DISA STIGS Viewer

AOS must use FIPS 140-2/140-3 approved algorithms for authentication to a cryptographic module.

Overview

Finding ID Version Rule ID IA Controls Severity
V-266940 ARBA-ND-000265 SV-266940r1039841_rule   High
Description
Unapproved mechanisms that are used for authentication to the cryptographic module are not validated and therefore cannot be relied on to provide confidentiality or integrity, and DOD data may be compromised. Network devices using encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules. FIPS 140-2/140-3 is the current standard for validating that mechanisms used to access cryptographic modules use authentication that meets DOD requirements. However, authentication algorithms must configure security processes to use only authentication algorithms that are FIPS-approved and recommended by the National Institute of Standards and Technology (NIST). Satisfies: SRG-APP-000179-NDM-000265, SRG-APP-000224-NDM-000270, SRG-APP-000411-NDM-000330, SRG-APP-000412-NDM-000331
STIG Date
HPE Aruba Networking AOS NDM Security Technical Implementation Guide 2024-10-29

Details

Check Text (C-70864r1039839_chk)
Verify the AOS configuration with the following command:
show fips

If "FIPS settings: Mode Enabled" is not returned, this is a finding.
Fix Text (F-70767r1039840_fix)
Configure AOS with the following commands:
configure terminal
fips enable
write memory
reload