Test IKEv2.EN.R.1.1.10.4: HEX string PSK Part A (BASIC)
To verify an IKEv2 device properly handles the Initial Exchanges using Pre-shared key.
* [RFC 4306] - Sections 2.15
* Network Topology Connect the devices according to the Common Topology. * Configuration In each part, configure the devices according to the following IKE peer configuration.
Authentication Key Value Local 0xabadcafeabadcafeabadcafeabadcafe (128 bit binary string)
* Pre-Sequence and Cleanup Sequence IKEv2 on the NUT is disabled after each part.
NUT TN1 (End-Node) (End-node) | | |<-------------------| IKE_SA_INIT request (HDR, SAi1, KEi, Ni) | | (Packet #1) |------------------->| IKE_SA_INIT Response (HDR, SAr1, KEr, Nr) | | (Judgement #1) | | |<-------------------| IKE_AUTH request (HDR, SK {IDi, AUTH, N, SAi2, TSi, TSr}) | | (Packet #2) |------------------->| IKE_AUTH response (HDR, SK {IDr, CERT, N, AUTH, SAr2, TSi, TSr}) | | (Judgement #2) | | V V
Packet #1 See Common Packet #1 Packet #2 See Common Packet #5
Part A (BASIC) 1. TN starts to negotiate with NUT by sending IKE_SA_INIT request. 2. Observe the messages transmitted on Link A. 3. After reception of IKE_SA_INIT response from the NUT, TN transmits an IKE_AUTH request to the NUT. 4. Observe the messages transmitted on Link A.
Part A Step 2: Judgment #1 The NUT transmits an IKE_SA_INIT response including "ENCR_3DES", "PRF_HMAC_SHA1", "AUTH_HMAC_SHA1_96" and "D-H group 2" as accepted algorithms.
Step 4: Judgment #2 The NUT transmits an IKE_AUTH response including "ENCR_3DES", "AUTH_HMAC_SHA1_96" and "No Extended Sequence Numbers" as accepted algorithms.
* None.