Preview Tool

Cisco Bug: CSCvv30267 - Radius using md5 authentication is not supported by FIPS standard. Add CLI warning if configured.

Last Modified

Aug 26, 2020

Products (1)

  • Cisco Nexus 5000 Series Switches

Known Affected Releases


Description (partial)

MD5 hashing does not meet the criteria for FIPS authentication standards.  When configuring certain features such as Radius with MD5 authentication along with FIPS, a crash is forced on purpose.

Radius will trigger an HA policy reset:

  Reason: Reset triggered due to HA policy of Reset
  System version: 7.3(3)N1(1)
  Service: Radius Daemon hap reset

Radius is used for PAP/CHAP authentication and 'fips mode enable' is present in the config.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.