Enabling the FIPS mode turns on the cipher suites that comply with FIPS. Thus, any secure communication to or from the NSX Edge uses cryptographic algorithms or protocols that are allowed by FIPS.
Depending on your requirements, you can enable FIPS on some or all of your NSX Edge appliances. FIPS-enabled NSX Edge appliances can communicate with NSX Edge appliances that do not have FIPS enabled.
If a logical (distributed) router is deployed without an NSX Edge appliance, you cannot modify the FIPS mode. The logical router automatically gets the same FIPS mode as the NSX Controller cluster. If the NSX Controller cluster is NSX 6.3.0 or later, FIPS is enabled.
To change FIPS mode on a universal logical (distributed) router in a cross-vCenter NSX environment that has multiple NSX Edge appliances deployed in the primary and secondary NSX Managers, you must change FIPS mode on all the NSX Edge appliances associated with the universal logical (distributed) router on the primary NSX Manager.
If you change FIPS mode on an NSX Edge appliances with high availability enabled, FIPS will be enabled on both appliances, and the appliances will be rebooted one after the other.
If you want to change FIPS mode for a standalone edge, use the fips enable or fips disable command. For more information, refer to NSX Command Line Interface Reference.
Prerequisites
- Verify that any partner solutions are FIPS mode certified. See the VMware Compatibility Guide at http://www.vmware.com/resources/compatibility/search.php?deviceCategory=security.
- If you have upgraded from an earlier version of NSX, do not enable FIPS mode until the upgrade to NSX 6.3.0 is complete. See Understand FIPS Mode and NSX Upgrade in the NSX Upgrade Guide.
- Verify that the NSX Manager is NSX 6.3.0 or later.
- Verify that the NSX Controller cluster is NSX 6.3.0 or later.
- Verify that all host clusters running NSX workloads are prepared with NSX 6.3.0 or later.
- Verify that all NSX Edge appliances on which you want to enable FIPS are version 6.3.0 or later.
- Verify that the messaging infrastructure has status GREEN. Use the API method GET /api/2.0/nwfabric/status?resource={resourceId}, where resourceId is the vCenter Managed Object ID of a host or cluster. Look for the status corresponding to the featureId of com.vmware.vshield.vsm.messagingInfra in the response body:
<nwFabricFeatureStatus> <featureId>com.vmware.vshield.vsm.messagingInfra</featureId> <updateAvailable>false</updateAvailable> <status>GREEN</status> <installed>true</installed> <enabled>true</enabled> <allowConfiguration>false</allowConfiguration> </nwFabricFeatureStatus>
Procedure
What to do next
Optionally, Change FIPS Mode and TLS Settings on NSX Manager.