Whenever IPSec is used in a test, a local peer will attempt to establish a minimum of one IPSec SA (tunnel) with a remote peer. In some cases, a local peer can establish multiple SAs simultaneously:
With Data IPSec, an MN can establish up to sixteen IPSec tunnels with one or more remote peers and route traffic through a tunnel based on destination and/or data protocol. TCP traffic to one destination could be routed through one tunnel, while UDP traffic to the same destination could be routed through another, for example. You can also configure the test to request that an IPSec gateway assign a private address for each tunnel, and delay IPSec until it is triggered by a DMF.
With MIPv6 IPSec, an MN can establish sixteen different types of tunnels with its HA. Each tunnel is configured to bear a certain type of traffic: Binding messages, Prefix Discovery messages, Route Optimization messages, or Data Traffic (when Route Optimization is not used).
You can choose whether to encrypt traffic in transport or tunnel mode. If the SA will be negotiated using IKE Phase II, you can configure the cipher suite and proposed lifetime for the SA. You can also choose to configure different values to be used with each local peer by provisioning a tunnel with a Test Data File.
This topic describes IKE Phase II settings, the IPSec SA settings, and the settings that determine how traffic is routed when multiple tunnels are supported. The topics listed under Related Parameters describe the Advanced settings used with IKEv2, settings used during IKE Phase I, and the general IPSec options.
|
||
|
|
|
An outbound packet's destination IP address determines whether the packet will be protected with IPSec, and Payload Destination ID defines the minimum amount of information required to select the traffic for a tunnel. If you are testing with Data IPSec or MIPv6 IPSec, however, additional information is required to refine the traffic selection since multiple tunnels are supported.
When one type of tunnel is supported, Payload Destination ID determines which outbound packets will be encrypted. The destination will typically be a SUT such as an LNS or a Diameter Server. With L2TP IPSec, you can leave the field blank and the SUT's address will be used by default.
Range: any valid IP address
Default: 0
The combination of protocol type, destination address, and source and destination ports determine what traffic is routed to which tunnel, allowing you to route two DMFs with the same protocols but different destinations through two different tunnels.
NOTE: If a DMF does not match any of the tunnel configurations, its traffic is transmitted without IPSec. |
The combination of protocol, destination, and ESP Data Mode determines what traffic is routed through which tunnel when MIPv6 IPSec is used in a test.
Use the drop-down list to select the IP protocol for the tunnel's traffic.
Options:
Any — Data Traffic
Mobility Header — HA Binding messages
ICMPv6 Header — Prefix Discovery and Route Optimization messages
Default: Any
NOTE: In Wifi Offload Gateway Nodal test case, the following applies for UE DNS query to learn PDG IP Address:
|
Use the drop-down list to select the lower-most data protocol for the tunnel's traffic. Select TCP for an HTTP message flow, for example. Options:
Default: Any Tcl Parameter: DataIpSecProtoType1 |
|||||||||
The Encapsulating Security Payload protocol encrypts the upper IP layer in Transport mode, and encrypts then entire original IP datagram in Tunnel mode. Use the drop-down list to select the mode for the tunnel. Tcl Parameter: DataIpsecIkePrivateAddrExchType1 Options:
Default: Transport Tcl Parameter: DataIpSecEspDataMode1 |
|||||||||
ISAKMP Exchange Type |
Available when ESP Data Mode is Tunnel and the Protocol Type is TCP. The ISAKMP (Internet Security Association and Key Management Protocol) defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). |
||||||||
Payload Destination Port |
With TCP or UDP traffic, you can route individual DMFs through different tunnels based on the DMF ports. If you are configuring IPSec in a nodal test case, the server is the destination and the client is the source; in the Network Host test case, the client is the destination and the server is the source. Enter 0 to accept any port.
Range: 0 — 65535 Default: 0 Tcl Parameter: DataIpSecPortDest1
Range: 0 — 65535 Default: 0 Tcl Parameter: DataIpSecSrcPort1 |
||||||||
The destination IP address for Data Traffic, which may or may not be the tunnel endpoint. From the MN's perspective, the destination is the Network Host address. From the Network Host's perspective, the destination is the starting MN address.
Range: any valid IP address Default: N/A Tcl Parameter: DataIpSecDestination1 MIPv6 IPSec Payload Destination IDThe IP address for the final destination of outgoing traffic. This is not necessarily the IPSec peer — it is used to indicate the type of traffic that will be routed through the tunnel. Options:
Default: N/A |
|||||||||
You can specify the IP address of the Security Gateway that terminates the tunnel (the peer).
If a Security Gateway is not included in a data test, the Network Host can terminate the Data IPSec tunnel. From the Network Host's perspective, the MN is the Security Gateway. Range: any valid IP address Default: N/A Tcl Parameter: DataIpSecEndPoint1 |
|||||||||
Available in MME Nodal test case under the S1-U interface. In MME Nodal test cases, select to specify an alternate IP address of the Security Gateway on S1-U IPSec. Used in a S1-U IPSec failover scenario. Range: any valid IP address Default: N/A Tcl Parameter: EnbSgwIpSecAltEndPointEn1 Tcl Parameter: EnbSgwIpSecAltEndPoint1 |
|||||||||
Indicates the number of seconds to wait before checking the aliveness of IKE-SA or IKE-DPD. Range: 0 — 65535 Default: 0 Tcl Parameter: DataIkev2DeadPeerTimeX1 When there is outgoing traffic on an SA, the aliveness check is performed to confirm whether the SA is alive to avoid missing messages. If no messages are received on an IKE-SA for a period mentioned in the IKE Liveness Check Times(s), an aliveness check is performed. Receiving messages on an IKE-SA ensures it’s aliveness. Select IKE Liveness Mode - Interval or Idle Time. |
|||||||||
Landslide will initiate a Dead Peer Detection (DPD) exchange by sending "Notify Payload" if it detects idleness, followed by outbound traffic if connection is available. Likewise, an entity can initiate a Dead Peer Detection (DPD) exchange if it has sent outbound IPSec traffic but has not received any inbound IPSec packets in response. The parameter is available for IKE V1 and V2.
Range: 0 - 255 Default: 2 Tcl Parameter: DataIkeMaxAttemptsDpd1 |
|||||||||
The SPI used by the MN in all modes. If you define multiple tunnels, you must use a unique SPI for each tunnel. If the IPSec SA is refreshed, a new SPI will be formed by appending digits to this value. Range: N/A Default: 0 Tcl Parameter: DataIpSecSrcSpi1 |
|||||||||
The SPI used by the peer, which is known by the MN in Pre-Provisioned mode. Range: N/A Default: 0 Tcl Parameter: DataIpSecPeerSpi1 |
|||||||||
When this box is checked (default), SA negotiation begins when an MN's session is established. You can clear the box and trigger SA negotiation when required by a DMF with event controls, allowing you to only protect some of the DMF messages with IPSec. You can send an event from the DMF to start the tunnel, wait for that event to be sent back to the DMF after the tunnel has been established, send an event to stop the tunnel, and also wait for a stop event before continuing. Tcl Parameter: DataAutoStartTun1 |
|||||||||
When IKEv1 is used in the test, Perfect Forward Security (PFS) is optional and can be disabled by clearing the checkbox. When PFS is enabled, a second Diffie-Hellman exchange will be performed during IKE Phase II and you can select the Oakley Group Type...that will be used for the exchange. Tcl Parameter: DataIpSecEnablePfs1
|
|||||||||
Outer IP Type of Service |
A value used in the outer IP header’s Type of Service. Click ... (TOS Calculator) to select and calculate the appropriate value. Available in the Non 3GPP Access GW Node's NWu IPSec tab (Mode = N3IWF) on the PDU 1-15 tunnels tabs. Value range is 0-255, default 0. Tcl variable is "NWuOuterIpTos<suffix>", where suffix = 2-16. The first tunnel tab is NAS PDU that has suffix "1", which does not show Outer IP ToS. So, PDU 1 Tcl var is "NWuOuterIpTos2", PDU 2 is "NWuOuterIpTos3", etc. Enabling requires NWu|TCP Version >= 16.4.0.
