STIGQter STIGQter: STIG Summary: Palo Alto Networks ALG Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Palo Alto Networks security platform providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.

DISA Rule

SV-228876r557387_rule

Vulnerability Number

V-228876

Group Title

SRG-NET-000510-ALG-000025

Rule Version

PANW-AG-000141

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Power off the device by unplugging it from the electrical outlet.

Connect a console cable from the console port to a computer serial port, and use a terminal program to connect to the Palo Alto Networks device.

The serial parameters are "9600 baud", "8 data bits", "no parity", and "1 stop bit".

A USB to serial adapter will be necessary if the computer does not have a serial port.

During the boot sequence, this message will appear:

Autoboot to default partition in 5 seconds.

Enter "maint" to boot to "maint" partition.

Enter "maint" to enter maintenance mode.

Press "Enter", and the "Maintenance Recovery tool" menu will appear.

Select "Set FIPS Mode" (or fips-cc for later versions) from the menu; once the device has finished rebooting, it will be in FIPS mode.

Note: This will remove all installed licenses and disable the serial port.

Check Contents

If the Palo Alto Networks security platform does not provide encryption intermediary services (e.g., HTTPS or TLS), this is not applicable.

Use the command line interface to determine if the device is operating in FIPS mode. Enter the CLI command "show fips-mode" or the command show fips-cc (for more recent releases).

If fips-mode or fips-cc is set to off, this is a finding.

Vulnerability Number

V-228876

Documentable

False

Rule Version

PANW-AG-000141

Severity Override Guidance

If the Palo Alto Networks security platform does not provide encryption intermediary services (e.g., HTTPS or TLS), this is not applicable.

Use the command line interface to determine if the device is operating in FIPS mode. Enter the CLI command "show fips-mode" or the command show fips-cc (for more recent releases).

If fips-mode or fips-cc is set to off, this is a finding.

Check Content Reference

M

Target Key

4233

Comments