EasyManua.ls Logo

Alcatel-Lucent 7450 - Page 198

Alcatel-Lucent 7450
576 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
System Initialization
198 Basic System Configuration Guide
Cryptographic module conditional tests are executed when required during normal
operation of associated when using FIPS-140-2 approved algorithms.
When configuring user-defined encryption or authentication keys, CLI will prompt
for the key to be re-entered. If the re-entered key does not match the original, the CLI
command will be canceled. This affects several protocols and applications.
To support FIPS-140-2, an HMAC-SHA-1 integrity check is performed to verify the integrity
of the software images. The following file is included in the TIMOS-m.n.Yz software bundle
containing the hmac-sha-1 signature:
hmac-sha1.txt
During the loading of the cpm.tim or both.tim, a HMAC-SHA-1 check is performed to ensure
that the calculated HMAC-SHA-1 of the loaded image matches that stored in the hmac-
sha1.txt file.
The HMAC-SHA-1 check is performed on the data loaded from the .tim file. Note that when
configuring the primary-image, secondary-image and tertiary-image, the hmac-sha1.txt file
must exist in the same directory as the .tim files. If the load has been verified correctly from
the HMAC-SHA-1 integrity check, the load continues to bootup as normal. If the load is not
verified by the HMAC-SHA-1 integrity check, the image load will fail.
After the HMAC-SHA-1 integrity check passes, the nodes continues its normal bootup
sequence including reading the config.cfg file and loading the configuration. The config.cfg
file used to boot the node in FIPS-140-2 mode must not contain any configuration that is not
supported in FIPS-140-2 mode. If such configuration is present in the config.cfg file when
the node boots, the node will load the config.cfg file until the location of the offending
configuration and then halt the configuration at that point. Upon a failure to load the
config.cfg file, a failure message is printed on the console.
Enabling FIPS-140-2 restricts the ability to configure and use cryptographic algorithms and
functions that are not FIPS approved. FIPS-140-2 impacts the ability to configure SSH,
SNMP and certificates. Please refer to the System Management guide for details of FIPS-140-
2 related items.
In addition, signature algorithms of the following combinations only are approved for FIPS:
FIPS-140 Approved - Digital Signature Standard (DSS)
DSA
RSA
ECDSA
FIPS-140 Approved - Secured Hash Standard (SHS)
SHA-1
SHA-224

Table of Contents

Other manuals for Alcatel-Lucent 7450

Related product manuals