<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FIPS mode operation and some manual configurations in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/159635#M27996</link>
    <description>&lt;P&gt;FIPS mode is restricted by design. This will be reviewed for our next FIPS certification, but be aware the FIPS certification process is very long.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most customers prefer to run in a self-configured FIPS like mode which is the reason this document was written. I understand that the restrictions were originally implemented to prevent modification into a configuration that is not FIPS compliant. There is a conflict between the FIPS standard that does not allow flaw remediation and a security product that is under constant revision. Understandably, customers of security products need the ability to apply updates.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 15 Oct 2022 18:47:57 GMT</pubDate>
    <dc:creator>Malcolm_Levy</dc:creator>
    <dc:date>2022-10-15T18:47:57Z</dc:date>
    <item>
      <title>FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/97289#M7550</link>
      <description>&lt;P&gt;The attached provides some information on FIPS mode, and commands that can be used when not in FIPS mode to achieve some of the same&amp;nbsp;&lt;/P&gt;
&lt;P&gt;31-May-2022: I've updated according to the current status. For the new certificate we are waiting for the Validator approval. Hope to hear in a short time.&lt;/P&gt;
&lt;P&gt;22-September-2022: Removed May document and replaced with August version following certificate award&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2022 07:43:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/97289#M7550</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-09-22T07:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/109490#M14923</link>
      <description>&lt;P&gt;Hi Malcolm, RE: R80.10 and R80.20 soon to be R81.&lt;/P&gt;&lt;P&gt;How can I show a FISMA auditor that FIPs is enabled when a customer connects with TLS 1.2 to our SSLVPN?&amp;nbsp; There is no mention of FIPS in the ES admin guide.&amp;nbsp; Assuming windows OS and browser they are connecting from is using FIPs would be enforced by an ES policy.&lt;/P&gt;&lt;P&gt;On the CP VPN side, RE: site to site, Endpoint Security or SSLVPN (network extender) I haven't found a way to show that FIPS is enabled/disabled one way or the other. I do see the libraries and FIPs certification. Would FIPs have to be turned on - on the gateway for it to be supported on the VPN?&lt;BR /&gt;&lt;A href="https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp2995.pdf" target="_blank" rel="noopener"&gt;https://csrc.nist.gov/csrc/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp2995.pdf&lt;/A&gt; IOW, on the CP side how can we show proof FIPs is enabled, other than&lt;BR /&gt;Checkpoint is using a validated cryptographic module per: &lt;A href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules" target="_blank" rel="noopener"&gt;https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2021 20:26:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/109490#M14923</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2021-02-01T20:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/109803#M14995</link>
      <description>&lt;P&gt;1. It is only possible to see if FIPS mode is enabled on the GW&lt;/P&gt;
&lt;P&gt;2. The status of FIPS mode can be seen by:&lt;/P&gt;
&lt;P&gt;ckp_regedit -p "software\\checkpoint\\SIC\\FIPS_140"&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;ckp_regedit -p "software\\checkpoint\\SIC” and looking for fips registry&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Malcolm_Levy_0-1612441064885.png" style="width: 1168px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10452i1DDCA789C2E0BDDB/image-dimensions/1168x71?v=v2" width="1168" height="71" role="button" title="Malcolm_Levy_0-1612441064885.png" alt="Malcolm_Levy_0-1612441064885.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;3. Enabling FIPS mode does not change the cryptographic library (there is a single library on the GW) or protocol implementation of SSL VPN (including TLS 1.2) and it should be noted FIPS does not validate protocols, only crypto algorithms (it does validate Key Derivation Functions - KDFs)&lt;/P&gt;
&lt;P&gt;5. For configuring cyphers refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;sk126613: Cipher configuration tool for Security Gateways&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 12:38:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/109803#M14995</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2021-02-04T12:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/132868#M19736</link>
      <description>&lt;P&gt;Hi Malcolm,&lt;/P&gt;
&lt;P&gt;After FIPs is enabled on the gw,&amp;nbsp; on the client side - can both SSLVPN (logging into the portal) and using the fat client (Endpoint Security/Harmony) be FIPS compliant?&amp;nbsp; &amp;nbsp; I'm fairly certain both the fat Harmony client could also be configured with FIPS as well as the web client (SSLVPN portal). It would just require the windows PC on the client end to be FIPs compliant.&amp;nbsp; &amp;nbsp;Maybe, nothing more needs to be done on the ES / Harmony client or the web (sslvpn) client.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 14:42:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/132868#M19736</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2021-10-29T14:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/159633#M27995</link>
      <description>&lt;P&gt;&lt;SPAN&gt;From the above attached pdf, FIPS mode disables SSH, Web&lt;/SPAN&gt;&lt;SPAN&gt;UI, the remote installation daemon cprid_d and removes &lt;/SPAN&gt;&lt;SPAN&gt;support for SSLv3 from SIC (i.e. only TLS is supported). When in FIPS mode access to the &lt;/SPAN&gt;&lt;SPAN&gt;fw, fwm, and vpn command line utilities are removed. FIPS mode disables &lt;/SPAN&gt;&lt;SPAN&gt;AES&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;NI, CPRID&lt;/SPAN&gt;&lt;SPAN&gt;the QOS blade and the moni&lt;/SPAN&gt;&lt;SPAN&gt;toring blade&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How are you supposed to manage the gateway if you can't manage the gw with webui OR SSH?&amp;nbsp; &amp;nbsp;How are you supposed to manage VPN tunnel if it disable vpn command and the monitoring blade?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 14:44:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/159633#M27995</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-10-15T14:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: FIPS mode operation and some manual configurations</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/159635#M27996</link>
      <description>&lt;P&gt;FIPS mode is restricted by design. This will be reviewed for our next FIPS certification, but be aware the FIPS certification process is very long.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most customers prefer to run in a self-configured FIPS like mode which is the reason this document was written. I understand that the restrictions were originally implemented to prevent modification into a configuration that is not FIPS compliant. There is a conflict between the FIPS standard that does not allow flaw remediation and a security product that is under constant revision. Understandably, customers of security products need the ability to apply updates.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 18:47:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FIPS-mode-operation-and-some-manual-configurations/m-p/159635#M27996</guid>
      <dc:creator>Malcolm_Levy</dc:creator>
      <dc:date>2022-10-15T18:47:57Z</dc:date>
    </item>
  </channel>
</rss>

