Users Guide

Table Of Contents
crypto ps enable
Enables FIPS mode.
Syntax
crypto fips enable
Parameters None
Default Not congured
Command mode EXEC
Usage information You can use OS10 in FIPS 140-2 compliant mode. In this mode, applications restrict their use of cryptographic
algorithms to those supported by the NIST FIPS 140-2 standard and certication process. When you enable FIPS
mode:
The SSH service restarts. Existing SSH sessions are not aected. Only new SSH sessions operate in the
enabled FIPS mode.
SSH host keys are regenerated.
If SNMPv3 is congured with privacy settings, it operates in FIPS mode.
If you enable FIPS using the crypto fips enable command, RADIUS over TLS operates in FIPS mode. In
FIPS mode, RADIUS over TLS requires that a FIPS-compliant certicate and key pair are installed on the switch.
Example
OS10# crypto fips enable
Supported releases 10.4.3.0 or later
crypto security-prole
Creates an application-specic security prole.
Syntax
crypto security-profile profile-name
Parameters prole-name — Enter the name of the security prole; a maximum of 32 characters.
Default Not congured
Command mode CONFIGURATION
Usage information Create a security prole for a specic application on the switch, such as RADIUS over TLS. A security prole
associates a certicate and private key pair using the certificate command. The no form of the command
deletes the security prole.
Example
OS10# crypto security-profile secure-radius-profile
OS10(config-sec-profile)#
Supported releases 10.4.3.0 or later
peer-name-check
Enables peer name checking in a security prole for certicates presented by external devices.
Syntax
peer-name-check
Parameters None
994 Security