UCF STIG Viewer Logo

The Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.


Overview

Finding ID Version Rule ID IA Controls Severity
V-228877 PANW-AG-000143 SV-228877r557387_rule Medium
Description
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
STIG Date
Palo Alto Networks ALG Security Technical Implementation Guide 2021-07-02

Details

Check Text ( C-31112r513926_chk )
If the Palo Alto Networks security platform is not used for TLS/SSL decryption, this is not applicable.

Use the command line interface to determine if the device is operating in FIPS mode. Enter the CLI command "show fips-mode" or the command show fips-cc (for more recent releases).

If fips mode is set to off, this is a finding.
Fix Text (F-31089r513927_fix)
Power off the device by unplugging it from the electrical outlet.

Connect a console cable from the console port to a computer serial port, and use a terminal program to connect to the Palo Alto Networks device.

The serial parameters are "9600 baud", "8 data bits", "no parity", and "1 stop bit".

A USB to serial adapter will be necessary if the computer does not have a serial port.

During the boot sequence, this message will appear:

Autoboot to default partition in 5 seconds.

Enter "maint" to boot to "maint" partition.

Enter "maint" to enter maintenance mode.

Press "Enter", and the "Maintenance Recovery tool" menu will appear.

Select "Set FIPS Mode" (or fips-cc for later versions) from the menu; once the device has finished rebooting, it will be in FIPS mode.

Note: This will remove all installed licenses and disable the serial port.