NAME

  RTU_E_In_Order_DSTH - Router Tunnel Mode ESP Inbound Header Order


TARGET

  Router


SYNOPSIS

  RTU_E_In_Order_DSTH.seq [-tooloption ...] -pkt RTU_E_Order_DSTH.def
    -tooloption : v6eval tool option
  See also RTU_E_common.def and RTU_common.def


INITIALIZATION

For details of Network Topology, see 00README

Set NUT's SAD and SPD as following:

                           (Link0) (Link1)
            NET4   NET2      NET0   NET1
  HOST1_NET4 -- SG1 -- Router -- NUT -- HOST1_NET1
                 =====tunnel======>

Security Association Database (SAD)

source address SG1_NET2
destination address NUT_NET0
SPI 0x1000
mode tunnel
protocol ESP
ESP algorithm DES-CBC
ESP algorithm key 01234567

Security Policy Database (SPD)

No SPD entry


TEST PROCEDURE

 Tester                      Target                      Tester
              (Link0)                     (Link1)
   |                           |                           |
   |-------------------------->|                           |
   |      ICMP Echo Request    |                           |
   |        [DSTH][ESP]        |                           |
   |        (with ESP)         |                           |
   |                           |-------------------------->|
   |                           |      ICMP Echo Request    |
   |                           |                           |
   |                           |                           |
   |-------------------------->|                           |
   |      ICMP Echo Request    |                           |
   |        [ESP][DSTH]        |                           |
   |        (with ESP)         |                           |
   |                           | (---------------------->) |
   |                           |    No ICMP Echo Request   |
   |                           |                           |
   |                           |                           |
   |                           |                           |
   v                           v                           v
  1. Send ICMP Echo Request [DSTH][ESP] to Link0
  2. Receive ICMP Echo Request from Link1
  3. Send ICMP Echo Request [ESP][DST] to Link0
  4. Receive No Packet from Link1

ICMP Echo Request [DSTH][ESP] to Link0

IP Header Source Address SG1_NET2
Destination Address NUT_NET0
Destination Options Header Type PadN
ESP SPI 0x1000
Algorithm DES-CBC
Key 01234567
IP Header Source Address HOST1_NET4
Destination Address HOST1_NET1
ICMP Type 128 (Echo Request)

ICMP Echo Request from Link1

IP Header Source Address HOST1_NET4
Destination Address HOST1_NET1
ICMP Type 128 (Echo Request)

ICMP Echo Request [ESP][DSTH] to Link0

IP Header Source Address SG1_NET2
Destination Address NUT_NET0
ESP SPI 0x1000
Algorithm DES-CBC
Key 01234567
Destination Options Header Type PadN
IP Header Source Address HOST1_NET4
Destination Address HOST1_NET1
ICMP Type 128 (Echo Request)

ICMP Echo Request from Link1

IP Header Source Address HOST1_NET4
Destination Address HOST1_NET1
ICMP Type 128 (Echo Request)


JUDGEMENT

  PASS: ICMP Echo Request received


SEE ALSO

  perldoc V6evalTool
  IPSEC.html IPsec Test Common Utility