Users Guide

Table Of Contents
access control
If any of the properties depend on cryptographic algorithms, then FIPS must approve these algorithms.
By default, the FIPS mode is disabled. When FIPS is enabled, the minimum key size for OpenSSL FIPS is SSH-2 RSA 2048 bits.
NOTE: PSU firmware update is not supported when the FIPS mode is enabled in the chassis.
For more information, see CMC Online Help.
The following features/applications support FIPS.
Web GUI
RACADM
WSMan
SSH v2
SMTP
Kerberos
NTP Client
NFS
NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5 (MD5)
authentication work.
Enabling FIPS Mode Using CMC Web Interface
To enable FIPS:
1. In the left pane, click Chassis Overview.
The Chassis Health page is displayed.
2. On the menu bar, click Network.
The Network Configuration page is displayed.
3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select
Enabled.
A message is displayed that enabling FIPS resets CMC to the default settings.
4. Click OK to proceed.
Enabling FIPS Mode Using RACADM
To enable FIPS mode, run the following command:
racadm config g cfgRacTuning o cfgRacTuneFipsModeEnable 1
.
Disabling FIPS Mode
To disable FIPS mode, reset CMC to the default factory settings.
Configuring services
You can configure and enable the following services on CMC:
CMC serial console Enable access to CMC using the serial console.
Web Server Enable access to CMC web interface. Disabling the web server also disables Remote RACADM.
SSH Enable access to CMC through firmware RACADM.
Telnet Enable access to CMC through firmware RACADM
Remote RACADM Enable access to CMC using RACADM.
SNMP Enable CMC to send SNMP traps for events.
Remote Syslog Enable CMC to log events to a remote server. To use this feature, you must have an Enterprise license.
62
Configuring CMC