UCF STIG Viewer Logo

The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.


Finding ID Version Rule ID IA Controls Severity
V-62553 PANW-AG-000020 SV-77043r2_rule Medium
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).
Palo Alto Networks ALG Security Technical Implementation Guide 2016-06-30


Check Text ( C-63357r3_chk )
If the Palo Alto Networks security platform is not used as a TLS gateway/decryption point or VPN concentrator, this is not applicable.

For PAN OS 6.1, enter the command "show fips-mode"; if the response is "off", this is a finding unless the device is in CC mode.

For PAN OS 6.1 and PAN OS 7.0.1 and later, when in CC mode, the CLI and the GUI login screen will display “CCEAL4 MODE ENABLED” and the GUI will display “CC” in the lower right hand corner. If these are present, this is not a finding.
Alternately, use the command line interface to determine if the device is operating in Common Criteria mode. Enter the command “show operational-mode”; if the response is not “CC”, this is a finding.
Fix Text (F-68473r4_fix)
To configure the Palo Alto Networks security platform to operate in FIPS mode:
Power off the device by unplugging it from the electrical outlet.
Connect a console cable from the console port to a computer serial port, and use a terminal program to connect to the Palo Alto Networks device.
The serial parameters are 9600 baud, 8 data bits, no parity, and 1 stop bit.
A USB to serial adapter will be necessary if the computer does not have a serial port.

During the boot sequence, this message will appear:
"Autoboot to default partition in 5 seconds".
Enter "maint" to enter maintenance mode.
Press "Enter", and the Maintenance Recovery Tool menu will appear.
Select "Set FIPS Mode" from the menu; once the device has finished rebooting, it will be in FIPS mode. The procedure for enabling CC mode is similar; however, select "Set CCEAL4 Mode" from the menu.

When the mode change is complete, the device will report the status as “Success”. After this is complete, it is necessary to reboot the device.

Note: This will remove all installed licenses and disable the serial port.