An indication of whether or not the proxy device is
operating in FIPS (Federal Information Processing
Standards) approved mode.
If 'true', the proxy device is operating in FIPS mode.
When the device operates in FIPS mode, only approved
cryptographic algorithms and key strengths are enabled.
Authentication and other security requirements of FIPS
will also be enforced in this mode.