<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh access to mgmt interface after enabling fips mode in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285818#M76484</link>
    <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;my change is dependent on having ssh access to 192.168.1.1 after enabling fips and firewall is wiped. Needed confirmation before attempting it&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2019 17:17:41 GMT</pubDate>
    <dc:creator>josggf</dc:creator>
    <dc:date>2019-08-29T17:17:41Z</dc:date>
    <item>
      <title>ssh access to mgmt interface after enabling fips mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285569#M76443</link>
      <description>&lt;P&gt;i am checking documentation and knowledgebase and it seems only ui access to &lt;A href="https://192.168.1.1" target="_blank"&gt;https://192.168.1.1&lt;/A&gt; is available after fips is enabled and firewall reboots.&lt;/P&gt;&lt;P&gt;Can anyone confirm if ssh to 192.168.1.1 will work as well or not?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 17:32:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285569#M76443</guid>
      <dc:creator>josggf</dc:creator>
      <dc:date>2019-08-28T17:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to mgmt interface after enabling fips mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285636#M76452</link>
      <description>Fips/cceal4 disables the console port, ssh is still available</description>
      <pubDate>Wed, 28 Aug 2019 22:12:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285636#M76452</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-08-28T22:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to mgmt interface after enabling fips mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285818#M76484</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;my change is dependent on having ssh access to 192.168.1.1 after enabling fips and firewall is wiped. Needed confirmation before attempting it&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 17:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285818#M76484</guid>
      <dc:creator>josggf</dc:creator>
      <dc:date>2019-08-29T17:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: ssh access to mgmt interface after enabling fips mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285857#M76495</link>
      <description>&lt;P&gt;Confirming the &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; is correct.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSH will be still be enabled/accessible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are all changes when going into FIPS mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;To log into the Palo Alto Networks firewall, the browser must be TLS 1.0 compatible.&lt;/LI&gt;&lt;LI&gt;All passwords on the firewall must be at least six characters.&lt;/LI&gt;&lt;LI&gt;Accounts are locked after the number of failed attempts that is configured on the Device &amp;gt; Setup &amp;gt; Management page. If the firewall is not in FIPS mode, it can be configured so that it never locks out. However, in FIPS mode, the lockout time is required.&lt;/LI&gt;&lt;LI&gt;The firewall automatically determines the appropriate level of self-testing and enforces the appropriate level of strength in encryption algorithms and cipher suites.&lt;/LI&gt;&lt;LI&gt;Non-FIPS approved algorithms are not decrypted and are thus ignored during decryption.&lt;/LI&gt;&lt;LI&gt;When configuring IPSec, a subset of the normally available cipher suites is available.&lt;/LI&gt;&lt;LI&gt;Self-generated and imported certificates must contain public keys that are 2048 bits (or more).&lt;/LI&gt;&lt;LI&gt;The exporting of CSRs (Certificate Signing Request) is not supported while in FIPS mode. The following error will appear:&lt;BR /&gt;&lt;SPAN&gt;Error: download -&amp;gt; certificate -&amp;gt; format 'pkcs10' is not an allowed keyword' be generated&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;SSH key-based authentication must use RSA public keys that are 2048 bits or higher.&lt;/LI&gt;&lt;LI&gt;The serial port is disabled.&lt;/LI&gt;&lt;LI&gt;Management port IP address cannot be changed via maintenance mode console.&lt;/LI&gt;&lt;LI&gt;Telnet, TFTP, and HTTP management connections are unavailable.&lt;/LI&gt;&lt;LI&gt;Surf control is not supported.&lt;/LI&gt;&lt;LI&gt;High availability (HA) encryption is required.&lt;/LI&gt;&lt;LI&gt;PAP authentication is disabled.&lt;/LI&gt;&lt;LI&gt;Kerberos support is disabled.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 20:10:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-access-to-mgmt-interface-after-enabling-fips-mode/m-p/285857#M76495</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-08-29T20:10:44Z</dc:date>
    </item>
  </channel>
</rss>

