RTU_E_In_EncryptKey - Router Tunnel Mode ESP Inbound Invalid Encryption Key
Router
RTU_E_In_EncryptKey.seq [-tooloption ...] -pkt RTU_E_EncryptKey.def -tooloption : v6eval tool option See also RTU_E_common.def and RTU_common.def
For details of Network Topology, see 00README
Set NUT's SAD and SPD as following:
(Link0) (Link1) NET4 NET2 NET0 NET1 HOST1_NET4 -- SG1 -- Router -- NUT -- HOST1_NET1 =====tunnel======>
Security Association Database (SAD)
source address | SG1_NET2 |
destination address | NUT_NET0 |
SPI | 0x1000 |
mode | tunnel |
protocol | ESP |
ESP algorithm | DES-CBC |
ESP algorithm key | 01234567 |
Security Policy Database (SPD)
No SPD entry |
Tester Target Tester (Link0) (Link1) | | | |-------------------------->| | | ICMP Echo Request | | | (with ESP) | | | | (---------------------->) | | | No ICMP Echo Request | | | | | | | | | | v v v
ICMP Echo Request with ESP to Link0
IP Header | Source Address | SG1_NET2 |
Destination Address | NUT_NET0 | |
ESP | SPI | 0x1000 |
Algorithm | DES-CBC | |
Key | foo0foo1 | |
IP Header | Source Address | HOST1_NET4 |
Destination Address | HOST1_NET1 | |
ICMP | Type | 128 (Echo Request) |
ICMP Echo Request from Link1
IP Header | Source Address | HOST1_NET4 |
Destination Address | HOST1_NET1 | |
ICMP | Type | 128 (Echo Request) |
PASS: Nothing received
perldoc V6evalTool
IPSEC.html IPsec Test Common Utility