IPSec Test Options


IPSec can be used to encrypt control plane traffic, Data Traffic, or both in a variety of test cases. With the IPSec settings, you can define the Internet Key Exchange (IKE) authentication mode and version used, and the encryption and identification information required to enable the negotiation of the IKE and IPSec Security Agreements (SA) required for IPSec tunnels. In some cases, multiple SAs per MN are supported and you can select the type of traffic that will be associated with each tunnel.

This topic describes the settings that control overall IPSec test support and behavior. The topics listed under Related Parameters describe the settings used during IKE Phase I and Phase II, and the settings that determine how traffic is routed when multiple tunnels are used.


IKE

Use the drop-down list to select the IKE mode for the test. Parameters that are valid for the mode you select are enabled; parameters that are not applicable are disabled.

Options:

Default: IKE With Pre-Shared Keys

IMPORTANT:

  • When MNs use IPSec in any mode except Pre-Provisioned, the maximum Activation Rate and Deactivation Rate are limited to 200 sessions/second or the licensed maximum, whichever is lower.

  • Before executing a test in IKE with RSA Signature mode, the test server must be provisioned with private key and X.509 certificate files generated by a Certificate Authority.

^ Back to Top


IKE Version

Use the drop-down list to select the IKE version used. When you select V2, you can include EAP Authorization and provision the initiator and responder information for each tunnel with the Advanced settings.

NOTES:

  • IKEv2 is not a valid selection for MIPv6 IPSec.

  • IKEv2 must always be selected in a CDMA/WiFi Convergence or PDG Micro-Mobility test since MOBIKE support is mandatory.

Options: V1 or V2

Default: V1

^ Back to Top


Peer ID

Select the Include Peer ID checkbox to specify the contents of the ID-r payload that can be sent in the IKE_AUTH exchange for IKE version 2. Use the Type drop-down list to select the ID type. (Currently, Fully Qualified Domain Names is the only option available.) Define the elements that form the FQDN in the following fields:

Peer Host Name

Range: N/A

Default: PeerAgent

Peer Domain Name

Range: N/A

Default: spirent.net

^ Back to Top


Retry Interval

When IKE Phase I and II will be performed,  Retry Interval defines the maximum number of seconds the test will wait for a required response to an IKE message before re-transmitting the message. Enter 0 to disable retries.

Range: 0— 65535

Default: 30

Related Measurements

^ Back to Top


NAT Traversal

If one of the IPSec peers is an MN, you can use the checkbox to enable IPSec NAT-T, which allows an MN with a private address to exchange IPSec packets with a peer while traversing a NAT gateway. When NAT-T is used, IPSec packets are encapsulated with UDP and a keep-alive packet is sent every 4 minutes to refresh the NAT gateway's UDP bindings.

When you enable NAT-T, you can configure the number of seconds for the NAT Keep-alive Interval timer.

Range: 065535

Default: 240

You can also define the NAT Source Port and NAT Destination Port.

Range: 065535

Default: 4500

NOTE: If the NAT gateway supports IPSec, the gateway will assume that it is the IPSec peer if port 500 is used.

^ Back to Top