<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22872#M16686</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This option is available by enabling FIPS mode (FIPS 140-2) on the FW, though the following options will also apply:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12pt; "&gt;Federal Information Processing Standards Support:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• To log into the firewall, the browser must be TLS 1.0 compatible.&lt;/P&gt;&lt;P&gt;• All passwords on the firewall must be at least six characters.&lt;/P&gt;&lt;P&gt;• Accounts are locked after the number of failed attempts that is configured on theDevice &amp;gt; Setup &amp;gt; Management page. If the firewall is not in FIPS mode, it can be configured so that it never locks out; however in FIPS mode, and lockout time is required.&lt;/P&gt;&lt;P&gt;• The firewall automatically determines the appropriate level of self-testing and enforces the appropriate level of strength in encryption algorithms and cipher suites.&lt;/P&gt;&lt;P&gt;• Non-FIPS approved algorithms are not decrypted and are thus ignored during decryption.&lt;/P&gt;&lt;P&gt;• When configuring IPSec, a subset of the normally available cipher suites is available.&lt;/P&gt;&lt;P&gt;• Self-generated and imported certificates must contain public keys that are 2048 bits (or more).&lt;/P&gt;&lt;P&gt;• The serial port is disabled.&lt;/P&gt;&lt;P&gt;• Telnet, TFTP, and HTTP management connections are unavailable.&lt;/P&gt;&lt;P&gt;• Surf control is not supported.&lt;/P&gt;&lt;P&gt;• High availability (HA) encryption is required.&lt;/P&gt;&lt;P&gt;• PAP authentication is disabled..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Below is a Knowledgepoint Article regarding FIPS Mode:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/docs/DOC-1536"&gt;https://live.paloaltonetworks.com/docs/DOC-1536&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FIPS mode (enabling/details) can be referenced as well via your Admin Guide.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Jul 2011 19:32:44 GMT</pubDate>
    <dc:creator>bryan</dc:creator>
    <dc:date>2011-07-04T19:32:44Z</dc:date>
    <item>
      <title>Password Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22871#M16685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does somebody know how to setup Password Policy for management users in PAN OS 4? I am talking about minimum password length, special characters etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jul 2011 08:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22871#M16685</guid>
      <dc:creator>volksbank</dc:creator>
      <dc:date>2011-07-04T08:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Password Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22872#M16686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This option is available by enabling FIPS mode (FIPS 140-2) on the FW, though the following options will also apply:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12pt; "&gt;Federal Information Processing Standards Support:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• To log into the firewall, the browser must be TLS 1.0 compatible.&lt;/P&gt;&lt;P&gt;• All passwords on the firewall must be at least six characters.&lt;/P&gt;&lt;P&gt;• Accounts are locked after the number of failed attempts that is configured on theDevice &amp;gt; Setup &amp;gt; Management page. If the firewall is not in FIPS mode, it can be configured so that it never locks out; however in FIPS mode, and lockout time is required.&lt;/P&gt;&lt;P&gt;• The firewall automatically determines the appropriate level of self-testing and enforces the appropriate level of strength in encryption algorithms and cipher suites.&lt;/P&gt;&lt;P&gt;• Non-FIPS approved algorithms are not decrypted and are thus ignored during decryption.&lt;/P&gt;&lt;P&gt;• When configuring IPSec, a subset of the normally available cipher suites is available.&lt;/P&gt;&lt;P&gt;• Self-generated and imported certificates must contain public keys that are 2048 bits (or more).&lt;/P&gt;&lt;P&gt;• The serial port is disabled.&lt;/P&gt;&lt;P&gt;• Telnet, TFTP, and HTTP management connections are unavailable.&lt;/P&gt;&lt;P&gt;• Surf control is not supported.&lt;/P&gt;&lt;P&gt;• High availability (HA) encryption is required.&lt;/P&gt;&lt;P&gt;• PAP authentication is disabled..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Below is a Knowledgepoint Article regarding FIPS Mode:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/docs/DOC-1536"&gt;https://live.paloaltonetworks.com/docs/DOC-1536&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FIPS mode (enabling/details) can be referenced as well via your Admin Guide.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jul 2011 19:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22872#M16686</guid>
      <dc:creator>bryan</dc:creator>
      <dc:date>2011-07-04T19:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Password Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22873#M16687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to gather more info on the impacts of managing the devices in FIPS mode (beyond the admin guide)...I can't access the link about due to permissions errors.&amp;nbsp; Is the doc-1536 still applicable?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 19:23:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-policy/m-p/22873#M16687</guid>
      <dc:creator>chrisp</dc:creator>
      <dc:date>2012-06-26T19:23:16Z</dc:date>
    </item>
  </channel>
</rss>

