<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FIPS 140 and CC enabling? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fips-140-and-cc-enabling/m-p/325888#M83083</link>
    <description>&lt;P&gt;1. You can &lt;EM&gt;import&lt;/EM&gt; your last exported config, but you may need to."fix" incompatible settings left in the old config. The saved configs ON the device are wiped, so make sure to save and export&lt;/P&gt;&lt;P&gt;2. Yes, as long as the remote end supports strong ciphers&lt;/P&gt;&lt;P&gt;3. PAP is disabled system wide&lt;/P&gt;&lt;P&gt;4. Your self signed or imported certificates need to.be rsa2048 or ecdsa256 and SHA256 minimum and HA1 must be encrypted, that's about it I think (and passwords need to be minimum 6 chars long and failed attempts and lockout needs to be configured)&lt;/P&gt;</description>
    <pubDate>Sun, 03 May 2020 22:40:51 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-05-03T22:40:51Z</dc:date>
    <item>
      <title>FIPS 140 and CC enabling?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fips-140-and-cc-enabling/m-p/325788#M83060</link>
      <description>&lt;P&gt;Couple of questions on FIPS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;When you enable FIPS140 on a Palo it wipes the device. Can you just reload your last saved?&lt;/LI&gt;&lt;LI&gt;Can a FIPS140 enabled device talk to a non-FIPS device over an ipsec tunnel provided the cyphers are compatible?&lt;/LI&gt;&lt;LI&gt;FIPS disables PAP. System wide? or Just for authentication to the FW? Our Radius doesn't support CHAP.&lt;/LI&gt;&lt;LI&gt;Anything else that will cause my resume to spontaneously print out?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 07:28:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fips-140-and-cc-enabling/m-p/325788#M83060</guid>
      <dc:creator>MatiasMyles</dc:creator>
      <dc:date>2020-05-02T07:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS 140 and CC enabling?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fips-140-and-cc-enabling/m-p/325888#M83083</link>
      <description>&lt;P&gt;1. You can &lt;EM&gt;import&lt;/EM&gt; your last exported config, but you may need to."fix" incompatible settings left in the old config. The saved configs ON the device are wiped, so make sure to save and export&lt;/P&gt;&lt;P&gt;2. Yes, as long as the remote end supports strong ciphers&lt;/P&gt;&lt;P&gt;3. PAP is disabled system wide&lt;/P&gt;&lt;P&gt;4. Your self signed or imported certificates need to.be rsa2048 or ecdsa256 and SHA256 minimum and HA1 must be encrypted, that's about it I think (and passwords need to be minimum 6 chars long and failed attempts and lockout needs to be configured)&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2020 22:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fips-140-and-cc-enabling/m-p/325888#M83083</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-05-03T22:40:51Z</dc:date>
    </item>
  </channel>
</rss>

