SMA1000- Configuration Extensions used to be used when FIPS is enabled
08/11/2021 0 People found this article helpful 462,994 Views
Description
Once FIPS is enabled on the Physical appliances- 6200/6210, 7200/7210, the following configuration extension values are required for effective functioning.
Resolution
To put the device into FIPS mode - Navigate to System Configuration|General Settings|FIPS Security.
NOTE: Turning on FIPS mode will cause a reboot and delete all existing certificates on the appliance.
Enter the following CEM extensions in System Configuration|Maintenance|Advanced.
a. ACCEPTABLE_USE_BANNER [Enter the DoD banner]
See the DOD Banner section for a current version of the banner used for APL testing.
This extension enables the display of an Acceptable Use Policy or DoD Banner on an administrative logon (https://IP address:8443).
Configure an Acceptable Use Policy or DoD Banner for user logon in the appropriate Realm (User Access|Realms|[Select an existing realm]|Advanced|Acceptable Use Policy).
b. DISABLE_SHELL_ACCESS =true
This extension disables the Operating System shell normally available through the Console connection on the front of the SMA. The lack of access to the shell is mandatory for APL compliance.
c. EW_BLOCK_X_XSS_VIOLATIONS= true
This extension is necessary for mitigating web vulnerabilities.
d. EW_ENABLE_X_FRAME_OPTIONS 1
This extension is necessary for mitigating web vulnerabilities.
e. AMC_SESSION_TIMEOUT_SECS [number of seconds]
(e.g., AMC_SESSION_TIMEOUT_SECS=600 would result in a timeout of 10 minutes for administrators.
This setting determines how long to allow an AMC or shell session to be idle before forcing a logout.
Additional CEM Commands:
A site may be required by local security policies to limit incorrect logon attempts by a primary administrator.
Similarly, the site may insist that the administrator lockout lasts for a specific period. Finally, local security policies may dictate that SYSLOG traffic be encrypted when sent to an external SYSLOG server, perhaps on a different network or subnet. The following commands will allow the configuration of these things.
CAUTION:Do regular configuration backups (Maintenance|System Configuration|Import or Export) – especially before making configuration changes, usually by clicking on the “Pending changes” icon in the upper right-hand corner of the AMC screen!
1. Set # of failed logins before the admin account is locked out:
ADMINISTRATOR_ACCOUNT_LOCKOUT_ATTEMPTS=#
2. Set # of seconds an admin account is locked out:
ADMINISTRATOR_ACCOUNT_LOCKOUT_SECONDS=#
3. Force TLS for all remote syslog servers:
LOGGING_SECURE_SYSLOG=true|false
Related Articles
Categories