ATM_ID: B64D13DA-A6AB-11EC-96C2-7D98BEA7DE52
MFF:
PLANNEDTIMESTAFF:
ID: Not_to_use_for_any_Dashboard/Deprecated/FS_22.205_FIPS/14795
TESTCASE_HEADLINE: Verify while enabling FIPS with CC mode with below IPsec configuration shall not be detected and flagged as non-compliant:
IPSEC configured with ESP Encryption setting:AES_CBC_128 or AES_CBC_256 for IKE Keying Method.
GROUP:
FEATURE:
SUB_FEATURE:
INPUT:
Set certificate key length to 2048 - Bits under Security certificates page.
PROCEDURE: 1.Navigate to device EWS -- Properties -- Security -- IPsec page.
2.Create New Action with IKE Keying Method; choose ESP Encryption as :AES_CBC_128 or AES_CBC_256;
SHA-256 in Hash algorithm and save this Configured Settings.
3.Define IPsec policy with Host groups- Any; Protocol Groups- All; and with newly created action(in above step-2).
4.Enable IPSEC and save the settings.
5.Now navigate to Properties--Security -- FIPS page and enable FIPS with CC mode in the device.
OUTPUT: FIPS with CC mode will be enabled
successfully without throwing any non compliance message in EWS FIPS page.
PROCESS:
PRIORITY:
TEST_TYPE: manual
LOE:
RESOURCE_HW:
RESOURCE_CONSUMEABLES:
RESOURCE_MEDIA:
SKILL_SET:
TEST_CASE_TYPE: testcases
TESTCASE_SOURCE:
SPEC: FIPS 140-3 Certification
SPEC_VERSION: 1.0001
SPEC_TAG: [22.205.114.01] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} Encryption for ESP shall allow only AES_CBC_128 or AES_CBC_256.
[22.205.114.01.01] (FT-27164, FT-29598, FT-28756) {D7.6, D7.8} When entering FIPS with CC mode on the MFP, any ESP Encryption setting other than these above shall be detected and flagged as non-compliant, and will require a configuration change to a CC compliant setting before continuing in FIPS with CC mode enablement.
ATM_OWNER:
APPROVE_QE:
APPROVED_QE:
APPROVE_SE:
APPROVED_SE:
APPROVE_SPAR:
APPROVED_SPAR:
ASSOCIATED_TESTCASES:
TRAINING:
TESTCASE_VERSION:
TESTCASE_STATE:
TESTCASE_PLATFORM:
TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody
TESTCASE_FAMILY:
TESTCASE_APPROVALS:
CDATE: 1647601696
MDATE: 1647601696, 1651240589, 1742818694
MUSER: USWU60000, USWU60000, w3K3WRKH
AUTHOR: USWU60000
ATM_MCOMMENTS: Imported from spreadsheet, Renamed from "DPQA_NewFeature/D7.6/FT-27164_Mocana_TrustCore_2020_FIPS_140-3_modules_for_Alexandra/162031"., Renamed from "WFAST_Connectivity/Testcases/FS_22.205_FIPS_140-3_Certification/14795".
HISTORY:
ATM_LOCKED:
ATM_REQLINK: 3CF36198-1CF3-11EC-B707-61040BE4A572, 3CF41E9E-1CF3-11EC-B707-61040BE4A572
ATM_REQCOUNT: 2
QA_TEAM:
TC_WEIGHTAGE:
FILENAME:
FILEDESC:
FILES:
RELEASE:
AUTOMATION_GROUP:
TESTCASE_STEPS_ARE_RELATED_TO:
REASON_FOR_AUTOMATABLE:
PRECONDITION_TO_BE_DONE:
ACTION_TO_BE_DONE:
COMMON_FUNCTIONALITY:
COMMONALITY_DETAILS:
CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022
DEVELOPMENT_COMPLETE_TIME:
PO_SIGNOFF_DATE:
COMPLEXITY_PRECONDITIONS:
COMPLEXITY_OUTPUT_VALIDATION: non_outliers
AUTOMATABLE: yes
TESTCASE_MODIFICATION_REQUIRED:
APTEST_UPDATE_STATUS:
DEVICE_CATEGORY: common
TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc
AUTOMATION_TC_VALIDATION:
COMPETENCY: wfast_connectivity
APTEST_TRACKING: yes
AUTOMATION_CANDIDATE: no