FIPS 140-3 level 1
The Federal Information Processing Standard 140-3 (FIPS 140-3) level 1 is a public standard of the United States that defines security requirements for cryptographic modules.
Supported installations
The firewall supports the FIPS mode on the following installations:
- XGS Series hardware
- Virtual machines (VMware vSphere, Hyper-V, KVM, Xen)
- Cloud (AWS, Azure)
The firewall doesn't support the FIPS mode on the following installations:
- Software
- XG and SG Series hardware
FIPS-compliant algorithms
The following algorithms are available for VPN configurations on FIPS-compliant firewalls:
- DH groups: 14, 15, 16, 17, 18, 19, 20, and 21
- Encryption: AES256-CBC, AES192-CBC, AES128-CBC, AES256-GCM, AES192-GCM, and AES128-GCM
-
RSA key: 2048 and higher
Only 2048 and 3072 are FIPS-compliant. However, the firewall allows you to select larger key sizes because they're stronger.
-
EC curves: 224-bit and larger key sizes
- Authentication: SHA1, SHA256, SHA384, and SHA512
- PSK: 14 bytes and larger
- TLS versions: TLS 1.2 and TLS 1.3
Note
We strongly recommend you use IKEv2 for all new installations. Use IKEv1 only on legacy systems and with FIPS-approved algorithms.
Turn on FIPS
Turning on FIPS requires a factory reset of the firewall to apply the FIPS-compliant algorithms to the firewall's features. After you turn on FIPS, you must configure the firewall again.
Note
If you've turned on FIPS on a FIPS-compliant SFOS 18.5 MR version, you can upgrade to SFOS 20.0 MR1 or restore a FIPS-compliant backup without configuring the firewall again, maintaining FIPS compliance.
To turn on FIPS mode, go to the command-line interface (CLI) and enter the following command:
system certification fips enable
The firewall restarts with the factory configuration, and the cryptography module becomes FIPS-compliant.
Warning
The restart replaces your current configuration with the factory default.
To turn the FIPS mode on with high availability (HA) deployments, turn on the FIPS mode first, then turn on HA.
Restriction
You can't turn FIPS on or off for devices for which HA is already turned on.
Backup and restore with FIPS
You can restore backups with FIPS turned on or off on any compatible firewall version. The following table shows how this affects the FIPS mode in the restored configuration.
Backup type | Firewall version that supports FIPS | Firewall version that doesn't support FIPS |
---|---|---|
FIPS was turned on | FIPS will be turned on | FIPS won't be available |
FIPS was turned off | FIPS will be turned off | FIPS won't be available |
Restriction
You can't restore a backup from a firewall running one of the FIPS-enabled SFOS 18.5 MR versions (FIPS 140-2 Level 1 compliant) to a firewall running SFOS 20.0 MR1 (FIPS 140-3 Level 1 compliant) if the 18.5 firewall has the following VPN configuration:
- Encryption: 3DES
- SHA1 signed certificate used in the local or remote configuration
- RSA certificate with 1024 or 1536 bits key length
- EC certificate with key length less than 224 bits
- Pre-shared key with less than 14 bytes
Firmware upgrades with FIPS
If you migrate or upgrade the firmware and then turn on FIPS, you can roll back to the previous version where FIPS was turned off since the configuration is still available.
On an active firmware with FIPS turned on, the firewall restricts the upload of firmware that doesn't support FIPS. If you still want to upload it, turn off the FIPS mode.
SFOS 20.0 MR1 is FIPS 140-3 Level 1 compliant. So, if you want to migrate a FIPS 140-2 Level 1 compliant firewall running SFOS 18.5 to SFOS 20.0 MR1, you may need to first make the 18.5 firewall configuration FIPS 140-3 Level 1 compliant.
Restriction
You can't upgrade a firewall running one of the FIPS-enabled SFOS 18.5 MR versions (FIPS 140-2 Level 1 compliant) to SFOS 20.0 MR1 (FIPS 140-3 Level 1 compliant) if the 18.5 firewall has the following VPN configuration:
- Encryption: 3DES
- SHA1 signed certificate used in the local or remote configuration
- RSA certificate with 1024 or 1536 bits key length
- EC certificate with key length less than 224 bits
- Pre-shared key with less than 14 bytes
FIPS behavior
The firewall generates all the default policies with FIPS-compliant settings.
