ATM_ID: 60E3503A-693F-11F0-90F0-C4D1B6ACCDE0 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/CCC/165469 TESTCASE_HEADLINE: IPSEC_SA_LIFETIME_Strongswan GROUP: FEATURE: SUB_FEATURE: INPUT:

Verify IPsec re-negotiation after key life time expires.

PROCEDURE:

1 Execute CO_AUTH_WEBUI_AUTHENTICATE_SA.
2 Select [Security] followed by [IPsec] from the Properties Menu on the left side of the page.3 Click [Actions] to navigate to the IP Actions page. Then click [Add New Action] button.4 Enter the following information,when done click [Next].
Name = ”Require Preshared Key 1”
Description = N/A
Keying Method = Internet Key Exchange (IKEv1)
Pre-shared Key Passphrase = ”ObsidianOrder1”

5 Select the following options then click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows).
IKE Phase 1 Settings:
Key Lifetime = 86400 Seconds

IKE Phase 2 Settings:
IPsec Mode = Transport Mode
IPsec Security = ESP
Perfect Forward Secrecy = DH Group 14 (2048-bit MODP)
Hash = SHA-256
Encryption = AES-CBC-128/256
Key Lifetime = 28800 Seconds
6 Click [Host Groups] to display the IP Host Groups page. Then click [Add New Host Group]7 Enter the following information,when done click [Save]. (Click [OK] to respond to the settings confirmation pop-up which follows)

Name = “Windows 10 Client”
Description = N/A
Set the following address options:
IPv4
Address type = Specific
IP Address = 172.16.0.102

8 Click [Security Policies] to navigate to the IPsec Policies page.9 Create a new policy. Set the following options then click [Add Policy]. (Click [OK] to respond to the settings confirmation popup which follows)

Host Groups = Windows 10 Client
Protocol Groups = All
Action = Require Preshared Key 1

10 At Windows 10 Workstation,enable the Firewall and the IPsec Policy rule created. Important: Please refer the Document 'How to Set up IPsec on Windows 10'.11 Test protocol connectivity. From the Windows workstation execute the following commands:

LPR -S 172.16.0.10 -P lp <location of 16MPS.ps>
12 In the ESS enter the below command in /var path.

tcpdump -w ipsec.pcap ip host <WINDOWS IP>

13 In the ESS of WINDOWS enter the below command

ping -i 5 <DEVICE IP>14 Wait for 24+ Hours and stop the ping and tcpdump commands running in the ESS.15 In MFD,using WinSCP navigate to:
/var

and copy the ipsec.pcap file to the local drive of PC.16 Open the copied ipsec.pcap file with Wire Shark tool and verify that the IPsec Phase-1 and Phase-2 re-negotiation happened at the specified time intervals.

TEST_COVERED_BY: SRT_ANALYZATION: OUTPUT:

See CO_AUTH_WEBUI_AUTHENTICATE_SA.The {WEBUI IPSEC PAGE} will be displayed.The {WEBUI IPSEC Add New Action Step 1 of 2 page} will be displayed.The {WEBUI IPSEC Add New Action Step 2 of 2 page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.

  1. The newly created action will be displayed on this page.

    (Note: Generates event 39 IPsec Configured event)The {WEBUI IPSEC New Host Group page} will be displayed.1. The {WEBUI IPSEC PAGE} will be displayed.
  2. The newly created Host group will be displayed on this page.
    The {WEBUI IPSEC Policy page} will be displayed1. The {WEBUI IPSEC Policy page} will be displayed
  3. The newly created policy will be displayed on this page.
  4. It will be the bottom-most policy
    (Note: Generates event 39 IPsec Configured event)
    N/A. (See Document Shared)The print job will succeed. IPsec will be negotiated.The command will start executing by giving output similar to

    \ tcpdump: listening on eth0,link-type EN10MB (Ethernet),capture size 262144 bytesThe ping command will be executed successfully and the output will be similar to the below:


    PING 172.16.0.52 (172.16.0.52) 56(84) bytes of data.
    64 bytes from 172.16.0.52: icmp_seq=1 ttl=64 time=2.82 ms
    64 bytes from 172.16.0.52: icmp_seq=1 ttl=64 time=3.71 ms
    64 bytes from 172.16.0.52: icmp_seq=1 ttl=63 time=13.9 ms
    64 bytes from 172.16.0.52: icmp_seq=1 ttl=63 time=24.7 ms

    The command execution stopped successfullyThe packet capture file copied to the local folder successfully.The “isakmp” Main mode packets will be captured at 24 hours time interval and Quick mode packets will be captured at 8 hours time interval.
PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC: SPEC_NUM: SPEC_VERSION: SPEC_TAG: ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1753438137 MDATE: 1753438137 MUSER: USWU53416 AUTHOR: USWU53416 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: COMPETENCY: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: AUTOMATABLE: AUTOMATION_CANDIDATE: TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: TC_WORK_LOCATION_CAT: AUTOMATION_TC_VALIDATION: