Page History
Add_workflow_for_techpubs | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Panel | ||||
---|---|---|---|---|
In this section:
|
Available_since | ||||
---|---|---|---|---|
|
Excerpt | ||||||
---|---|---|---|---|---|---|
|
|
|
|
Reconfiguration Step Before Enabling FIPS-140-3 ModeYou must disable all trap targets with authPriv/authNoPriv securityLevel. Example:
|
Enable FIPS-140-3 mode
The
|
is compliant with the FIPS 140-3 level 1 |
for its cryptographic modules. It implements FIPS 140-3 Level 1 validated cryptographic hardware modules and software tool kits and operates this module in FIPS 140-3 approved mode for all cryptographic operations. The following activities were made to achieve FIPS 140-3 certification:
|
|
To enable Fips-140-3 mode
|
|
FIPS Mode Security RestrictionsBeginning with SBC Core Release 10.1.6, the following restrictions are applied when you enable the FIPS-140-3 mode:
Reconfiguration Steps After Enabling FIPS-140-3 ModeAfter enabling FIPS-140-3, you must reconfigure the keys (authKey/privKey) for all SNMP users (this applies to all SNMP users for authPriv/authNoPriv security level trap targets).
|
Pagebreak |
---|
title | Note |
---|
Configuring SBC for TLS communication
Set up the following configurations on the SBC in a JITC/FIPS-enabled environment for the TLS communication.
To enable FIPS in the SBC:
- Log on to the SBC CLI as an admin user.
Run the following command:
Code Block conf set profiles security tlsProfile defaultTlsProfile v1_1 enabled co set profiles security tlsProfile defaultTlsProfile v1_0 disabled co set profiles security tlsProfile defaultTlsProfile v1_2 enabled co set profiles security tlsProfile defaultTlsProfile v1_1 disabled co set profiles security EmaTlsProfile defaultEmaTlsProfile v1_0 disabled v1_1 disabled v1_2 enabled co set oam snmp version v3only co set profiles security ikeProtectionProfile AesSha1IkeProfile algorithms dhGroup modp2048 co set system admin vsbcSystem fips-140-2 mode enabled co
To configure the RAMP supported ciphersuites on the SBC:
- Log on to the SBC CLI as an admin user.
Run the following command:
Code Block conf set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite AES256-SHA256 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite AES128-SHA256 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES256-SHA set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES256-GCM-SHA384 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES128-GCM-SHA256 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES256-SHA384 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES128-SHA256 set profiles security EmaTlsProfile defaultEmaTlsProfile ciphersuite ECDHE-RSA-AES128-SHA commit
Spacevars | ||
---|---|---|
|