ATM_ID: 6077C22A-693F-11F0-90F0-C4D1B6ACCDE0 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/CCC/165347 TESTCASE_HEADLINE: IPSEC_PRE-SHARED_KEY_LENGTH GROUP: FEATURE: SUB_FEATURE: INPUT:

Verify IPsec negotiation by setting different Pre-shared Key & length

PROCEDURE:

1 Execute CO_AUTH_WEBUI_AUTHENTICATE_SA.
2 Select [Security] followed by [IPsec] from the Properties Menu on the left side of the page.3 Click [Actions] to navigate to the IP Actions page. Then click [Add New Action] button.4 Enter the following information,when done click [Next].
Name = ”Require Preshared Key 1”
Description = N/A
Keying Method = Internet Key Exchange (IKEv1)
Pre-shared Key Passphrase = ”Please use a pre-shared key of 248 characters”
5 Select the following options then click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows).
IKE Phase 1 Settings:
Key Lifetime = 86400 Seconds

IKE Phase 2 Settings:
IPsec Mode = Transport Mode
IPsec Security = BOTH
Perfect Forward Secrecy = DH Group 14 (2048-bit MODP)
Hash = SHA-256
Encryption = AES-CBC-128/256
Key Lifetime = 28800 Seconds
6 Click [Host Groups] to display the IP Host Groups page. Then click [Add New Host Group]7 Enter the following information,when done click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows)

Name = “Windows 10 Client”
Description = N/A

Set the following address options:
IPv4
Address type = Specific
IP Address = 172.16.0.102
8 Click [Security Policies] to navigate to the IPsec Policies page.9 Create a new policy. Set the following options then click [Add Policy]. (Click [OK] to respond to the settings confirmation popup which follows)
Host Groups = Windows 10 Client
Protocol Groups = All
Action = Require Preshared Key 1
10 At Windows Workstation,enable the IPsec Policy created.

Important: Please refer the Document shared to enable IPsec on Windows 10.11 Test protocol connectivity. From the Windows workstation execute the following commands:

LPR -S 172.16.0.10 -P lp <location of 16MPS.ps>
12 Retrieve Audit log. Execute CO_AUDIT_DOWNLOAD.13 Repeat from Step 4,by modifying the Pre-shared Key Passphrase with the minimum length.

Pre-shared Key Passphrase = 'ObsidianOrder1'
14 Test protocol connectivity. From the Windows workstation execute the following commands:
LPR -S 172.16.0.10 -P lp <location of 16MPS.ps>
15 Repeat from Step 4,by modifying the Pre-shared Key Passphrase with the invalid passphrase. (i.e. mismatch passphrase between TOEnd Windows 10)

Pre-shared Key Passphrase = 'Welcome@(1234)'

16 Repeat from Step 4,by modifying the Pre-shared Key passphrase with the below combinations one by one:

  1. n3Buqe$4ep6AfazafrAtra
  2. Hb$^3rJ#WEcRk80s%BvCP3
  3. ^-YTPGH*2vJh5-e^6D89-J
  4. 8^Hmh6vd@!YvW*T&Y7Fz!D
  5. !CnSE^ttn2Dtn*d*5%LpyL
  6. PnNjN&7qvARC#XcPKx83xs
  7. pFST!s!jsS%B6G)7eCBv6k
  8. WX!dNwADCtV(CBY)pH88rD
  9. zC6$eGCGP4Z@vu5d$t@Yap
  10. (a6qSJV2P%*WkSPLdb#C)@
  11. pcDZ3vG)83QBt2eSBc!T)A
  12. m8)fT@@57sS-N-yVY4zjr(
  13. 2SGw$jaADst9#npQK9U(C!
  14. kdqkLXBYNPZg2hWW&W9F2*
  15. jTufwx$UxA_5b%MeT*BwM4
    17 Test protocol connectivity. From the Windows workstation execute the following commands:
    LPR -S 172.16.0.10 -P lp <location of 16MPS.ps>
TEST_COVERED_BY: SRT_ANALYZATION: OUTPUT:

See CO_AUTH_WEBUI_AUTHENTICATE_SA.The {WEBUI IPSEC PAGE} will be displayed.The {WEBUI IPSEC Add New Action Step 1 of 2 page} will be displayed.The {WEBUI IPSEC Add New Action Step 2 of 2 page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.

  1. The newly created action will be displayed on this page.

    (Note: Generates event 39 IPsec Configured event)The {WEBUI IPSEC New Host Group page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.

  2. The newly created Host group will be displayed on this page.

    (Note: Generates event 39 IPsec Configured event)The {WEBUI IPSEC Policy page} will be displayed1. The {WEBUI IPSEC Policy page} will be displayed
  3. The newly created policy will be displayed on this page.
  4. It will be the bottom-most policy
    (Note: Generates event 39 IPsec Configured event)
    N/A. (See Document Shared)The print job will succeed. IPsec will be negotiated.Refer to steps above; steps which generate audit events are noted. Ensure an audit event has been recorded for each.
    N/A.The print job will succeed. IPsec will be negotiated.The print job will fail.N/A.The print job will succeed. IPsec will be negotiated.
PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: SPEC_NUM: SPEC_VERSION: SPEC_TAG: ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1753438137 MDATE: 1753438137 MUSER: USWU53416 AUTHOR: USWU53416 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: COMPETENCY: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: AUTOMATABLE: AUTOMATION_CANDIDATE: TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: TC_WORK_LOCATION_CAT: AUTOMATION_TC_VALIDATION: