CC mode: Administrative status OFF: Operational status OFF
    
    System Specific:
    OS monitor access status is: Disabled
    
    Management Protocol Specific:
    Telnet server                  : Disabled
    Telnet client                  : Disabled
    TFTP client                    : Enabled
    SNMP v1, v2, v2c               : Disabled
    SNMP Access to security objects: Disabled
    Password Display               : Disabled
    Critical security Parameter updates across FIPS boundary:
    (i.e. during "fips zeroize" ..., or "no fips enable")   :
    Protocol Shared secret and host passwords: Clear
    SSH RSA Host keys                        : Clear