Hi All,
I have a need to enable FIPS mode on a number of our 81.20 take 120 appliances to meet some compliance requirements. I am working in a virtual lab environment to test this out. I do understand that ssh, https (web interface), and cprid are unavailable in R81.20 when running in FIPS mode. However I was under the impression after reading:
https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-FIPS-for-HotFix-install...
and other similar posts that after enabling FIPS I would no longer be able to install a jumbo hotfix on the gateways. However in my lab I have found that I can indeed install take 127 after enabling FIPS mode.
To install, I enabled ssh on the gateway so I could manually copy the offline package to the gateway. Then used CPUSE to import and install the hotfix with no issues that I can see.
I used the following commands to enable FIPS as listed in (pg30):
chkconfig --add jitterentropy_rngd_init
chkconfig --level 2345 jitterentropy_rngd_init on
fips on
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security...
Should this have been possible in FIPS mode? Or perhaps I did not enable it properly?
I need to understand what to expect in our production environments when in comes time to install jumbos.
I appreciate any clarity you can help provide!