Installation
To ensure that the NFVIS software has not been tampered with , the software image is verified before installation using the following mechanisms:
Image Tamper Protection
NFVIS supports RPM signing and signature verification for all RPM packages in the ISO and upgrade images.
RPM Signing
All RPM packages in the Cisco Enterprise NFVIS ISO and upgrade images are signed to ensure cryptographic integrity and authenticity. This guarantees that the RPM packages have not been tampered with and the RPM packages are from NFVIS. The private key used for signing the RPM packages is created and securely maintained by Cisco.
RPM Signature Verification
NFVIS software verifies the signature of all the RPM packages before an installation or upgrade. The following table describes the Cisco Enterprise NFVIS behavior when the signature verification fails during an installation or upgrade.
Scenario |
Description |
---|---|
Cisco Enterprise NFVIS 3.7.1 and later installations |
If the signature verification fails while installing Cisco Enterprise NFVIS, the installation is aborted. |
Cisco Enterprise NFVIS upgrade from 3.6.x to Release 3.7.1 |
The RPM signatures are verified when the upgrade is being performed. If the signature verification fails, an error is logged but the upgrade is completed. |
Cisco Enterprise NFVIS upgrade from Release 3.7.1 to later releases |
The RPM signatures are verified when the upgrade image is registered. If the signature verification fails, the upgrade is aborted. |
Image Integrity Verification
RPM signing and signature verification can be done only for the RPM packages available in the Cisco NFVIS ISO and upgrade images. To ensure the integrity of all the additional non-RPM files available in the Cisco NFVIS ISO image, a hash of the Cisco NFVIS ISO image is published along with the image. Similarly, a hash of the Cisco NFVIS upgrade image is published along with the image. To verify that the hash of Cisco NFVIS ISO image or upgrade image matches the hash published by Cisco, run the following command and compare the hash with the published hash:
% /usr/bin/sha512sum <ImageFile>
c2122783efc18b039246ae1bcd4eec4e5e027526967b5b809da5632d462dfa6724a9b20ec318c74548c6bd7e9b8217ce96b5ece93dcdd74fda5e01bb382ad607 <ImageFile>
ENCS Secure Boot
Secure boot is part of the Unified Extensible Firmware Interface (UEFI) standard which ensures that a device boots only using a software that is trusted by the Original Equipment Manufacturer (OEM). When NFVIS starts, the firmware checks the signature of the boot software and the operating system. If the signatures are valid, the device boots, and the firmware gives the control to the operating system.
Secure boot is available on the ENCS but is disabled by default. Cisco recommends you to enable secure boot. For more information, see Secure Boot of Host.