Usually, the firewall generates the default L2TP policy using MD5, but on FIPS-enabled devices, it uses the minimally required authentication algorithm SHA1.
VPN
When you turn on the FIPS mode, IPsec uses the FIPS-certified cryptography library for VPN tunnel establishments (phase 1). SSL VPN uses the FIPS-certified cryptography library to establish the phase 1 and phase 2 VPN tunnels.
To meet FIPS compliance, some encryption options aren't available.
In FIPS mode, the firewall generates certificates that are FIPS-compliant and FIPS-validated. The firewall uses a FIPS-certified cryptography library for the generation.
When you upload certificates or certificate authorities (CAs), the firewall validates them for a FIPS-compliant algorithm.
-
IPsec policies phase 1 and 2:
- DH group: You can't select 1, 2, 5, 25, 26, 27, 28, 29, or 30 because they're not FIPS-certified. You can select 31 because the encryption is stronger than required, but your connection will not be FIPS-compliant.
- Encryption: You can't select 3DES, Blowfish, Twofish, and Serpent.
- Authentication: You can't select MD5.
-
IPsec connections
-
Remote access VPN > IPsec > Authentication type:
- RSA key: 2048 and higher. Only 2048 and 3072 are FIPS-compliant. However, the firewall allows you to select larger key sizes because they're stronger.
- Digital certificate: You can use only FIPS-compliant certificates. You can't select External CA as the remote certificate.
- Preshared key: Minimum length of the pre-shared key should be 14 bytes.
-
IPsec wizard: Offers FIPS-compliant settings.
-
-
IPsec (remote access) and L2TP (remote access): For authentication based on Digital certificate, you can use only FIPS-compliant certificates.
- FIPS-enabled devices don't have a default L2TP policy.
Site-to-site VPN > SSL VPN > SSL VPN global settings:
- SSL server certificate: For authentication based on Digital certificate, you can use only FIPS-compliant certificates.
-
Cryptography settings:
- Encryption algorithm: You can't select BF-CBC or 3DES.
- Authentication algorithm: You can't select MD5.
- Key size: You can't select 1024.
-
SSL VPN (site-to-site): The firewall generates FIPS-compliant server and client configurations. If you download a server configuration from a FIPS-enabled device, you can't use it on versions earlier than 18.5 MR2 if the VPN configuration is password-protected and vice versa.
In a site-to-site VPN tunnel connecting to an Amazon VPC, you must do as follows:
- Use the Use VPC configuration file option to import VPC connections. The firewall doesn't support the Use AWS security credentials option in FIPS mode. You can still see this option in the web admin console, but the connection will fail.
- Manually update the VPC configuration file to use the FIPS 140-3 compliant algorithms as mentioned in FIPS-compliant algorithms. For example, make sure you're using a FIPS-compliant algorithm for the DH group.
Certificates and certificate authorities
In FIPS mode, the firewall generates certificates that are FIPS-compliant and FIPS-validated. The firewall uses a FIPS-certified cryptography library for the generation.
When you upload certificates or certificate authorities (CAs), the firewall validates them for a FIPS-compliant algorithm.
For digital certificates (local or remote), the restriction depends on the certificate type:
- You can't select MD5 digest or SHA1 digest.
- RSA key: 2048 and higher. Only 2048 and 3072 are FIPS-compliant. However, the firewall allows you to select larger key sizes because they're stronger.
- EC curves: Prime field curves. 224 and larger key sizes are allowed.
High availability
You can turn on HA on FIPS-enabled devices. First, turn on FIPS on the primary device, then turn on HA. The firewall will then automatically turn on FIPS for the auxiliary device.
You can't turn FIPS on or off while HA is turned on for the devices.
If you turn off HA, the FIPS status doesn't change on any HA device.
Logging and reporting
The log viewer and reports show the change when you turn FIPS on or off.
More resources