Enable cluster-wide FIPS-compliant mode for KMIP server connections in ONTAP
You can use the security config modify
command with the -is-fips-enabled
option to enable cluster-wide FIPS-compliant mode for data in flight. Doing so forces the cluster to use OpenSSL in FIPS mode when connecting to KMIP servers.
When you enable cluster-wide FIPS-compliant mode, the cluster will automatically use only TLS1.2 and FIPS-validated cipher suites. Cluster-wide FIPS-compliant mode is disabled by default.
You must reboot cluster nodes manually after modifying the cluster-wide security configuration.
-
The storage controller must be configured in FIPS-compliant mode.
-
All KMIP servers must support TLSv1.2. The system requires TLSv1.2 to complete the connection to the KMIP server when cluster-wide FIPS-compliant mode is enabled.
-
Set the privilege level to advanced:
set -privilege advanced
-
Verify that TLSv1.2 is supported:
security config show -supported-protocols
Learn more about
security config show
in the ONTAP command reference.cluster1::> security config show Cluster Cluster Security Interface FIPS Mode Supported Protocols Supported Ciphers Config Ready --------- ---------- ----------------------- ----------------- ---------------- SSL false TLSv1.2, TLSv1.1, TLSv1 ALL:!LOW: yes !aNULL:!EXP: !eNULL
-
Enable cluster-wide FIPS-compliant mode:
security config modify -is-fips-enabled true -interface SSL
Learn more about
security config modify
in the ONTAP command reference. -
Reboot cluster nodes manually.
-
Verify that cluster-wide FIPS-compliant mode is enabled:
security config show
cluster1::> security config show Cluster Cluster Security Interface FIPS Mode Supported Protocols Supported Ciphers Config Ready --------- ---------- ----------------------- ----------------- ---------------- SSL true TLSv1.2, TLSv1.1 ALL:!LOW: yes !aNULL:!EXP: !eNULL:!RC4