ATM_ID: 60BB43B0-693F-11F0-90F0-C4D1B6ACCDE0
MFF:
PLANNEDTIMESTAFF:
ID: Not_to_use_for_any_Dashboard/CCC/165423
TESTCASE_HEADLINE: IPSEC_RSA_AUTHENTICATION_ STRONGSWAN
GROUP:
FEATURE:
SUB_FEATURE:
INPUT:
PROCEDURE: 1 Execute CO_AUTH_WEBUI_AUTHENTICATE_SA.2 Select [Security] → [Certificates] → [Security Certificates] from the Properties Menu on the left side of the page.3 Select [CA-Signed Device Certificate(s)] tab. Click [Create Certificate Signing Request (CSR)].4 Click the 'View/Export' link and save the CSR file to the Windows Workstation. (When finished,close the browser.)5 Please refer the Document shared IPsec on Strongswan6 Select [Security] followed by [IPsec] from the Properties Menu on the left side of the page.7 Click [Host Groups] to display the IP Host Groups page. Then click [Add New Host Group]8 Enter the following information,when done click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows)
Name = “Ubuntu”
Description = N/A
Set the following address options:
IPv4
Address type = Specific
IP Address = 172.16.0.56
7 Click [Actions] to navigate to the IP Actions page. Then click [Add New Action] button.8 Enter the following information,when done click [Next].
Name = ”IKE – Certificate”
Description = N/A
Keying Method = Internet Key Exchange (IKEv1)
Select 'Digital Signature Authentication' Option.
Make sure the below Certificates are properly selected.
- Device Authentication Certificate – Select the CA Signed Certificate Installed using Stronswan
- Peer Validation Certificate – Select the XEROX Root RSA Certificate Installed using Strongswan
9 Select the following options then click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows).
IKE Phase 1 Settings:
Key Lifetime = 86400 Seconds
IKE Phase 2 Settings:
IPsec Mode = Transport Mode
IPsec Security = ESP
Perfect Forward Secrecy = DH Group 14 (2048-bit MODP)
Hash = SHA-256
Encryption = AES-CBC-128/256
Key Lifetime = 28800 Seconds
10 Click [Security Policies] to navigate to the IPsec Policies page.11 Create a new policy. Set the following options then click [Add Policy]. (Click [OK] to respond to the settings confirmation popup which follows)
Host Groups = Ubuntu
Protocol Groups = All
Action = IKE – Certificate
12 Enable Network Troubleshooting session on device to capture and record all network communication to and from the devices.
Properties -> Security -> Logs -> Network Troubleshooting -> Click 'Start' button followed by [OK] button.
13 Now Enable IPsec MFD 14 At Ubuntu Workstation Configure the ipsec.conf & ipsec.secrets Files.
\
Important: Please refer the Document shared to enable IPsec on Strongswan
15 Test protocol connectivity. From ubuntu,try to ping MFD16 Disable Network Troubleshooting session on device.
Properties -> Security -> Logs -> Network Troubleshooting -> Click 'Stop' button followed by [Continue] button.
17 Click 'Download Data Log' button to download the capture and analyse the traces.
TEST_COVERED_BY:
SRT_ANALYZATION:
OUTPUT: See CO_AUTH_WEBUI_AUTHENTICATE_SA.The Security Certificates page will be displayed.The Create Certificate Signing Request (CSR) will be displayed.The file will download successfully.N/A. (See Document Shared)The {WEBUI IPSEC PAGE} will be displayed.The {WEBUI IPSEC New Host Group page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.
- The newly created Host group will be displayed on this page.
(Note: Generates event 39 IPsec Configured event)
The {WEBUI IPSEC Add New Action Step 1 of 2 page} will be displayed.The {WEBUI IPSEC Add New Action Step 2 of 2 page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.
- The newly created action will be displayed on this page.
(Note: Generates event 39 IPsec Configured event)
The {WEBUI IPSEC Policy page} will be displayed1. The {WEBUI IPSEC Policy page} will be displayed
- The newly created policy will be displayed on this page.
(Note: Generates event 39 IPsec Configured event)
The session will be started.IPsec will be enabled.N/A. (See Document Shared)The ping will be successful. The Session will be stopped.IPsec will be negotiated.
PROCESS:
PRIORITY:
TEST_TYPE:
LOE:
RESOURCE_HW:
RESOURCE_CONSUMEABLES:
RESOURCE_MEDIA:
SKILL_SET:
TEST_CASE_TYPE:
TESTCASE_SOURCE:
SPEC:
SPEC_NUM:
SPEC_VERSION:
SPEC_TAG:
ATM_OWNER:
APPROVE_QE:
APPROVED_QE:
APPROVE_SE:
APPROVED_SE:
APPROVE_SPAR:
APPROVED_SPAR:
ASSOCIATED_TESTCASES:
TRAINING:
TESTCASE_VERSION:
TESTCASE_STATE:
TESTCASE_PLATFORM:
TESTCASE_PRODUCT:
TESTCASE_FAMILY:
TESTCASE_APPROVALS:
CDATE: 1753438137
MDATE: 1753438137
MUSER: USWU53416
AUTHOR: USWU53416
ATM_MCOMMENTS: Imported from spreadsheet
HISTORY:
ATM_LOCKED:
ATM_REQLINK:
ATM_REQCOUNT: 0
QA_TEAM:
TC_WEIGHTAGE:
FILENAME:
FILEDESC:
FILES:
RELEASE:
COMPETENCY:
AUTOMATION_GROUP:
TESTCASE_STEPS_ARE_RELATED_TO:
REASON_FOR_AUTOMATABLE:
PRECONDITION_TO_BE_DONE:
ACTION_TO_BE_DONE:
COMMON_FUNCTIONALITY:
COMMONALITY_DETAILS:
CONSTRAINTS_DAR:
DEVELOPMENT_COMPLETE_TIME:
PO_SIGNOFF_DATE:
COMPLEXITY_PRECONDITIONS:
COMPLEXITY_OUTPUT_VALIDATION:
AUTOMATABLE:
AUTOMATION_CANDIDATE:
TESTCASE_MODIFICATION_REQUIRED:
APTEST_UPDATE_STATUS:
DEVICE_CATEGORY:
TC_WORK_LOCATION_CAT:
AUTOMATION_TC_VALIDATION: