ATM_ID: 6A2CBE6C-AAA9-11E8-9D68-4A3E6F1CD743 ID: Pongo-Warhol/Authentication/Remote_Authentication/36033 TESTCASE_HEADLINE: Windows 2012 R2: Kerberos Authentication with FIPS enabled and trace the log from wireshark when the FIPS is 'OFF' GROUP: FEATURE: SUB_FEATURE: INPUT: Web UI: 1.Enable device with IPV4 address 2.configure Kerberos with "windows 2012 R2" by giving server IPV4 ADDRESS in webUI (Refer 'setup' tab A11 for configuration) 3.Make sure both server and Device time should be same(Configure the SNTP in Device) 4. Ensure SSL is enabled 5.Disable FIPS and reboot the device PROCEDURE: "Windows2012 R2 server: 1. Open the wireshark 2. Filter device ip using 'ip.addr==13.61.x.x' 3. Run the Wireshark trace while authentication on the device LUI as Kerberos user \ LUI: 1. Click login button as guest user 2. Enter the username as "user1@DomainName.com" (Eg:user1@smartcard.com) and password as 'wel@123' in the appeared authentication prompt 3. View the trace in windows2012R2 server" OUTPUT: 1. user1 is logged-in into the deivce 2. Wireshark trace is displayed with complaint cipher suites : 3DES and AES and also with non-complaint cipher suites: DES and RC4 PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: 3-02-17 Authentication_K1.0.4_E SPEC_VERSION: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1535450524 MDATE: 1535450524 MUSER: w4y5hbch AUTHOR: w4y5hbch ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: TC_WEIGHTAGE: