<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco SNA (Stealthwatch) error in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/cisco-sna-stealthwatch-error/m-p/5308374#M1206</link>
    <description>&lt;P&gt;You're absolutely right to proceed cautiously with enabling FIPS mode and Common Criteria libraries on Cisco Secure Network Analytics (SNA) — especially when working with multiple appliances like Flow Collectors and the Manager (SMC).&lt;/P&gt;&lt;P&gt;Based on your situation:&lt;/P&gt;&lt;P&gt;You’ve enabled FIPS mode on both Flow Collectors&lt;/P&gt;&lt;P&gt;You have not yet enabled FIPS mode on the SNA Manager&lt;/P&gt;&lt;P&gt;The Flow Collectors show "Config channel down"&lt;/P&gt;&lt;P&gt;You're concerned about losing comms with the SMC if you enable FIPS there&lt;/P&gt;&lt;P&gt;Let's address your questions directly.&lt;/P&gt;&lt;P&gt;Q1: Do I need to enable FIPS mode on the SNA Manager to get the flow collectors connected again?&lt;BR /&gt;Yes.&lt;BR /&gt;FIPS mode changes the underlying TLS encryption requirements, and all appliances in the SNA deployment must match the encryption mode for the Config Channel (control channel) to work properly.&lt;/P&gt;&lt;P&gt;If FIPS is enabled only on Flow Collectors, but not on the SMC, you’ll get:&lt;/P&gt;&lt;P&gt;Config channel down or TLS handshake failure errors&lt;/P&gt;&lt;P&gt;To fix this:&lt;/P&gt;&lt;P&gt;You must also enable FIPS mode on the SMC so it uses the same crypto libraries as the Flow Collectors&lt;/P&gt;&lt;P&gt;All connected components (FCs, FTDs, UDP Directors, etc.) must match the FIPS setting of the SMC&lt;/P&gt;&lt;P&gt;Q2: Is there a way to disable FIPS mode from the console (CLI)?&lt;BR /&gt;No — not directly or easily.&lt;BR /&gt;Once FIPS mode is enabled on SNA appliances (Manager or Collectors), it cannot be disabled via CLI or UI. It is considered a one-way operation, per Cisco's security model.&lt;/P&gt;&lt;P&gt;Disabling FIPS requires a reimage of the appliance.&lt;/P&gt;&lt;P&gt;This is by design for compliance with Common Criteria and FIPS 140-2 certification standards. Once enabled, it hardens the system, disables non-FIPS cryptography, and enforces stricter crypto policies.&lt;/P&gt;&lt;P&gt;What Should You Do Now?&lt;BR /&gt;Safe path forward:&lt;BR /&gt;Back up your SNA Manager config (if not already).&lt;/P&gt;&lt;P&gt;Enable FIPS mode on the SNA Manager:&lt;/P&gt;&lt;P&gt;Either via the GUI under System → Configuration → Security&lt;/P&gt;&lt;P&gt;Or via the CLI using:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;sudo /lancope/bin/configure_fips_mode.sh --enable&lt;BR /&gt;Reboot the SMC&lt;/P&gt;&lt;P&gt;Once the SMC comes back up in FIPS mode, the Flow Collectors should reconnect and the Config Channel should come back up.&lt;/P&gt;&lt;P&gt;Optional: Validate Status After Enabling FIPS&lt;BR /&gt;Check FIPS mode on each appliance:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;cat /etc/system-fips&lt;BR /&gt;Check status of the Config Channel:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;sudo /lancope/bin/queryApplianceStatus.sh&lt;BR /&gt;Or from the SMC GUI:&lt;/P&gt;&lt;P&gt;Go to Central Management &amp;gt; Appliances&lt;/P&gt;&lt;P&gt;Look for “Connected” or “Config channel down” under Appliance Status&lt;/P&gt;&lt;P&gt;Summary&lt;BR /&gt;Question Answer&lt;BR /&gt;Do I need to enable FIPS on the SNA Manager for flow collectors to connect? &lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Yes — all components must match encryption mode&lt;BR /&gt;Can I disable FIPS from the CLI? &lt;span class="lia-unicode-emoji" title=":cross_mark:"&gt;❌&lt;/span&gt; No — requires full reimage&lt;BR /&gt;Will enabling FIPS on SMC bring back config channel? &lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Yes, if certs and crypto settings match&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jul 2025 16:00:40 GMT</pubDate>
    <dc:creator>wajidhassan</dc:creator>
    <dc:date>2025-07-11T16:00:40Z</dc:date>
    <item>
      <title>Cisco SNA (Stealthwatch) error</title>
      <link>https://community.cisco.com/t5/security-analytics/cisco-sna-stealthwatch-error/m-p/5054581#M1043</link>
      <description>&lt;P&gt;I'm in the process of configuring SNA Manager and flow collectors and applying the Best practice guide. I've enabled FIPS mode and Common Criteria Encryption libraries on SNA Flow collectors after uploading the correct certs to both SNA Manager and flow collectors. As soon as both of the flow collectors came back up, both of the flow collectors have Config channel down appliance status. I haven't enabled FIPS on SNA Manager yet in fear that I might get the same error.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Questions I have&lt;/P&gt;&lt;P&gt;- Do I need to enable FIPS mode on SNA manager to get the connected appliance status on flow collectors?&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Is there a way to disable FIPS mode from console?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-S&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SDhaliwal_0-1712007238097.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/214633iAAE59A3FFBD2D23F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SDhaliwal_0-1712007238097.png" alt="SDhaliwal_0-1712007238097.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 21:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/cisco-sna-stealthwatch-error/m-p/5054581#M1043</guid>
      <dc:creator>SDhaliwal</dc:creator>
      <dc:date>2024-04-01T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco SNA (Stealthwatch) error</title>
      <link>https://community.cisco.com/t5/security-analytics/cisco-sna-stealthwatch-error/m-p/5308374#M1206</link>
      <description>&lt;P&gt;You're absolutely right to proceed cautiously with enabling FIPS mode and Common Criteria libraries on Cisco Secure Network Analytics (SNA) — especially when working with multiple appliances like Flow Collectors and the Manager (SMC).&lt;/P&gt;&lt;P&gt;Based on your situation:&lt;/P&gt;&lt;P&gt;You’ve enabled FIPS mode on both Flow Collectors&lt;/P&gt;&lt;P&gt;You have not yet enabled FIPS mode on the SNA Manager&lt;/P&gt;&lt;P&gt;The Flow Collectors show "Config channel down"&lt;/P&gt;&lt;P&gt;You're concerned about losing comms with the SMC if you enable FIPS there&lt;/P&gt;&lt;P&gt;Let's address your questions directly.&lt;/P&gt;&lt;P&gt;Q1: Do I need to enable FIPS mode on the SNA Manager to get the flow collectors connected again?&lt;BR /&gt;Yes.&lt;BR /&gt;FIPS mode changes the underlying TLS encryption requirements, and all appliances in the SNA deployment must match the encryption mode for the Config Channel (control channel) to work properly.&lt;/P&gt;&lt;P&gt;If FIPS is enabled only on Flow Collectors, but not on the SMC, you’ll get:&lt;/P&gt;&lt;P&gt;Config channel down or TLS handshake failure errors&lt;/P&gt;&lt;P&gt;To fix this:&lt;/P&gt;&lt;P&gt;You must also enable FIPS mode on the SMC so it uses the same crypto libraries as the Flow Collectors&lt;/P&gt;&lt;P&gt;All connected components (FCs, FTDs, UDP Directors, etc.) must match the FIPS setting of the SMC&lt;/P&gt;&lt;P&gt;Q2: Is there a way to disable FIPS mode from the console (CLI)?&lt;BR /&gt;No — not directly or easily.&lt;BR /&gt;Once FIPS mode is enabled on SNA appliances (Manager or Collectors), it cannot be disabled via CLI or UI. It is considered a one-way operation, per Cisco's security model.&lt;/P&gt;&lt;P&gt;Disabling FIPS requires a reimage of the appliance.&lt;/P&gt;&lt;P&gt;This is by design for compliance with Common Criteria and FIPS 140-2 certification standards. Once enabled, it hardens the system, disables non-FIPS cryptography, and enforces stricter crypto policies.&lt;/P&gt;&lt;P&gt;What Should You Do Now?&lt;BR /&gt;Safe path forward:&lt;BR /&gt;Back up your SNA Manager config (if not already).&lt;/P&gt;&lt;P&gt;Enable FIPS mode on the SNA Manager:&lt;/P&gt;&lt;P&gt;Either via the GUI under System → Configuration → Security&lt;/P&gt;&lt;P&gt;Or via the CLI using:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;sudo /lancope/bin/configure_fips_mode.sh --enable&lt;BR /&gt;Reboot the SMC&lt;/P&gt;&lt;P&gt;Once the SMC comes back up in FIPS mode, the Flow Collectors should reconnect and the Config Channel should come back up.&lt;/P&gt;&lt;P&gt;Optional: Validate Status After Enabling FIPS&lt;BR /&gt;Check FIPS mode on each appliance:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;cat /etc/system-fips&lt;BR /&gt;Check status of the Config Channel:&lt;/P&gt;&lt;P&gt;bash&lt;BR /&gt;Copy&lt;BR /&gt;Edit&lt;BR /&gt;sudo /lancope/bin/queryApplianceStatus.sh&lt;BR /&gt;Or from the SMC GUI:&lt;/P&gt;&lt;P&gt;Go to Central Management &amp;gt; Appliances&lt;/P&gt;&lt;P&gt;Look for “Connected” or “Config channel down” under Appliance Status&lt;/P&gt;&lt;P&gt;Summary&lt;BR /&gt;Question Answer&lt;BR /&gt;Do I need to enable FIPS on the SNA Manager for flow collectors to connect? &lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Yes — all components must match encryption mode&lt;BR /&gt;Can I disable FIPS from the CLI? &lt;span class="lia-unicode-emoji" title=":cross_mark:"&gt;❌&lt;/span&gt; No — requires full reimage&lt;BR /&gt;Will enabling FIPS on SMC bring back config channel? &lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Yes, if certs and crypto settings match&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 16:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/cisco-sna-stealthwatch-error/m-p/5308374#M1206</guid>
      <dc:creator>wajidhassan</dc:creator>
      <dc:date>2025-07-11T16:00:40Z</dc:date>
    </item>
  </channel>
</rss>

