Cisco Bug: CSCvv30267 - Radius using md5 authentication is not supported by FIPS standard. Add CLI warning if configured.
Aug 26, 2020
- Cisco Nexus 5000 Series Switches
Known Affected Releases
Symptom: MD5 hashing does not meet the criteria for FIPS authentication standards. When configuring certain features such as Radius with MD5 authentication along with FIPS, a crash is forced on purpose. Radius will trigger an HA policy reset: Reason: Reset triggered due to HA policy of Reset System version: 7.3(3)N1(1) Service: Radius Daemon hap reset Conditions: Radius is used for PAP/CHAP authentication and 'fips mode enable' is present in the config.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases