ATM_ID: B64D13DA-A6AB-11EC-96C2-7D98BEA7DE52 MFF: PLANNEDTIMESTAFF: ID: Not_to_use_for_any_Dashboard/Deprecated/FS_22.205_FIPS/14795 TESTCASE_HEADLINE: Verify while enabling FIPS with CC mode with below IPsec configuration shall not be detected and flagged as non-compliant: IPSEC configured with ESP Encryption setting:AES_CBC_128 or AES_CBC_256 for IKE Keying Method. GROUP: FEATURE: SUB_FEATURE: INPUT:

Set certificate key length to 2048 - Bits under Security certificates page.

PROCEDURE:

1.Navigate to device EWS -- Properties -- Security -- IPsec page.
2.Create New Action with IKE Keying Method; choose ESP Encryption as :AES_CBC_128 or AES_CBC_256;
SHA-256 in Hash algorithm and save this Configured Settings.
3.Define IPsec policy with Host groups- Any; Protocol Groups- All; and with newly created action(in above step-2).
4.Enable IPSEC and save the settings.
5.Now navigate to Properties--Security -- FIPS page and enable FIPS with CC mode in the device.

OUTPUT:

FIPS with CC mode will be enabled
 successfully without throwing any non compliance message in EWS FIPS page.

PROCESS: PRIORITY: TEST_TYPE: manual LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: testcases TESTCASE_SOURCE: SPEC: FIPS 140-3 Certification SPEC_VERSION: 1.0001 SPEC_TAG: [22.205.114.01] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} Encryption for ESP shall allow only AES_CBC_128 or AES_CBC_256. [22.205.114.01.01] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} When entering FIPS with CC mode on the MFP, any ESP Encryption setting other than these above shall be detected and flagged as non-compliant, and will require a configuration change to a CC compliant setting before continuing in FIPS with CC mode enablement. ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody TESTCASE_FAMILY: TESTCASE_APPROVALS: CDATE: 1647601696 MDATE: 1647601696, 1651240589, 1742818694 MUSER: USWU60000, USWU60000, w3K3WRKH AUTHOR: USWU60000 ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D7.6/FT-27164_Mocana_TrustCore_2020_FIPS_140-3_modules_for_Alexandra/162031"., Renamed from "WFAST_Connectivity/Testcases/FS_22.205_FIPS_140-3_Certification/14795". HISTORY: ATM_LOCKED: ATM_REQLINK: 3CF36198-1CF3-11EC-B707-61040BE4A572, 3CF41E9E-1CF3-11EC-B707-61040BE4A572 ATM_REQCOUNT: 2 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: AUTOMATION_GROUP: TESTCASE_STEPS_ARE_RELATED_TO: REASON_FOR_AUTOMATABLE: PRECONDITION_TO_BE_DONE: ACTION_TO_BE_DONE: COMMON_FUNCTIONALITY: COMMONALITY_DETAILS: CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022 DEVELOPMENT_COMPLETE_TIME: PO_SIGNOFF_DATE: COMPLEXITY_PRECONDITIONS: COMPLEXITY_OUTPUT_VALIDATION: non_outliers AUTOMATABLE: yes TESTCASE_MODIFICATION_REQUIRED: APTEST_UPDATE_STATUS: DEVICE_CATEGORY: common TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc AUTOMATION_TC_VALIDATION: COMPETENCY: wfast_connectivity APTEST_TRACKING: yes AUTOMATION_CANDIDATE: no