<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FIPS and Hotfix Installation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275718#M105017</link>
    <description>&lt;P&gt;The FIPS 140-2 implementation is distributed amongst the libraries identified in the FIPS Security Policy.&lt;/P&gt;
&lt;P&gt;In the 140-3 implementation the security relevant code will just be an updated jitter and CPOpenSSL library.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Further, the FIPS mode will be based on the OpenSSL FIPS provider rather than the legacy code.&lt;/P&gt;
&lt;P&gt;The code will be fully integrated in of R82.20.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The code will also be in a branch of R82.10 that will be used by FedRAMP&lt;/P&gt;
&lt;P&gt;With the new code the existing restrictions will be removed, but I cannot tell you the support that will be provided for the R82.10 branch.&lt;/P&gt;</description>
    <pubDate>Sun, 19 Apr 2026 04:21:45 GMT</pubDate>
    <dc:creator>Malcolm_Levy</dc:creator>
    <dc:date>2026-04-19T04:21:45Z</dc:date>
    <item>
      <title>FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275715#M105015</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a need to enable FIPS mode on a number of our 81.20 take 120 appliances to meet some compliance requirements. I am working in a virtual lab environment to test this out. I do understand that ssh, https (web interface), and cprid are unavailable in R81.20 when running in FIPS mode. However&amp;nbsp;I was under the impression after reading:&lt;/P&gt;&lt;P&gt;&lt;A class="" href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-FIPS-for-HotFix-install/td-p/248338" target="_blank" rel="noopener nofollow"&gt;https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-FIPS-for-HotFix-install/td-p/248338&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and other similar posts that after enabling FIPS I would no longer be able to install a jumbo hotfix on the gateways. However in my lab I have found that I can indeed install take 127 after enabling FIPS mode.&lt;/P&gt;&lt;P&gt;To install, I enabled ssh on the gateway so I could manually copy the offline package to the gateway. Then used CPUSE to import and install the hotfix with no issues that I can see.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the following commands to enable FIPS as listed in (pg30):&lt;/P&gt;&lt;P&gt;chkconfig --add jitterentropy_rngd_init&lt;BR /&gt;chkconfig --level 2345 jitterentropy_rngd_init on&lt;BR /&gt;fips on&lt;/P&gt;&lt;P&gt;&lt;A class="" href="https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4264.pdf" target="_blank" rel="noopener nofollow"&gt;https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp4264.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Should this have been possible in FIPS mode? Or perhaps I did not enable it properly?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to understand what to expect in our production environments when in comes time to install jumbos.&lt;/P&gt;&lt;P&gt;I appreciate any clarity you can help provide!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2026 21:04:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275715#M105015</guid>
      <dc:creator>gto_gary</dc:creator>
      <dc:date>2026-04-18T21:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275717#M105016</link>
      <description>&lt;P&gt;Not to oversimplify it but in ways FIPS by nature conflicts with the need to regularly update security products...&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18467"&gt;@Malcolm_Levy&lt;/a&gt;&amp;nbsp;Touches on this topic here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/97289" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/97289&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2026 04:03:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275717#M105016</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-19T04:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275718#M105017</link>
      <description>&lt;P&gt;The FIPS 140-2 implementation is distributed amongst the libraries identified in the FIPS Security Policy.&lt;/P&gt;
&lt;P&gt;In the 140-3 implementation the security relevant code will just be an updated jitter and CPOpenSSL library.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Further, the FIPS mode will be based on the OpenSSL FIPS provider rather than the legacy code.&lt;/P&gt;
&lt;P&gt;The code will be fully integrated in of R82.20.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The code will also be in a branch of R82.10 that will be used by FedRAMP&lt;/P&gt;
&lt;P&gt;With the new code the existing restrictions will be removed, but I cannot tell you the support that will be provided for the R82.10 branch.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2026 04:21:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275718#M105017</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2026-04-19T04:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275770#M105031</link>
      <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply!&amp;nbsp;&lt;/P&gt;&lt;P&gt;For my immediate requirements I need to know if what the restriction is on applying a Jumbo Hotfix on a FIPS enabled gateway?&amp;nbsp; Is the method I used to install a hotfix on a FIPS gateway supported?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 14:02:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275770#M105031</guid>
      <dc:creator>gto_gary</dc:creator>
      <dc:date>2026-04-20T14:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275771#M105032</link>
      <description>&lt;P&gt;Gary,&lt;/P&gt;
&lt;P&gt;If you find your method works I will not contradict. As certifications are for a point release, and FIPS 140-2 does not support updates, your question is outside the scope of the certification work and therefore not considered when we certify. However, we have certified multiple versions on the same FIPS 140-2 certificate to provide an upgrade path.&lt;/P&gt;
&lt;P&gt;I would recommend to make a fresh installation,&amp;nbsp;preferably of R82 as the latest that is certified, take the latest JHF and after configuration enable FIPS mode. As data is stored on the Management Server I don't even think that back up of the data should be required.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 14:21:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275771#M105032</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2026-04-20T14:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275772#M105033</link>
      <description>&lt;P&gt;Thank you Malcom!&lt;BR /&gt;&lt;BR /&gt;So while the method may work, FIPS 140-2 does not support updates. So the best method when it comes time for a new jumbo is a clean install, install the latest jumbo, and Enable FIPS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really appreciate the assistance!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 14:33:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275772#M105033</guid>
      <dc:creator>gto_gary</dc:creator>
      <dc:date>2026-04-20T14:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS and Hotfix Installation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275773#M105034</link>
      <description>&lt;P&gt;Gary,&lt;/P&gt;
&lt;P&gt;It is always safer to tread a standard well trodden path than to hoe your own! So yes, that is my recommendation.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malcolm&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 14:37:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-and-Hotfix-Installation/m-p/275773#M105034</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2026-04-20T14:37:48Z</dc:date>
    </item>
  </channel>
</rss>

