Configure network security using federal information processing standards (FIPS)
Contributors
Download PDF of this page
ONTAP is compliant in the Federal Information Processing Standards (FIPS) 140-2 for all SSL connections. You can turn on and off SSL FIPS mode, set SSL protocols globally, and turn off any weak ciphers such as RC4 within ONTAP.
By default, SSL on ONTAP is set with FIPS compliance disabled and SSL protocol enabled with the following:
-
TLSv1.2
-
TLSv1.1
-
TLSv1
When SSL FIPS mode is enabled, SSL communication from ONTAP to external client or server components outside of ONTAP will use FIPS compliant crypto for SSL.
Enable FIPS
It is recommended that all secure users adjust their security configuration immediately after system installation or upgrade. When SSL FIPS mode is enabled, SSL communication from ONTAP to external client or server components outside of ONTAP will use FIPS compliant crypto for SSL.
About this task
The following settings are recommended to enable FIPS:
-
FIPS: on
-
SSL protocol = {TLSv1.2}
-
SSL ciphers = {ALL:!LOW:!aNULL:!EXP:!eNULL:!RC4}
Steps
-
Change to advanced privilege level:
set -privilege advanced
-
Enable FIPS:
security config modify -interface SSL -is-fips-enabled true
-
When prompted to continue, enter
y
-
One by one, manually reboot each node in the cluster.
Example
security config modify -interface SSL -is-fips-enabled true Warning: This command will enable FIPS compliance and can potentially cause some non-compliant components to fail. MetroCluster and Vserver DR require FIPS to be enabled on both sites in order to be compatible. Do you want to continue? {y|n}: y Warning: When this command completes, reboot all nodes in the cluster. This is necessary to prevent components from failing due to an inconsistent security configuration state in the cluster. To avoid a service outage, reboot one node at a time and wait for it to completely initialize before rebooting the next node. Run "security config status show" command to monitor the reboot status. Do you want to continue? {y|n}: y
Disable FIPS
If you are still running an older system configuration and want to configure ONTAP with backward compatibility, you can turn on SSLv3 only when FIPS is disabled.
About this task
The following settings are recommended to disable FIPS:
-
FIPS = false
-
SSL protocol = {SSLv3}
-
SSL ciphers = {ALL:!LOW:!aNULL:!EXP:!eNULL}
Steps
-
Change to advanced privilege level:
set -privilege advanced
-
Disable FIPS by typing:
security config modify -interface SSL -supported-protocols SSLv3
-
When prompted to continue, enter
y
. -
Manually reboot each node in the cluster.
Example
security config modify -interface SSL -supported-protocols SSLv3 Warning: Enabling the SSLv3 protocol may reduce the security of the interface, and is not recommended. Do you want to continue? {y|n}: y Warning: When this command completes, reboot all nodes in the cluster. This is necessary to prevent components from failing due to an inconsistent security configuration state in the cluster. To avoid a service outage, reboot one node at a time and wait for it to completely initialize before rebooting the next node. Run "security config status show" command to monitor the reboot status. Do you want to continue? {y|n}: y
View FIPS compliance status
You can see whether the entire cluster is running the current security configuration settings.
Steps
-
One by one, reboot each node in the cluster.
Do not reboot all cluster nodes simultaneously. A reboot is required to make sure that all applications in the cluster are running the new security configuration, and for all changes to FIPS on/off mode, Protocols, and Ciphers.
-
View the current compliance status:
security config show
Example
security config show Cluster Cluster Security Interface FIPS Mode Supported Protocols Supported Ciphers Config Ready --------- ---------- ----------------------- ----------------- ---------------- SSL false TLSv1_2, TLSv1_1, TLSv1 ALL:!LOW:!aNULL: yes !EXP:!eNULL