User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
113
As required by FIPS 140-2, if a FIPS test fails, the failure
persists—through reboots and software upgrades—until the
Mesh Point again passes the full battery of FIPS tests. In FIPS
operating mode, If the Mesh Point fails a FIPS test, it
automatically reboots. If the failure persists through the boot
cycle, the Mesh Point continues to reboot until the test passes
or the Mesh Point is taken out of service.
In addition to the FIPS tests triggered regularly on the Mesh
Point, you can configure additional, periodic FIPS testing, with
set fips:
FIPS# set fips periodic|noperiodic
Periodic FIPS testing is disabled by default (
noperiodic
).
When periodic tests are enabled, they run at the FIPS-test run-
interval specified using
set fips with the -r switch. The
default is
86,400 seconds, or 24 hours.
You can also configure the interval at which the random
number generator is reseeded using
set fips with the -s
switch. The default is
86,400 seconds, or 24 hours.
FIPS# set fips -r
<RunIntervalSeconds>
-s
<SeedIntervalSeconds>
With set fips you can also configure whether the Mesh
Point’s random number generator test will be run routinely (it is
enabled by default):
# set fips rngtest
RngContinuousTests? [N|Y]
This command can be run only interactively. The Mesh Point
CLI displays
RngContinuousTests?
and you can enter your
selection—or leave the field blank and the setting unchanged—
and strike
Enter.
The Mesh Point CLI returns
[OK] when settings are
successfully changed. You cannot turn off FIPS random
number generator tests when the Mesh Point is in FIPS
operating mode.
You must be logged on to an
administrator
-level account to
change configuration settings (refer to Section 2.2).
4.1.3 MSP Encryption Algorithm
The encryption algorithm determines how the Mesh Point
encodes data. All Secure Clients logging on through the
Fortress Mesh Point, and other Mesh Points with security
associations to this one, must use the same encryption
algorithm.
View the encryption algorithm (among other security settings)
in effect on the Mesh Point with
show crypto (shown in Section
4.1).