Test IKEv2.EN.I.1.1.6.4: Sending Multiple Proposals for IKE_SA Part A: (ADVANCED)
To verify an IKEv2 device properly transmits IKE_AUTH request with multiple proposals for CHILD_SA.
* [RFC 4306] - Sections 2.7 and 3.3
* Network Topology Connect the devices according to the Common Topology. * Configuration In each part, configure the devices according to the following configuration.
IKE_SA_INIT exchanges Algorithms Proposal Protocol ID Encryption PRF Integrity D-H Group Part A Proposal #1 IKE ENCR_3DES PRF_HMAC_SHA1 AUTH_HMAC_SHA1_96 Group2 Proposal #2 IKE ENCR_AES_CBC PRF_AES128_CBC AUTH_AES_XCBC_96 Group14
* Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-Node) (End-Node) | | |------------------->| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Judgement #1) | | V V
Part A: (ADVANCED) 1. TN1 starts to negotiate with NUT by sending IKE_SA_INIT request. 2. Observe the messages transmitted on Link A.
Part A Step 2: Judgment #1 The NUT transmits an IKE_SA_INIT request including "ENCR_3DES", "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" in SA Proposal #1 (ESP) and "ENCR_AES_CBC", "PRF_AES128_CBC", "AUTH_AES_XCBC_96" and "D-H group 14" in SA Proposal #2 (ESP) as proposed algorithms.
* None.