ATM_ID: 6E7D1F72-2754-11EC-B5D1-CACB0AE4A572 ID: (Trash)/Pongo-Warhol/TLS_1.3/56096 TESTCASE_HEADLINE: Validate the supported Cipher suite in Non-XCP mode by performing an email job when device acts as a client GROUP: FEATURE: SUB_FEATURE: INPUT: Overall Precondition: Device side: 1.Make sure factory data reset performed in the device 2.IPv4 and IPv6 is enabled and active 3.Upgrade the MFP with latest software version Server Setup Required: 1. HTTPS repository with TLS 1.3 protocol should be configured and enabled in Ubuntu server 2. Apache webserver installed and configured to create a web site to be used for HTTP/HTTPS (SSL) repository 3.Windows 2016 server installed and configured with following roles ADDS, ADCS, DHCP, IIS ,NPS and DNS 4. Windows 2016 server configured and installed with Exchange 2013 or later for Email 5.Fedora /Ubuntu Free radius installed and configured to support 802.1x 6.Nmap scanner installed in Linux server \ Switch: Cisco catalyst L2/L3 switch enabled for 802.1x authentication \ Note: For server configuration refer the supporting document PROCEDURE: 1.Open CWIS of device with <device IP> and Login as admin User. 2.Navigate to Properties-> Connectivity>Protocols->SMTP 3.Configure the below setting Email Submission Enabled Email Notification - Enabled Device Email -Provide email address SMTP Server - Server Address -X.X.X.X Outgoing SMTP Port Number - 25 Connection Security - STARTTLS Outgoing SMTP Authentication - Off 4.Navigate to Security>Remote Authentication Services-> SSL/TLS Setting 5.Enable "Verify remote server certificate" and enable TLS 1.3 6.. In LUI Perform Email action 7. Observe wireshark trace in email server by using filter 'SSL' 8. Validate the client hello packet sent from device. OUTPUT: 1..Observe wireshark traces by using filter 'SSL' 2.The following Cipher Suites should get displayed in Client Hello Packet TLS_AES_256_GCM_SHA384 <- New TLS_AES_128_GCM_SHA256 <- New TLS_CHACHA20_POLY1305_SHA256 <- New TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA 2.Mail server will respond in the TLS Server Hello –by selecting one of the offered suites 3.Email job will completed successfully PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: advanced TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: The Device supports the following Cipher Suites. SPEC_VERSION: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1633600412 MDATE: 1633600412, 1633600859 MUSER: w5XFF5T9, w5XFF5T9 AUTHOR: w5XFF5T9 ATM_MCOMMENTS: Imported from spreadsheet, Moved to Trash. HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: