hp-support-head-portlet

- ${title}
hp-contact-secondary-navigation-portlet

- ${title}
hp-share-print-widget-portlet

- ${title}
hp-concentra-wrapper-portlet

- ${title}
HP Web Jetadmin - Enable FIPS on the HP Web Jetadmin Server
You can enable Federal Information Processing Standard (FIPS) only after you upgrade to HP Web Jetadmin 10.4 or later and then make some required changes to the settings in HP Web Jetadmin. You must follow the instructions provided in this topic in the order specified.
The MD5 and DES protocols are blocked after FIPS is enabled. Communication over SNMPv1/SNMPv2 is still possible after FIPS is enabled.
Upgrade to HP Web Jetadmin 10.4 or later
Use the following steps to upgrade HP Web Jetadmin:
-
On the HP Web Jetadmin server, go to the HP Software Depot for HP Web Jetadmin website.
-
Click the Request button. The HP account login page opens.
-
Choose one of the following options:
-
If you already have an HP account, log in with your credentials.
-
If you do not have an HP account, click the Sign up link at the bottom of the page. Follow the instructions to create an HP account, and then log in.
-
-
On the HP Web Jetadmin page, follow the instructions to download the current software.
-
Double-click the EXE file.
-
Follow the instructions in the wizard.
-
If the installation stops with a warning that a restart is required, restart the HP Web Jetadmin server. Launch the installer again to continue the installation.
-
When the installation is complete, click the Finish button.
Make the required changes to the settings in HP Web Jetadmin and on the devices
If you omit the following steps, HP Web Jetadmin might not be able to communicate with the devices after FIPS is enabled. HP Web Jetadmin displays a status of Device Communication Error for these devices.
-
If HP Web Jetadmin has already discovered devices by using an SNMPv3 credential that specifies the MD5 and DES protocols, SNMP communication with those devices will not work after FIPS is enabled. The SNMPv3 credential for these devices must be changed to the SHA-1 and AES-128 protocols. However, you cannot use HP Web Jetadmin to determine if the SNMPv3 credential for the devices uses the MD5 and DES protocols.
Use the following steps to update the SNMPv3 credential on all of the devices that use SNMPv3:
-
In the Device Management navigation pane, right-click Configuration, and then select Create configuration template. The Create Device Configuration Template wizard starts.
-
Select the device models to configure, and then click the right arrow button.
-
Select the network cards to configure, and then click the right arrow button.
-
Click the Next button. The Specify template options page opens.
-
In the Name field, enter a name for the template (up to 48 characters).
-
In the Device settings navigation pane, go to Security > SNMP Version Access Control.
-
Select the Modify SNMPv3 option.
-
In the Current SNMPv3 Credential section, enter the user name, authentication protocol and passphrase, and privacy protocol and passphrase that are currently configured for SNMPv3. The current SNMPv3 credentials are required.
-
In the New SNMPv3 Credential section, select SHA-1 from the Authentication Protocol list, and select AES-128 from the Privacy Protocol list.
-
If required, enter the new values for the user name, authentication passphrase, and privacy passphrase.
CAUTION:To change the authentication and privacy passphrases, the current passphrases must be specified in the device configuration template even if global SNMPv3 credentials are stored in HP Web Jetadmin. If the current passphrases are not specified, the configuration fails.
-
Click the Next button. The Confirm page opens.
-
Verify that the information is correct, and then click the Create Template button. The Results page opens.
-
Click the Done button.
-
In the Device Management navigation pane, right-click Configuration, and then select Apply configuration template. The Apply Device Configuration Template wizard starts.
-
Select the device configuration template that you just created from the list, and then click the Next button. The Select devices page opens.
-
From the Available devices list, select the devices to configure, and then click the > button.
-
Click the Next button. The Confirm page opens.
-
Verify that the information is correct, and then click the Apply Template button. The Results page opens.
-
Click the Done button.
-
-
Use the following steps to delete the SNMPv3 global credentials that use the MD5 and DES protocols:
-
From the top menu bar, go to Tools > Options > Shared > Credentials > Device > SNMPv3.
-
Select the SNMPv3 credential that uses the MD5 and DES protocols from the list, and then click the Remove button. The Confirm Delete window opens.
-
Click the Yes button.
-
Repeat these steps for each SNMPv3 credential that uses the MD5 and DES protocols.
-
-
Run a discovery to rediscover all of the SNMPv3-configured devices.
-
Trap forwarding that is configured to use SNMPv3 credentials with the MD5 and DES protocols does not work after FIPS is enabled. Use one of the following procedures to update the alert subscriptions that are configured to forward SNMP traps to a server using SNMPv3 credentials with the SHA-1 and AES-128 protocols.
Note:Alert subscriptions that are configured to only write alerts to the alert history log or to send email notifications when alerts occur do not need to be updated.
Option 1: Update the alert subscriptions that were created by using an alert subscription template that is configured to forward SNMP traps
-
In the Device Management navigation pane, go to Alerts > All Subscriptions.
-
In the All Subscriptions pane, click the Expand all button to display the details for each alert subscription.
-
To identify the alert subscription templates that must be updated, look for alerts that have SNMPv3 Trap Forwarding in the Notification Type column and have Linked in the Linked to Template column. The name of the alert subscription template is shown in the Subscription Name column.
-
In the Device Management navigation pane, go to Alerts > Templates.
-
In the Alerts - Subscription Templates pane, select the alert subscription template from the list, and then click the Edit button. The Edit Subscription Template wizard starts.
-
Click the Next button until the Specify notification settings page opens.
-
In the SNMPv3 credential section, select SHA-1 from the Authentication protocol list, and select AES-128 from the Privacy protocol list.
-
If required, enter the new values for the user name, authentication passphrase, and privacy passphrase.
-
Click the Next button until the Confirm page opens.
-
Verify that the information is correct, and then click the Save Template button. The Results page opens.
-
Click the Done button.
All of the alert subscriptions that are linked to this alert subscription template are automatically updated with the new SNMPv3 credentials.
-
Repeat these steps for each alert subscription template.
Option 2: Update the alert subscriptions that were created without using an alert subscription template and are configured to forward SNMP traps
-
In the Device Management navigation pane, go to Alerts > All Subscriptions.
-
In the All Subscriptions pane, select the alert subscription from the list, and then click the Edit Subscription button. The Edit Subscription wizard starts.
-
Click the Next button until the Specify notification settings page opens.
-
In the SNMPv3 credential section, select SHA-1 from the Authentication protocol list, and select AES-128 from the Privacy protocol list.
-
If required, enter the new values for the user name, authentication passphrase, and privacy passphrase.
-
Click the Next button until the Confirm page opens.
-
Verify that the information is correct, and then click the Edit Subscription button. The Results page opens.
-
Click the Done button.
-
Repeat these steps for each alert subscription that was created without using an alert subscription template.
-or-
If any future changes are made to the alert subscriptions, all of the alert subscriptions must be changed. To prevent this in the future, HP recommends that you use the following steps to create new alert subscriptions that are linked to alert subscription templates:
-
In the Device Management navigation pane, go to Alerts > All Subscriptions.
-
In the All Subscriptions pane, select the alert subscription from the list, and then click the Unsubscribe button. The Delete Alert Subscriptions wizard starts.
-
Click the Unsubscribe button. The Results page opens.
-
Click the Done button.
-
In the Device Management navigation pane, go to Alerts > Templates.
-
In the Alerts - Subscription Templates pane, select the alert subscription template from the list, and then click the Apply button. The Apply Alert Subscription Template wizard starts.
Note:If an alert subscription template is not available, create an alert subscription template that meets your specific needs.
-
From the Available devices list, select the devices, and then click the > button.
-
Click the Next button.
-
Choose one of the following options:
-
To link the selected alert subscription template to this alert subscription, select the Link template to subscription option. Changes that are made to the selected alert subscription template are automatically applied to the devices that are associated with this alert subscription.
-
To create an alert subscription that is not linked to the selected alert subscription template, select the Do NOT link template to subscription option, and then enter a name for this alert subscription in the Subscription name field. Changes that are made to the alert subscription template are not applied to the devices that were previously configured with this alert subscription template.
-
-
Click the Next button. The Confirm page opens.
-
Verify that the information is correct, and then click the Apply Template button. The Results page opens.
-
Click the Done button.
-
Repeat these steps for each alert subscription that was created without using an alert subscription template.
-
-
On the client machines where the HP Web Jetadmin client is launched, use the following steps to enable the TLS protocol:
-
Open a supported web browser.
-
Go to Tools > Internet options, and then click the Advanced tab.
-
Scroll down to the Security section, and then select the check boxes for one or more of the TLS versions (TLS 1.0, TLS 1.1, and TLS 1.2).
-
-
Use the following steps to verify that the devices are configured to communicate with the TLS protocol:
-
Select the device from any device list.
-
On the Config tab, go to Network > Mgmt Protocol.
-
Verify that any version of TLS (TLS 1.0, TLS 1.1, and TLS 1.2) is enabled.
-
Repeat these steps for each device.
-
-
Use the following steps to enable FIPS-140 mode on the devices. Enabling FIPS-140 mode affects only the following device configuration options:
-
SNMP Version Access Control configuration option: The SHA-1 authentication protocol and AES-128 privacy protocol must be configured.
-
Mgmt Protocol configuration option: The TLS 1.0, TLS 1.1, or TLS 1.2 protocol must be enabled.
Tip:The following steps are not required. However, you can use these steps to troubleshoot any FIPS-related problems.
-
Select the device from any device list.
-
On the Config tab, go to Security > FIPS-140 Mode.
-
Select the Enabled option.
-
Click the Apply button.
-
Repeat these steps for each device.
If any of the following device configuration options are configured on a device, enabling FIPS-140 mode fails for that device:
-
SNMP Version Access Control configuration option: The MD5 authentication and DES privacy protocols must not be specified.
-
IPsec/Firewall Policy configuration option: The DES-CBC-MD5 algorithm must not be specified for the Kerberos setting.
-
Upload Jetdirect Certificate configuration option: Certificates must not be signed by using MD5 or earlier (MD2 or MD4).
-
Upload CA Certificate configuration option: Certificates must not be signed by using MD5 or earlier (MD2 or MD4).
-
Mgmt Protocol configuration option: The SSL 3.0 or earlier protocol must not be enabled.
HP Web Jetadmin does not report the exact reason for the failure. However, if you use the device HP Embedded Web Server to enable FIPS-140 mode, the HP Embedded Web Server does report the exact reason for the failure. The FIPS-140 mode setting is available in the HP Embedded Web Server from the Networking tab > Security link > Settings page.
-
Enable FIPS on the HP Web Jetadmin server
Use the following steps to enable FIPS on the HP Web Jetadmin server:
-
Stop the following services. These services must be stopped in the specified order.
-
HPWSProAdapter
-
HPWJAService
-
mssql$HPWJA
-
-
Use the following steps to enable FIPS on the HP Web Jetadmin server as a local security policy:
Tip:For more information about the System cryptography setting, see the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing document. This document is available from the Microsoft Documentation website.
-
Go to Control Panel > Administrative Tools > Local Security Policy > Local Policies > Security Options.
-
Right-click System cryptography: Use FIPS compliant algorithms for encryption, hashing and signing, and then select Properties.
-
On the Local Security Setting tab, select the Enabled option, and then click the OK button.
-
-
Start the following services. These services must be started in the specified order.
-
mssql$HPWJA
-
HPWJAService
-
HPWSProAdapter
-
-
Use the following steps to verify that HP Web Jetadmin can communicate with all of the devices:
-
In the All Devices list, look for any devices that have Device Communication Error in the Status column.
-
Verify that you can use HP Web Jetadmin to configure a device.
-
In the All Devices list, right-click a device, and then select Refresh Selection (Full). Verify that the refresh completes.
If any devices have a status of Device Communication Error, you cannot use HP Web Jetadmin to configure a device, or the Refresh Selection (Full) fails, access the device HP Embedded Web Server, and then verify the following settings:
-
Click the Networking tab, and then click the Network Settings link. If SNMPv3 is enabled, verify that the authentication protocol is SHA n and the privacy protocol is AES.
-
Click the Security tab, and then click the Certificate Management link. Select a certificate, and then click the View Details button. Verify that the self-signed certificate uses a signature algorithm other than MD5. Repeat this step for each self-signed certificate.
-
hp-feedback-input-portlet

- ${title}
hp-feedback-banner-portlet

- ${title}
hp-country-locator-portlet

- ${title}

hp-detect-load-my-device-portlet

- ${title}
hp-hero-support-search

- ${title}