Prerequisites for Configuring FIPS
Install and activate the hfr-k9sec-px.pie file.
You must be in a user group associated with a task group that includes the proper task IDs. The command reference guides include the task IDs required for each command.
If you suspect user group assignment is preventing you from using a command, contact your AAA administrator for assistance.
Guidelines for Enabling FIPS Mode
From Cisco IOS XR Software Release 6.7.2 and later, you must follow these guidelines while enabling FIPS mode:
-
You must configure the session with a FIPS-approved cryptographic algorithm. A session configured with non-approved cryptographic algorithm for FIPS (such as, MD5 and HMAC-MD5 ) does not work. This is applicable for OSPF, BGP, RSVP, ISIS, or any application using key chain with non-approved cryptographic algorithm, and only for FIPS mode (that is, when crypto fips-mode is configured).
-
If you are using any HMAC-SHA algorithm for a session, then you must ensure that the configured key-string has a minimum length of 14 characters. Otherwise, the session goes down. This is applicable only for FIPS mode.
-
If you try to execute the telnet configuration on a system where the FIPS mode is already enabled, then the system rejects the telnet configuration.
-
If telnet configuration already exists on the system, and if FIPS mode is enabled later, then the system rejects the telnet connection. But, it does not affect the telnet configuration as such.
-
It is recommended to configure the crypto fips-mode command first, followed by the commands related to FIPS in a separate commit. The list of commands related to FIPS with non-approved cryptographic algorithms are:
-
key chain key-chain-name key key-id cryptographic-algorithm MD5
-
key chain key-chain-name key key-id cryptographic-algorithm HMAC-MD5
-
router ospfv3 1 authentication ipsec spi 256 md5 md5-value
-
router ospfv3 1 encryption ipsec spi 256 esp des des-value
-
router ospfv3 1 encryption ipsec spi 256 esp des des-value authentication md5 md5-value
-
snmp-server user username usergroup-name v3 auth md5 priv des56
-
ssh server algorithms key-exchange diffie-hellman-group1-sha1
-
telnet vrf default ipv4 server max-servers server-limit
-
Installing and Activating the PIE
The Package Installation Envelope (PIE) files, are installable software files with the .pie extension. PIE files are used to copy one or more software components onto the router. A PIE may contain a single component, a group of components (called a package), or a set of packages (called a composite package).
Use the show install committed command in EXEC mode to verify the committed software packages.
You must install and activate the hfr-k9sec-px.pie file to configure FIPS. To install and activate the PIE, download the hfr-k9sec-px.pie to a TFTP server.
For more information about installing PIEs, refer to Upgrading and Managing Cisco IOS XR Software section of the System Management Configuration Guide for Cisco CRS Routers .
SUMMARY STEPS
- admin
- install add tftp://<IP address of tftp server>/<location of pie on server>
- install activate device:package
- install commit
- exit
- show install committed
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
admin Example:
|
Enters administration EXEC mode. |
Step 2 |
install add tftp://<IP address of tftp server>/<location of pie on server> Example:
|
Copies the contents of a package installation envelope (PIE) file to a storage device. |
Step 3 |
install activate device:package Example:
|
Activates the respective package and adds more functionality to the existing software. |
Step 4 |
install commit Example:
|
Saves the active software set to be persistent across designated system controller (DSC) reloads. |
Step 5 |
exit Example:
|
Exits from the admin mode. |
Step 6 |
show install committed Example:
|
Shows the list of the committed software packages. |