
Beta Draft
Contents
Configuring KMIP..........................................................................................................................................93
Using the Management Console to configure KMIP ..............................................................................93
Using CLI to configure KMIP.................................................................................................................95
Troubleshooting KMIP............................................................................................................................95
Configuring appliance monitoring..................................................................................................................97
Configuring a management ACL ...................................................................................................................99
Configuring SSH Access ..............................................................................................................................100
Chapter 8 - Configuring AltaVault appliances for FIPS-compliant cryptography.............................103
What is FIPS? ...............................................................................................................................................103
Understanding FIPS on AltaVault ................................................................................................................103
NetApp Cryptographic Security Module...............................................................................................104
Compliant FIPS cryptography features .................................................................................................104
Noncompliant FIPS cryptography features ...........................................................................................104
Configuring AltaVault for FIPS compliance ................................................................................................105
Configuring AltaVault appliances for FIPS-compliant cryptography ..........................................................105
Enabling FIPS mode..............................................................................................................................106
Verifying that your system uses FIPS-compliant encryption ................................................................106
Working with features to maintain FIPS compliance............................................................................107
Account passwords................................................................................................................................107
Cipher requirements ..............................................................................................................................108
Key size requirements ...........................................................................................................................108
NTP........................................................................................................................................................109
RADIUS and TACACS+.......................................................................................................................109
SNMP ....................................................................................................................................................109
SSH........................................................................................................................................................109
Telnet server ..........................................................................................................................................110
Web proxy .............................................................................................................................................110
Disabling FIPS mode....................................................................................................................................111
Verifying FIPS mode in system logs ............................................................................................................111
Verifying that file transfers operate in FIPS mode ................................................................................111
Verifying that NTP operates in FIPS mode ...........................................................................................112
Verifying that secure vault operates in FIPS mode ...............................................................................112
Verifying that SNMP operates in FIPS mode........................................................................................112
Verifying that the web interface operates in FIPS mode .......................................................................112
FIPS CLI.......................................................................................................................................................112
Chapter 9 - Managing the AltaVault appliance..................................................................................... 113
Starting and stopping the AltaVault appliance..............................................................................................113
Configuring scheduled jobs .........................................................................................................................114
Managing licenses ........................................................................................................................................115
Managing unlicensed AltaVault appliances...........................................................................................116
Managing licenses using the command-line..........................................................................................116
Managing licenses using the Management Console..............................................................................117