ATM_ID: 6A3C819E-AAA9-11E8-9D68-4A3E6F1CD743 ID: Pongo-Warhol/Authentication/Remote_Authentication/36048 TESTCASE_HEADLINE: Windows 2016 : Kerberos Authentication with FIPS enabled and trace the log from wireshark when the FIPS is 'ON' GROUP: FEATURE: SUB_FEATURE: INPUT: In Window2016 server: 1. Create a user credential with username as 'User1' and password as 'wel@123' Web UI: 1.Enable device with IPV4 address 2.configure Kerberos with "windows 2016" by giving server IPV4 ADDRESS in webUI (Refer 'setup' tab A11 for configuration) 3.Make sure both server and Device time should be same(Configure the SNTP in Device) 4. Ensure SSL is enabled 5.enable FIPS and reboot the device PROCEDURE: "Windows2016 server: 1. Open the wireshark 2. Filter device ip using 'ip.addr==13.61.x.x' 3. Run the Wireshark trace while authentication on the device LUI as Kerberos user \ LUI: 1. Click login button as guest user 2. Enter the username as "user1@DomainName.com" (Eg:user1@smartcard.com) and password as 'wel@123' in the appeared authentication prompt 3. View the trace in windows2016 R2 server" OUTPUT: 1. User1 is logged-in into the deivce 2. Wireshark teace is displayed with complaint cipher suites : 3DES and AES 3. Wireshark trace should not displayed with the non-complaint cipher suites: DES and RC4 PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: 3-02-17 Authentication_K1.0.4_E SPEC_VERSION: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1535450524 MDATE: 1535450524 MUSER: w4y5hbch AUTHOR: w4y5hbch ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: TC_WEIGHTAGE: