The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsSecurity Guide for Cisco Unified Communications Manager, Release 15 and SUs
FIPS mode is only supported on releases that have been through FIPS compliance. Be warned that FIPS mode should be disabled before you upgrade to a non-FIPS compliance version of Unified Communications Manager .
For information about which releases are FIPS compliant and to view their certifications, see the FIPS 140 document at https://www.cisco.com/c/en/us/solutions/industries/government/global-government-certifications/fips-140.html.
FIPS, or Federal Information Processing Standard, is a U.S. and Canadian government certification standard. It defines requirements that cryptographic modules must follow.
Certain versions of Unified Communications Manager are FIPS 140-2 compliant, in accordance with the U.S. National Institute of Standards (NIST). They can operate in FIPS mode, level 1 compliance.
Unified Communications Manager
When you enable FIPS 140-2 mode. At this point, Unified Communications Manager operates in the FIPS 140-2 mode.
FIPS requirements include the following:
FIPS mode uses the following FIPS 140-2 level 1 validated cryptographic modules.
These versions are applicable for Release 15 only.
For more information on the Unified Communications Manager upgrade, see the 'COP File Installation Guidelines' section in the Installation Guide for Cisco Unified Communications Manager and the IM and Presence Service.
You can perform the following FIPS-related tasks:
If you generate a Self-Signed Certificate or Certificate Signing Request (CSR) on FIPS mode, certificates must be encrypted using the SHA256 hashing algorithm and can't select SHA1.
Consider the following before you enable FIPS 140-2 mode on Unified Communications Manager :
Before you enable FIPS mode, we strongly recommend that you perform a system backup. If FIPS checks fail at start-up, the system halts and requires a recovery CD to be restored.
Make sure that all cluster nodes are set to FIPS mode or Non-FIPS mode during deployment. You cannot deploy mixed nodes in a cluster. A cluster must be either a FIP or a non-FIPS node.
Start a CLI session.
In the CLI, enter utils fips enable
If you enter a password less than 14 characters, the following prompt appear:
The cluster security password must be at least 14 characters long before security modes such as FIPS, Common Criteria and Enhanced Security modes can be enabled. Update the cluster security password using the 'set password user security' CLI command on all nodes and retry this command. ********************************************************************************** Executed command unsuccessfully
If you enter a password more than 14 characters, the following prompts appear:
Security Warning: The operation will regenerate certificates for 1)CallManager 2)Tomcat 3)IPsec 4)TVS 5)CAPF 6)SSH 7)ITLRecovery Any third party CA signed certificates that have been uploaded for the above components will need to be re-uploaded. If the system is operating in mixed mode, then the CTL client needs to be run again to update the CTL file. If there are other servers in the cluster, please wait and do not change the FIPS Settings on any other node until the FIPS operation on this node is complete and the system is back up and running. If the enterprise parameter 'TFTP File Signature Algorithm' is configured with the value 'SHA-1' which is not FIPS compliant in the current version of the Unified Communications Manager, though the signing operation will continue to succeed, it is recommended the parameter value be changed to SHA-512 in order to be fully FIPS. Configuring SHA-512 as the signing algorithm may reqiure all the phones that are provisioned in the cluster to be capable of verifying SHA-512 signed configuration file, otherwise the phone registration may fail. Please refer to the Cisco Unified Communications Manager Security Guide for more details. ****************************************************************************** This will change the system to FIPS mode and will reboot. ****************************************************************************** WARNING: Once you continue do not press Ctrl+C. Canceling this operation after it starts will leave the system in an inconsistent state; rebooting the system and running "utils fips status" will be required to recover. ****************************************************************************** Do you want to continue (yes/no)?
The following message appears:
Generating certificates. Setting FIPS mode in operating system. FIPS mode enabled successfully. ******************************************************** It is highly recommended that after your system restarts that a system backup is performed. ******************************************************** The system will reboot in a few minutes.
Unified Communications Manager reboots automatically.
Unified Communications Manager supports CiscoSSH. When you enable FIPS mode on your system, CiscoSSH is enabled automatically with no extra configuration required.
CiscoSSH supports the following key exchange algorithms:
CiscoSSH supports the following ciphers with the Unified Communications Manager server:
CiscoSSH supports the following ciphers for clients:
Consider the following information before you disable FIPS 140-2 mode on Unified Communications Manager :
To disable FIPS 140-2 mode, perform the following procedure:
Start a CLI Session.
In the CLI, enter utils fips disable
Unified Communications Manager reboots and is restored to non-FIPS mode.
Certificates and SSH key are regenerated automatically.
To confirm if the FIPS 140-2 mode is enabled, check the mode status from the CLI.
To check the status of FIPS 140-2 mode, perform the following procedure:
Start a CLI Session.
In the CLI, enter utils fips status
The following message appears to confirm that FIPS 140-2 mode is enabled.
admin:utils fips status The system is operating in FIPS mode. Self test status: - S T A R T --------------------- Executing FIPS selftests runlevel is graphical.target Start time: Wed Aug 2 18:28:56 IST 2023 NSS self tests passed. Kernel Crypto tests passed. Operating System OpenSSL self tests passed. Strongswan self tests passed. OpenSSL self tests passed. CryptoJ self tests passed. BCFIPS self tests passed. KFOM self tests passed.
FIPS startup self-tests in each of the FIPS 140-2 modules are triggered after rebooting when Unified Communications Manager server reboots in FIPS 140-2 mode.
If any of these self-tests fail, the Unified Communications Manager server halts.
Unified Communications Manager server is automatically rebooted when FIPS is enabled or disabled with the corresponding CLI command. You can also initiate a reboot.
If the startup self-test failed because of a transient error, restarting the Unified Communications Manager server fixes the issue. However, if the startup self-test error persists, it indicates a critical problem in the FIPS module and the only option is to use a recovery CD.
FIPS mode does not support SNMP v3 with MD5 or DES. If you have SNMP v3 configured while FIPS mode is enabled, you must configure SHA as the Authentication Protocol and AES128 as the Privacy Protocol.
Certificate Remote Enrolment
FIPS mode does not support Certificate Remote Enrolment.
By Default, the JSCH library was using ssh-rsa for SFTP connection but the FIPS mode doesn’t support ssh-rsa. Due to a recent update of CentOS, the JSCH library supports both ssh-rsa (SHA1withRSA) or rsa-sha2-256 (SHA256withRSA) depending on the FIPS value after modifications. That is,
The rsa-sha2-256 (SHA256WithRSA) support is available only from OpenSSH 6.8 version onwards. In FIPS mode, only the SFTP servers running with OpenSSH 6.8 version onwards supports the rsa-sha2-256 (SHA256WithRSA)
SSH Host Key Algorithms
New Supported Algorithm:
Before upgrading to 14SU2 and above releases, we recommend you refer to the “Supported Upgrade and Migration Paths with COP Files” section in the Upgrade and Migration Guide for Cisco Unified Communications Manager and the IM and Presence Service.
In Common Criteria (CC) mode, Certificate Exchange operation is recommended first between clusters/nodes before configuring IPSec policies for Certificate based IPSec Policy.
Certificate based IPSec Policy will not work when moving from Non-FIPS to FIPS / Common Criteria mode or vice-versa.
Perform the following when you should move from Non-FIPS mode to FIPS / CC Mode or vice-versa. If you have a certificate based IPSec policy and its in enabled state then:
When you enable/disable the FIPS CC mode server that is having IPSec configuration, multiple Pluto Cores are visible ( utils core active list ). However, this doesn't have impact on any functionality.
Enhanced Security Mode runs on a FIPS-enabled system. Both Unified Communications Manager and the IM and Presence Service can be enabled to operate in Enhanced Security Mode, which enables the system with the following security and risk management controls:
When Unified Communications Manager is in FIPS mode, the devices that you set as a backup device must be FIPS compliance. The key exchange algorithm diffie-hellman-group1-sha1 isn't supported in FIPS mode. If you configure diffie-hellman-group1-sha1 algorithm in a non-FIPS mode of Unified Communications Manager , this algorithm is automatically removed from SSH Key Exchange when you enable FIPS mode.
When Enhanced Security Mode is enabled, a stricter credential policy takes effect for new user passwords and password changes. After Enhanced Security Mode is enabled, administrators can use the set password *** series of CLI commands to modify any of these requirements:
When Unified Communications Manager and Cisco Instant and Messaging are operating in Enhanced Security mode, before Jabber login with an existing local end-user or new local end-user, the user needs to follow the below steps:
When Unified Communications Manager is enabled to operate in Enhanced mode, ensure that you change the user credentials for IPMASysUser and IPMASecureSysUser. Else, the IPMA functionalities won't be in a working state and the 'IPMANotStarted' alarms will be triggered. The CLI sessions will be flooded on the next Cisco Tomcat service restart or IPMA service restart.
From Cisco Unified CM Administration user interface, navigate to User Management > Application User and click Edit Credential . From the Authentication Rule drop-down list, select Enhanced Security Credential Policy and ensure that you keep the User Must Change at Next Login check box unchecked. You can view the Enhanced Security Mode policies as described in the 'Credential Policy Updates' section.
Enable FIPS before you enable Enhanced Security Mode.
Use this procedure on all Unified Communications Manager or IM and Presence Service cluster nodes to configure Enhanced Security Mode.
Log in to the Command Line Interface.
Run utils EnhancedSecurityMode status command to confirm whether Enhanced Security Mode is enabled.
Run one of the following commands on a Unified Communications Manager cluster node:
After enabling Enhanced Security Mode, change the password in the Cisco Unified CM Administration user interface with a new password containing 14 characters.
Perform the following after enabling Enhanced Security Mode on Unified Communications Manager publisher:
Do not run either utils EnhancedSecurityMode enable or utils EnhancedSecurityMode disable CLI commands on all nodes simultaneously.
Common Criteria mode allows both Unified Communications Manager and IM and Presence Service Service to comply with Common Criteria guidelines. Common Criteria mode can be configured with the following set of CLI commands on each cluster node:
To configure Unified Communications Manager and IM and Presence Service for Common Criteria mode, perform the following:
TLS is a prerequisite for configuring Common Criteria mode.
Configure Common Criteria mode on all Unified Communications Manager and IM and Presence Service cluster nodes.
TLS 1.2 version or TLS version 1.1 is a requirement for Common Criteria mode. Secure connections using TLS version 1.0 are not permitted after enabling Common Criteria mode.
If the extendedKeyUsage extension does not exist in the peer certificate or is not set properly, the connection is closed.
To support TLS version 1.2, perform the following:
Install Soap UI version 5.2.1.
If you are running on the Microsoft Windows platform:
If you are running on Linux, edit the bin/soaup.sh file to add JAVA_OPTS="$JAVA_OPTS -Dsoapui.https.protocols=SSLv3,TLSv1.2" and save the file.
If you are running OSX:
Restart the SoapUI tool and proceed with AXL testing
Use this procedure to configure Common Criteria mode for Unified Communications Manager and IM and Presence Service Service.
Cisco's CTL client is no longer supported from Release 14. We recommend that you use the CLI command to switch the Unified Communications Manager server to Mixed Mode instead of the Cisco CTL Plugin.
Log in to the Command Line Interface prompt.
Run utils fips_common_criteria status command to verify whether the system is operating in Common Criteria mode.
Run one of the following commands on a cluster node:
To enable Common Criteria Mode across a single cluster, repeat this procedure on all Unified Communications Manager and IM and Presence Service cluster nodes.
To enable the Common Criteria mode in a multi cluster setup where ICSA is already configured between the nodes, enable Common Criteria mode in each of the nodes in the following order:
In case of a cert sync failure, see.