Configuration Guidelines
Follow these guidelines before enabling FIPS mode:
-
Make your passwords a minimum of eight characters in length.
-
Keep Telnet disabled. Users should log in using SSH only.
-
Disable remote authentication through RADIUS/TACACS+. Only users local to the switch can be authenticated.
-
Disable SNMP v1 and v2. Any existing user accounts on the switch that have been configured for SNMPv3 should be configured only with SHA for authentication and AES/3DES for privacy.
-
Disable VRRP.
Note
This step is applicable to Cisco NX-OS software release 8.3(1) or older versions.
-
Do not configure FIPS and IPsec together on a switch. With FIPS enabled, if you configure IKE, then FCIP links will not come up.
-
Delete all SSH Server RSA1 keypairs.
-
If FIPS is enabled and you upgrade from Cisco MDS NX-OS Release 8.1(x) to Cisco MDS NX-OS Release 8.2(1) or later release, then you cannot disable FIPS in the upgraded 8.2(x) release.
-
Fibre Channel Security Protocol (FCSP) and Network Time Protocol (NTP) are not FIPS compliant in Cisco MDS devices. This is because both protocols are not cryptographically secure and don't meet FIPS 140-2 standards. Using non-FIPS compliant components like FCSP and NTP with MD5 in Cisco MDS devices can potentially lead to vulnerabilities.
-
For Cisco MDS NX-OS 8.5(1) and later releases, SSH clients may no longer use ssh-rsa key exchange when the switch is in FIPS mode as ssh-rsa uses an insecure SHA1 signature. SSH clients must use
rsa-sha2-256
for RSA key exchange instead. Older NX-OS SSH server versions were not strict in enforcing this restriction.