# # Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 # Yokogawa Electric Corporation. # All rights reserved. # # Redistribution and use of this software in source and binary # forms, with or without modification, are permitted provided that # the following conditions and disclaimer are agreed and accepted # by the user: # # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in # the documentation and/or other materials provided with # the distribution. # # 3. Neither the names of the copyrighters, the name of the project # which is related to this software (hereinafter referred to as # "project") nor the names of the contributors may be used to # endorse or promote products derived from this software without # specific prior written permission. # # 4. No merchantable use may be permitted without prior written # notification to the copyrighters. # # 5. The copyrighters, the project and the contributors may prohibit # the use of this software at any time. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHTERS, THE PROJECT AND # CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING # BUT NOT LIMITED THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS # FOR A PARTICULAR PURPOSE, ARE DISCLAIMED. IN NO EVENT SHALL THE # COPYRIGHTERS, THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, # INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES # (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR # SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, # STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING # IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # # $Name: REL_1_0_3 $ # # $Id: INDEX_SGW_R,v 1.37 2009/06/16 05:41:49 doo Exp $ # ######################################################################## &print:Section SGW-R. Security Gateway - Responder &print:Sub-Section 1. Security Gateway to Security Gateway Tunnel ./4-SGW-R/IKEv2-SGW-R-1-A-A-A.seq::::Global Setup:1 &print:Group 1. The Initial Exchanges &print:Sub-Group 1. Header and Payload Formats ./4-SGW-R/IKEv2-SGW-R-1-1-1-1.seq::::Test IKEv2.SGW.R.1.1.1.1: Sending IKE_SA_INIT response:2 ./4-SGW-R/IKEv2-SGW-R-1-1-1-2.seq::::Test IKEv2.SGW.R.1.1.1.2: Sending IKE_AUTH response:2 ./4-SGW-R/IKEv2-SGW-R-1-1-1-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.1.3: Use of CHILD_SA:2 &print:Sub-Group 2. Use of Retransmission Timers ./4-SGW-R/IKEv2-SGW-R-1-1-2-1-A.seq::::Test IKEv2.SGW.R.1.1.2.1: Receipt of retransmitted IKE_SA_INIT request:2 ./4-SGW-R/IKEv2-SGW-R-1-1-2-2-A.seq::::Test IKEv2.SGW.R.1.1.2.2: Receipt of retransmitted of IKE_AUTH request:2 &print:Sub-Group 3. State Synchronization and Connection Timeouts ./4-SGW-R/IKEv2-SGW-R-1-1-3-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.1: State Synchronization with ICMP Message:2 ./4-SGW-R/IKEv2-SGW-R-1-1-3-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.2: State Synchronization with IKE Message:2 ./4-SGW-R/IKEv2-SGW-R-1-1-3-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.3.3: Close Connections when receiving INITIAL_CONTACT:2 ./4-SGW-R/IKEv2-SGW-R-1-1-3-4-A.seq::::Test IKEv2.SGW.R.1.1.3.4: Receiving Liveness check:2 ./4-SGW-R/IKEv2-SGW-R-1-1-3-5-A.seq::::Test IKEv2.SGW.R.1.1.3.5: Receiving Delete Payload for IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-1-3-6-A.seq::::Test IKEv2.SGW.R.1.1.3.6: Receiving Delete Payload for CHILD_SA:2 &print:Sub-Group 4. Version Numbers and Forward Compatibility ./4-SGW-R/IKEv2-SGW-R-1-1-4-1-A.seq::::Test IKEv2.SGW.R.1.1.4.1: Receipt of a larger minor version number:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-2-A.seq::::Test IKEv2.SGW.R.1.1.4.2: Receipt of a higher major version number:2 &print:Test IKEv2.SGW.R.1.1.4.3: Unrecognized payload types and critical bit is not set ./4-SGW-R/IKEv2-SGW-R-1-1-4-3-A.seq::::Test IKEv2.SGW.R.1.1.4.3 Part A: Invalid payload type 1:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-3-B.seq::::Test IKEv2.SGW.R.1.1.4.3 Part B: Invalid payload type 32:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-3-C.seq::::Test IKEv2.SGW.R.1.1.4.3 Part C: Invalid payload type 49:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-3-D.seq::::Test IKEv2.SGW.R.1.1.4.3 Part D: Invalid payload type 255:2 &print:Test IKEv2.SGW.R.1.1.4.4: Unrecognized payload types and critical bit is set ./4-SGW-R/IKEv2-SGW-R-1-1-4-4-A.seq::::Test IKEv2.SGW.R.1.1.4.4 Part A: Invalid paylaod type 1:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-4-B.seq::::Test IKEv2.SGW.R.1.1.4.4 Part B: Invalid paylaod type 32:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-4-C.seq::::Test IKEv2.SGW.R.1.1.4.4 Part C: Invalid paylaod type 49:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-4-D.seq::::Test IKEv2.SGW.R.1.1.4.4 Part D: Invalid paylaod type 255:2 ./4-SGW-R/IKEv2-SGW-R-1-1-4-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.4.5: Invalid Payload Order:2 &print:Sub-Group 5. Cookies ./4-SGW-R/IKEv2-SGW-R-1-1-5-1-A.seq::::Test IKEv2.SGW.R.1.1.5.1: Cookies:2 ./4-SGW-R/IKEv2-SGW-R-1-1-5-2-A.seq::::Test IKEv2.SGW.R.1.1.5.2: Invalid Cookies:2 ./4-SGW-R/IKEv2-SGW-R-1-1-5-3-A.seq::::Test IKEv2.SGW.R.1.1.5.3: Interaction of COOKIE and INVALID_KE_PAYLOAD:2 ./4-SGW-R/IKEv2-SGW-R-1-1-5-4-A.seq::::Test IKEv2.SGW.R.1.1.5.4: Interaction of COOKIE and INVALID_KE_PAYLOAD with unoptimized Initiator:2 &print:Sub-Group 6. Cryptographic Algorithm Negotiation &print:Test IKEv2.SGW.R.1.1.6.1: Cryptographic Algorithm Negotiation for IKE_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-1-A.seq::::Test IKEv2.SGW.R.1.1.6.1 Part A: Encryption Algorithm ENCR_AES_CBC:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-1-B.seq::::Test IKEv2.SGW.R.1.1.6.1 Part B: Encryption Algorithm ENCR_AES_CTR:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-1-C.seq::::Test IKEv2.SGW.R.1.1.6.1 Part C: Pseudo-random Function PRF_AES128_XCBC:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-1-D.seq::::Test IKEv2.SGW.R.1.1.6.1 Part D: Integrity Algorithm AUTH_AES_XCBC_96:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-1-E.seq::::Test IKEv2.SGW.R.1.1.6.1 Part E: D-H Group Group 14:2 &print:Test IKEv2.SGW.R.1.1.6.2: Cryptographic Algorithm Negotiation for CHILD_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part A: Encryption Algorithm ENCR_AES_CBC:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part B: Encryption Algorithm ENCR_AES_CTR:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part C: Encryption Algorithm ENCR_NULL:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part D: Integrity Algorithm AUTH_AES_XCBC_96:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-E.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part E: Integrity Algorithm NONE:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-2-F.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.2 Part F: Extended Sequence Number:2 &print:Test IKEv2.EN.R.1.1.6.3: Receiving Multiple Transforms for IKE_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-3-A.seq::::Test IKEv2.SGW.R.1.1.6.3 Part A: Multiple Encryption Algorithms:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-3-B.seq::::Test IKEv2.SGW.R.1.1.6.3 Part B: Multiple Pseudo-Random Functions:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-3-C.seq::::Test IKEv2.SGW.R.1.1.6.3 Part C: Multiple Integrity Algorithms:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-3-D.seq::::Test IKEv2.SGW.R.1.1.6.3 Part D: Multiple D-H Groups:2 &print:Test IKEv2.EN.R.1.1.6.4: Receiving Multiple Proposals for IKE_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-4-A.seq::::Test IKEv2.SGW.R.1.1.6.4 Part A: Multiple Proposals for IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-4-B.seq::::Test IKEv2.SGW.R.1.1.6.4 Part B: Multiple Proposals for IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-4-C.seq::::Test IKEv2.SGW.R.1.1.6.4 Part C: Multiple Proposals for IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-4-D.seq::::Test IKEv2.SGW.R.1.1.6.4 Part D: Multiple Proposals for IKE_SA:2 &print:Test IKEv2.EN.R.1.1.6.5: Receiving Multiple Transforms for CHILD_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-5-A.seq::::Test IKEv2.SGW.R.1.1.6.5 Part A: Multiple Encryption Algorithms:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-5-B.seq::::Test IKEv2.SGW.R.1.1.6.5 Part B: Multiple Integrity Algorithms:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-5-C.seq::::Test IKEv2.SGW.R.1.1.6.5 Part C: Multiple Extended Sequence Numbers:2 &print:Test IKEv2.EN.R.1.1.6.6: Receiving Multiple Proposals for CHILD_SA ./4-SGW-R/IKEv2-SGW-R-1-1-6-6-A.seq::::Test IKEv2.SGW.R.1.1.6.6 Part A: Receiving Multiple Proposals:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-6-B.seq::::Test IKEv2.SGW.R.1.1.6.6 Part B: Receiving Multiple Proposals:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-6-C.seq::::Test IKEv2.SGW.R.1.1.6.6 Part C: Receiving Multiple Proposals:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-7-A.seq::::Test IKEv2.SGW.R.1.1.6.7: Sending of INVALID_KE_PAYLOAD:2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-8-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.8: INVALID_KE_PAYLOAD in the Initial Exchange :2 ./4-SGW-R/IKEv2-SGW-R-1-1-6-9-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.6.9: Creating an IKE_SA without a CHILD_SA:2 &print:Sub-Group 7. Traffic Selector Negotiation ./4-SGW-R/IKEv2-SGW-R-1-1-7-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.7.1: Narrowing the range of members of the set of traffic selectors:2 ./4-SGW-R/IKEv2-SGW-R-1-1-7-2-A.seq::::Test IKEv2.SGW.R.1.1.7.2: TS_UNACCEPTABLE:2 ./4-SGW-R/IKEv2-SGW-R-1-1-7-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.7.3: Narrowing multiple traffic selector:2 &print:Sub-Group 8. Error Handling &print:Test IKEv2.SGW.R.1.1.8.1: INVALID_IKE_SPI ./4-SGW-R/IKEv2-SGW-R-1-1-8-1-A.seq::::Test IKEv2.SGW.R.1.1.8.1 Part A: Different IKE_SA Initiator's SPI:2 ./4-SGW-R/IKEv2-SGW-R-1-1-8-1-B.seq::::Test IKEv2.SGW.R.1.1.8.1 Part B: Different IKE_SA Responder's SPI:2 ./4-SGW-R/IKEv2-SGW-R-1-1-8-2-A.seq::::Test IKEv2.SGW.R.1.1.8.2: INVALID_SYNTAX:2 ./4-SGW-R/IKEv2-SGW-R-1-1-8-3-A.seq::::Test IKEv2.SGW.R.1.1.8.3: INVALID_SELECTORS:2 &print:Sub-Group 10. Authentication of the IKE_SA ./4-SGW-R/IKEv2-SGW-R-1-1-10-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.1: Sending Certificate Payload:2 ./4-SGW-R/IKEv2-SGW-R-1-1-10-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.2: Sending Certificate Request Payload:2 ./4-SGW-R/IKEv2-SGW-R-1-1-10-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.3: RSA Digital Signature:2 ./4-SGW-R/IKEv2-SGW-R-1-1-10-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.1.10.4: HEX string PSK:2 &print:Sub-Group 11. Invalid Values ./4-SGW-R/IKEv2-SGW-R-1-1-11-1-A.seq::::Test IKEv2.SGW.R.1.1.11.1: Non zero RESERVED fields in IKE_SA_INIT response:2 ./4-SGW-R/IKEv2-SGW-R-1-1-11-2-A.seq::::Test IKEv2.SGW.R.1.1.11.2: Non zero RESERVED fields in IKE_AUTH response:2 ./4-SGW-R/IKEv2-SGW-R-1-1-11-3-A.seq::::Test IKEv2.SGW.R.1.1.11.3: Version bit is set:2 ./4-SGW-R/IKEv2-SGW-R-1-1-11-4-A.seq::::Test IKEv2.SGW.R.1.1.11.4: Response bit is set:2 ./4-SGW-R/IKEv2-SGW-R-1-1-11-5-A.seq::::Test IKEv2.SGW.R.1.1.11.5 Part A: Unrecognized Notify Message Type:2 ./4-SGW-R/IKEv2-SGW-R-1-1-11-5-B.seq::::Test IKEv2.SGW.R.1.1.11.5 Part B: Unrecognized Notify Message Type:2 &print:Group 2. The CREATE_CHILD_SA Exchange &print:Sub-Group 1. Header and Payload Formats ./4-SGW-R/IKEv2-SGW-R-1-2-1-1-A.seq::::Test IKEv2.SGW.R.1.2.1.1: Receipt of CREATE_CHILD_SA request:2 &print:Sub-Group 2. Use of Retransmission Timers ./4-SGW-R/IKEv2-SGW-R-1-2-2-1-A.seq::::Test IKEv2.SGW.R.1.2.2.1: Receipt of retransmitted CREATE_CHILD_SA request:2 &print:Sub-Group 3. State Synchronization and Connection Timeouts ./4-SGW-R/IKEv2-SGW-R-1-2-3-1-A.seq::::Test IKEv2.SGW.R.1.2.3.1: Receiving Delete Payload for Multiple CHILD_SA:2 &print:Sub-Group 4. Cryptographic Algorithm Negotiation ./4-SGW-R/IKEv2-SGW-R-1-2-4-1-A.seq::::Test IKEv2.SGW.R.1.2.4.1: Sending NO_PROPOSAL_CHOSEN for CREATE_CHILD_SA:2 &print:Sub-Group 5. Rekeying ./4-SGW-R/IKEv2-SGW-R-1-2-5-1-A.seq::::Test IKEv2.SGW.R.1.2.5.1: Close the replaced CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.2: Receipt of cryptographically valid message on the old SA and the new SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part A: Receiving Multiple Transform for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-3-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part B: Receiving Multiple Transform for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-3-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.3 Part C: Receiving Multiple Transform for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part A: Receiving Multiple Proposal for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-4-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part B: Receiving Multiple Proposal for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-4-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.4 Part C: Receiving Multiple Proposal for Rekeying CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.5: Perfect Forward Secrecy:2 ./4-SGW-R/IKEv2-SGW-R-1-2-5-6-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.5.6: Use of the old CHILD_SA:2 &print:Sub-Group 6. Rekeying IKE_SAs Using a CREATE_CHILD_SA exchange ./4-SGW-R/IKEv2-SGW-R-1-2-6-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.1: Sending CREATE_CHILD_SA response:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.2: Receipt of cryptographically valid message on the old IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.3: Use of the old IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.4: Close the replaced IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part A: Receiving Multiple Transform for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-5-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part B: Receiving Multiple Transform for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-5-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part C: Receiving Multiple Transform for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-5-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.5 Part D: Receiving Multiple Transform for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-6-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part A: Receiving Multiple Proposal for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-6-B.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part B: Receiving Multiple Proposal for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-6-C.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part C: Receiving Multiple Proposal for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-6-D.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.6 Part D: Receiving Multiple Proposal for Rekeying IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-7-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.7: Changing PRFs when rekeying the IKE_SA:2 ./4-SGW-R/IKEv2-SGW-R-1-2-6-8-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.6.8: D-H Transform NONE when rekeying the IKE_SA:2 &print:Sub-Group 7. Creating New CHILD_SA with the CREATE_CHILD_SA Exchange ./4-SGW-R/IKEv2-SGW-R-1-2-7-1-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.1.2.7.1: Receipt of cryptographically protected message on the new SA:2 &print:Sub-Group 8. Error Handling &print:Test IKEv2.SGW.R.1.2.8.1: AUTHENTICATION_FAILED ./4-SGW-R/IKEv2-SGW-R-1-2-8-1-A.seq::::Test IKEv2.SGW.R.1.2.8.1 Part A: Authentication Data:2 ./4-SGW-R/IKEv2-SGW-R-1-2-8-1-B.seq::::Test IKEv2.SGW.R.1.2.8.1 Part B: Authentication Method:2 &print:Sub-Group 9. Non zero RESERVED fields ./4-SGW-R/IKEv2-SGW-R-1-2-9-1-A.seq::::Test IKEv2.SGW.R.1.2.9.1: Non zero RESERVED fields in CREATE_CHILD_SA response:2 &print:Group 3. The INFORMATIONAL Exchange &print:Sub-Group 1. Header and Payload Formats ./4-SGW-R/IKEv2-SGW-R-1-3-1-1-A.seq::::Test IKEv2.SGW.R.1.3.1.1: Sending INFORMATIONAL response:2 &print:Sub-Group 2. Use of Retransmission Timers ./4-SGW-R/IKEv2-SGW-R-1-3-2-1-A.seq::::Test IKEv2.SGW.R.1.3.2.1: Retransmission of INFORMATIONAL response:2 &print:Sub-Group 3. Non zero RESERVED fields ./4-SGW-R/IKEv2-SGW-R-1-3-3-1-A.seq::::Test IKEv2.SGW.R.1.3.3.1: Non zero RESERVED fields in INFORMATIONAL response:2 ./4-SGW-R/IKEv2-SGW-R-1-Z-Z-Z.seq::::Global Cleanup:1 &print:Sub-Section 2. Endpoint to Security Gateway Tunnel ./4-SGW-R/IKEv2-SGW-R-2-A-A-A.seq::::Global Setup:1 &print:Group 1. The Initial Exchanges &print:Sub-Group 1. Header and Payload Formats ./4-SGW-R/IKEv2-SGW-R-2-1-1-1-A.seq::::Test IKEv2.SGW.R.2.1.1.1: Receipt of IKE_AUTH request:2 ./4-SGW-R/IKEv2-SGW-R-2-1-1-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.1.2: Use of CHILD_SA:2 &print:Sub-Group 2. Requesting an Internal Address on a Remote Network ./4-SGW-R/IKEv2-SGW-R-2-1-2-1-A.seq::::Test IKEv2.SGW.R.2.1.2.1: Receipt of CFG_REQUEST:2 ./4-SGW-R/IKEv2-SGW-R-2-1-2-2-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.2: Use of CHILD_SA:2 ./4-SGW-R/IKEv2-SGW-R-2-1-2-3-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.3: Non zero RESERVED fields in Configuration Payload:2 ./4-SGW-R/IKEv2-SGW-R-2-1-2-4-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.4: No Configuration Payload:2 ./4-SGW-R/IKEv2-SGW-R-2-1-2-5-A.seq:./4-SGW-R/SGW_COMMON.def:::Test IKEv2.SGW.R.2.1.2.5: Multiple CFG_REQUEST:2 ./4-SGW-R/IKEv2-SGW-R-2-Z-Z-Z.seq::::Global Cleanup:1