ATM_ID: 4BF2825A-5803-11E7-A13E-609CD30A4651 MFF: PLANNEDTIMESTAFF: ID: DPQA_Regression_Security/Testcases/FS_41.005_IPSec/95298 TESTCASE_HEADLINE: test SMTP on windows 2012 version using IPV4 with IKE Phase1 KEY LIFETIME 24 hours DH group 14 Security as ESP, Phase2 KEY LIFETIME 24 hours perfect forwarding as Grp14, SHA256 as HASH algorithm and AES as Encryption. GROUP: FEATURE: SUB_FEATURE: INPUT:
1. Device is upgraded with the latest SW version.
2. Windows 2012 server and the MFD are placed in the same network.
3. Wireshark is installed in the server PC.
4. User has logged onto the Device CWIS using ip address of the device.
5. User is currently in ipsec page by navigating through Properties->Security->IPSEC
6. SMTP server is available for test.
PROCEDURE:
1. Under IPSec page, click on "Host Groups" tab and click on "ADD New Host Group" button to open "NEW HOST GROUP" page.
2. Provide "SMTP" as Name under Group name, Under Address List, select IPv4 radio button and select "Specific" under Address Type and provide the ipv4 address of the Windows 2012 server PC under IP address and save the settings.
3. Under IPSec page, click on "Protocol Groups" tab and click on "ADD New Protocol Group" button to open "NEW Protocol GROUP" page.
4. Provide "SMTP Group" as the "Group Name" select "SMTP" under the list of protocols and save the settings.
5. Under Actions tab, click on "Add New Action" button to create a new action, in the next page, provide a name for this action and select IKE as the Keying Method and provide Preshared key passphrase as "password" and click on Next button, in the next page, give key life time for phase1 as 24 hours and DH Group as group 14, IPSEC Security as ESP and phase2 lifetime as 24 hours seconds, perfect forward secracy as Grp14 Hash algorithm as SHA256 and AES as encryption and save the settings.
6. Under the Security policies tab, select the host group created in step2 above, select the protocol group created in step4 and select the action created in step5 and click on ADDpolicy button to add the policy.
7. Run the below command as administrator from the command prompt
netsh advfirewall consec add rule name="smtp" endpoint1=$server_ipv4 endpoint2=$printer_ipv4 port1=25 port2=any protocol=tcp auth1=computerpsk auth1psk="password" qmsecmethods=esp:sha256-AES256+1440min qmpfs=dhgroup14 action=requireinrequireout
8. Open the Windows firewall and click on Advanced settings option under firewall. Select Advanced settings to open Windows firewall with Advanced settings and navigate to Windows Firewall Setting->IPSEC settings and click on Customize under IPSEC defaults.
9. Check to make sure the Main Mode and Quick Mode parameters match. For Key exchange (Main Mode), press Customize Change the 'Key exchange (Main Mode)' to 'Advanced', click 'Customize...'.Make sure that the security methods match the 'Hash' and 'Encryption' dropdown choices are the same as set on the printer. When finished select either the ‘OK’ or ‘Cancel’ button
10. From the device WEBUI, IPSEC page, enable IPSEC on the device
12. From device WEBUI, navigate to Properties->Connectivity->Setup and click Edit on SMTP link to open SMTP(Email) page. "Specify SMTP Server manually" select ipv4 address and enter the ipv4 address and port number of the SMTP server and save the settings.
13. Send a mail from the device LUI and verify if the mail transfer is successful and ESP packets gets transferred once E-mail is sent successfully.
OUTPUT:
1. E-mail must be successfully sent to the SMTP server from the device.
2. ESP packets are listed once E-mail is submitted from the printer.
PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC_VERSION: SPEC_TAG: 41.005.103.04, 41.005.153 ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1498215684 MDATE: 1498215684 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: CF0FF543-7686-1014-B07E-AE1857619FB6, 1A66AA56-5658-11E7-94FC-0DE7D40A4651 ATM_REQCOUNT: 2 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: