17
FIPS Cryptography
This chapter describes how to enable FIPS cryptography requirements on Dell Networking platforms. This
feature provides cryptographic algorithms conforming to various FIPS standards published by the
National Institute of Standards and Technology (NIST), a non-regulatory agency of the US Department of
Commerce. FIPS mode is also validated for numerous platforms to meet the FIPS-140-2 standard for a
software-based cryptographic module.
NOTE: The Dell Networking OS uses an embedded FIPS 140-2-validated cryptography module
(Certificate #1747) running on NetBSD 5.1 per FIPS 140-2 Implementation Guidance section G.5
guidelines.
NOTE: Only the following features use the embedded FIPS 140-2-validated cryptography module:
• SSH Client
• SSH Server
• RSA Host Key Generation
• SCP File Transfers
Currently, other features using cryptography do not use the embedded FIPS 140-2-validated
cryptography module.
Configuration Tasks
To enable FIPS cryptography, complete the following configuration tasks.
•
•
•
•
•
Preparing the System
Before you enable FIPS mode, Dell Networking recommends making the following changes to your
system.
1.
Disable the Telnet server (only use secure shell [SSH] to access the system).
2.
Disable the FTP server (only use secure copy [SCP] to transfer files to and from the system).
3.
Attach a secure, standalone host to the console port for the FIPS configuration to use.
FIPS Cryptography
377
Summary of Contents for S4820T
Page 1: ...Dell Configuration Guide for the S4820T System 9 8 0 0 ...
Page 282: ...Dell 282 Control Plane Policing CoPP ...
Page 622: ...Figure 81 Configuring Interfaces for MSDP 622 Multicast Source Discovery Protocol MSDP ...
Page 623: ...Figure 82 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 623 ...
Page 629: ...Figure 86 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 629 ...
Page 630: ...Figure 87 MSDP Default Peer Scenario 3 630 Multicast Source Discovery Protocol MSDP ...
Page 751: ...10 11 5 2 00 00 05 00 02 04 Member Ports Te 1 2 1 PIM Source Specific Mode PIM SSM 751 ...
Page 905: ...Figure 112 Single and Double Tag First byte TPID Match Service Provider Bridging 905 ...
Page 979: ...6 Member not present 7 Member not present Stacking 979 ...
Page 981: ...storm control Storm Control 981 ...
Page 1103: ...Figure 134 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 1103 ...