Test IKEv2.EN.I.1.1.6.4: Sending Multiple Proposals for IKE_SA
Part A: (ADVANCED)
To verify an IKEv2 device properly transmits IKE_AUTH request with multiple proposals
for CHILD_SA.
* [RFC 4306] - Sections 2.7 and 3.3
* Network Topology
Connect the devices according to the Common Topology.
* Configuration
In each part, configure the devices according to the following configuration.
|
IKE_SA_INIT exchanges Algorithms |
| Proposal |
Protocol ID |
Encryption |
PRF |
Integrity |
D-H Group |
| Part A |
Proposal #1 |
IKE |
ENCR_3DES |
PRF_HMAC_SHA1 |
AUTH_HMAC_SHA1_96 |
Group2 |
| Proposal #2 |
IKE |
ENCR_AES_CBC |
PRF_AES128_CBC |
AUTH_AES_XCBC_96 |
Group14 |
* Pre-Sequence and Cleanup Sequence
IKEv2 on the NUT is disabled after each part.
NUT TN1
(End-Node) (End-Node)
| |
|------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni)
| | (Judgement #1)
| |
V V
Part A: (ADVANCED)
1. TN1 starts to negotiate with NUT by sending IKE_SA_INIT request.
2. Observe the messages transmitted on Link A.
Part A
Step 2: Judgment #1
The NUT transmits an IKE_SA_INIT request including "ENCR_3DES",
"PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" in SA Proposal #1
(ESP) and "ENCR_AES_CBC", "PRF_AES128_CBC", "AUTH_AES_XCBC_96" and
"D-H group 14" in SA Proposal #2 (ESP) as proposed algorithms.
* None.