ATM_ID: 4BBFDF12-5803-11E7-A13E-609CD30A4651 MFF: PLANNEDTIMESTAFF: ID: DPQA_Regression_Security/Testcases/FS_41.005_IPSec/95254 TESTCASE_HEADLINE: test LPD on windows 2008 version using IPV4 with IKE Phase1 KEY LIFETIME 5 minutes DH group 14 IP Security as ESP, Phase2 KEY LIFETIME 5 minutes perfect forwarding as None, sHA256 as HASH algorithm and 3DES as Encryption. GROUP: FEATURE: SUB_FEATURE: INPUT:

  

  1. Device is upgraded with the latest SW version.

  2. Windows 2008 server and the MFD are placed in the same network.

  3. Wireshark is installed in the server PC.

  4. User has logged onto the Device CWIS using ip address of the device.

  5. User is currently in ipsec page by navigating through Properties->Security->IPSEC

PROCEDURE:

  

  1. Under IPSec page, click on "Host Groups" tab and click on "ADD New Host Group" button to open "NEW HOST GROUP" page.

  2. Provide "LPD" as Name under Group name, Under Address List, select IPv4 radio button and select "Specific" under Address Type and provide the ip address of the Windows 2008 server PC under IP address and save the settings.

  3. Under IPSec page, click on "Protocol Groups" tab and click on "ADD New Protocol Group" button to open "NEW Protocol GROUP" page.

  4. Provide "LPD Group" as the "Group Name" select "LPR Print" under the list of protocols and save the settings.

  5. Under Actions tab, click on "Add New Action" button to create a new action, in the next page, provide a name for this action and select IKE as the Keying Method and provide Preshared key passphrase as "password" and click on Next button, in the next page, give key life time for phase1 as 300 seconds and DH Group as group 14, IPSEC Security as ESP and phase2 lifetime as 300 seconds, perfect forward secracy as None, Hash algorithm as SHA256 and 3DES as encryption and save the settings.

  6. Under the Security policies tab, select the host group created in step2 above, select the protocol group created in step4 and select the action created in step5 and click on ADDpolicy button to add the policy.

  7. Start the command prompt as administrator and run the following command :
    netsh advfirewall consec add rule name="lpr" endpoint1=$server_ipv4 endpoint2=$printer_ipv4 port1=515 port2=any protocol=tcp auth1=computerpsk auth1psk="password" qmsecmethods=esp:sha256-3DES+5min qmpfs=dhgroup14 action=requireinrequireout

  8. Open the Windows firewall and click on Advanced settings option under firewall. Select Advanced settings to open Windows firewall with Advanced settings and navigate to Windows Firewall Setting->IPSEC settings and click on Customize under IPSEC defaults.

  9. Check to make sure the Main Mode and Quick Mode parameters match. For Key exchange (Main Mode), press Customize Change the 'Key exchange (Main Mode)' to 'Advanced', click 'Customize...'.Make sure that the security methods match the 'Hash' and 'Encryption' dropdown choices are the same as set on the printer. When finished select either the ‘OK’ or ‘Cancel’ button

  10. From the device WEBUI, IPSEC page, enable IPSEC on the device

  11. perform LPR job from the device and verify the lpr job is successful and ESP packets are getting listed in the wireshark trace

OUTPUT:

  

  1. LPR job submitted from the server PC must be successful.

  2. From the wireshark trace, filter for ESP packets and the ESP packets must be listed

PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC_VERSION: SPEC_TAG: 41.005.103.04, 41.005.153 ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1498215683 MDATE: 1498215683 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: CF0FF543-7686-1014-B07E-AE1857619FB6, 1A66AA56-5658-11E7-94FC-0DE7D40A4651 ATM_REQCOUNT: 2 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: