Guest

Preview Tool

Cisco Bug: CSCvv30267 - Radius using md5 authentication is not supported by FIPS standard. Add CLI warning if configured.

Last Modified

Aug 26, 2020

Products (1)

  • Cisco Nexus 5000 Series Switches

Known Affected Releases

7.3(3)N1(1)

Description (partial)

Symptom:
MD5 hashing does not meet the criteria for FIPS authentication standards.  When configuring certain features such as Radius with MD5 authentication along with FIPS, a crash is forced on purpose.

Radius will trigger an HA policy reset:

  Reason: Reset triggered due to HA policy of Reset
  System version: 7.3(3)N1(1)
  Service: Radius Daemon hap reset

Conditions:
Radius is used for PAP/CHAP authentication and 'fips mode enable' is present in the config.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.