ATM_ID: 4BD76614-5803-11E7-A13E-609CD30A4651 MFF: PLANNEDTIMESTAFF: ID: DPQA_Regression_Security/Testcases/FS_41.005_IPSec/95272 TESTCASE_HEADLINE: test http on windows 7 version IPV4 with IKE Phase1 KEY LIFETIME 24 hours DH group 2 Security as ESP, Phase2 KEY LIFETIME 24 hours perfect forwarding as None, SHA256 as HASH algorithm and 3DES as Encryption. GROUP: FEATURE: SUB_FEATURE: INPUT:

  

  1. Device is upgraded with the latest SW version.

  2. Windows 7 PC and the MFD are placed in the same network.

  3. Wireshark is installed in the server PC.

  4. User has logged onto the Device CWIS using ip address of the device.

  5. User is currently in ipsec page by navigating through Properties->Security->IPSEC

PROCEDURE:

  

  1. Under IPSec page, click on "Host Groups" tab and click on "ADD New Host Group" button to open "NEW HOST GROUP" page.

  2. Provide "LPD" as Name under Group name, Under Address List, select IPv6 radio button and select "Specific" under Address Type and provide the ipv6 address of the Windows 7 PC under IP address and save the settings.

  3. Under IPSec page, click on "Protocol Groups" tab and click on "ADD New Protocol Group" button to open "NEW Protocol GROUP" page.

  4. Provide "HTTP Group" as the "Group Name" select "http and https webserver" under the list of protocols and save the settings.

  5. Under Actions tab, click on "Add New Action" button to create a new action, in the next page, provide a name for this action and select IKE as the Keying Method and provide Preshared key passphrase as "password" and click on Next button, in the next page, give key life time for phase1 as 24 hours and DH Group as group 2 IPSEC Security as ESP and phase2 lifetime as 24 hours perfect forward secracy as None, Hash algorithm as SHA256 and 3DES as encryption and save the settings.

  6. Under the Security policies tab, select the host group created in step2 above, select the protocol group created in step4 and select the action created in step5 and click on ADDpolicy button to add the policy.

  7. Run the below command as administrator from command prompt
    netsh advfirewall consec add rule name="http" endpoint1=$server_ipv4 endpoint2=$printer_ipv4 port1=80,443 port2=any protocol=tcp auth1=computerpsk auth1psk="password" qmsecmethods=esp:sha256-3DES+1440min qmpfs=dhgroup2 action=requireinrequireout

  8. Open the Windows firewall and click on Advanced settings option under firewall. Select Advanced settings to open Windows firewall with Advanced settings and navigate to Windows Firewall Setting->IPSEC settings and click on Customize under IPSEC defaults.

  9. Check to make sure the Main Mode and Quick Mode parameters match. For Key exchange (Main Mode), press Customize Change the 'Key exchange (Main Mode)' to 'Advanced', click 'Customize...'.Make sure that the security methods match the 'Hash' and 'Encryption' dropdown choices are the same as set on the printer. When finished select either the ‘OK’ or ‘Cancel’ button

  10. From the device WEBUI, IPSEC page, enable IPSEC on the device

  12. open device WEBUI using ip address of the device from the device and verify the web browser can be opened successfully and ESP packets are getting listed in the wireshark trace

OUTPUT:

  

  1. Device WEBUI mus tbe opened successfully using both http and https.

  2. From the wireshark trace, filter for ESP packets and the ESP packets must be listed

PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC_VERSION: SPEC_TAG: 41.005.103.04, 41.005.153 ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1498215683 MDATE: 1498215683 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: CF0FF543-7686-1014-B07E-AE1857619FB6, 1A66AA56-5658-11E7-94FC-0DE7D40A4651 ATM_REQCOUNT: 2 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: