Test IKEv2.EN.R.1.1.10.2: Sending Certificate Request Payload Part A: (ADVANCED)
To verify an IKEv2 device properly transmits CERTREQ payload.
* [RFC 4306] - Sections and 3.7
* Network Topology Connect the devices according to the Common Topology. * Configuration In each part, configure the devices according to the following IKE peer configuration.
Authentication Method Local X.509 Certificate - Signature
* Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-Node) (End-Node) | | |<-------------------| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Packet #1) |------------------->| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr, CERTREQ) | | (Judgement #1) | | V V
Packet #1 See Common Packet #1
Part A: (ADVANCED) 1. TN1 starts to negotiate with NUT by sending IKE_SA_INIT request. 2. Observe the messages transmitted on Link A.
Part A Step 2: Judgment #1 The NUT transmits an IKE_SA_INIT response with a CERTREQ payload which contains 4 (X.509 Certificate - Signature) as Certificate Encoding.
* None.