|
||||||||
Use AMF SUT as Security Gateway |
Available on AMF Nodal N2 Interface IPSec/Tunnel. Select to use AMF SUT as the Security Gateway. Tcl Parameter: GnbAmfUseSutAsSgAddrEn1 |
||||||||
Use UPF N3/N9 SUT as Security Gateway |
Available on UPF Nodal N3 Interface IPSec/Tunnel. Select to use UPF N3/N9 SUT as the Security Gateway. Tcl Parameter: GnbUpfUseSutAsSgAddrEn1 |
||||||||
For the IPSec IKEv2 you may configure a maximum of 5 cryptographic suites, where each suite contains the Authentication type, Encryption Key Type, Use AEAD Type, Oakley Group type, and Hash type.
The multiple cryptographic suite configuration is also applicable to the Tunnel Settings. If the IPSec peer(s) use multiple suites in the tunnel negotiation, there must be a match of 1 suite between the peers; otherwise, the tunnel will not establish. See for IPSec Algorithm and Keys topic for a description of these parameters: Use the drop-down list to select the ESP encryption algorithm used by the local peer. Enter the local peer's private key in Private Key. Options: NULL, 3DES, AES128, AES192, or AES256 Default: NULL Tcl Parameter: DataPrivateKeyType1
Enable ESN: If enabled , the ESN (Extended Sequence Number) support field in the Transform Payload changes from “No Extended Sequence Numbers (0)” to “Extended Sequence Numbers (1)”.
|
|||||||||
The SA lifetime is requested during IKE Phase II. The test will attempt to refresh the SA with the peer prior to expiration of the lifetime. A different lifetime can be requested for the IKE SA during IKE Phase I.
Options: Seconds or Kilobytes Default: Seconds Tcl Parameter: DataSaLifeDur1
Range: N/A Default: 0 Tcl Parameter: DataSaLifeDurType1 |
|||||||||
Request Private Address Private IPv4 Address Private IPv6 Address Request Private IPv4 DNS Request IPv4 P-CSCF Address Request For Private IPv4 Network Mask Request Private IPv6 DNS Request IPv6 P-CSCF Address
Request Private IPv4 Address Request Private IPv6 Address |
When you select ESP Data Mode as Tunnel mode, you can request that the Security Gateway assign a private address and IPv4 or IPv6 DNS to the tunnel endpoint, allowing the MN to communicate with devices in the private network. Selecting Request Private Address also enables Private IPv4 Address, Private IPv6 Address, and Request For Private IPv4 Network Mask. Request Private IPv6 DNS/Request IPv6 P-CSCF Address/Request For Private IPv4 Network Mask are available when IKE Version = 2. For IPSec tabs with NWu variable prefix that show the Request Private addresses (example : N3IWF Node test case - NWu IPSec tab), the default will be set to selected / true and both Private IPv4 Address and Private IPv6 Address will be defaulted to: On AMF Nodal's NWu IPSec tab, when the IKE setting is "IKE With Pre-Shared Keys" or "IKE With RSA Signature", on the first tunnel tab named "NAS PDU" two checkboxes labeled "Request Private IPv4 Address" and "Request Private IPv6 Address" become available. Both are optional. Per spec TS 24.502 "The UE shall include the INTERNAL_IP4_ADDRESS attribute, the INTERNAL_IP6_ADDRESS attribute, or both, indicating the type of IP address to be used for the IP tunnels, in the CFG_REQUEST configuration payload. The INTERNAL_IP4_ADDRESS attribute shall contain no value and the length field shall be set to 0. The INTERNAL_IP6_ADDRESS attribute shall contain no value and the length field shall be set to 0".
Private IPv4 Address = 1.1.1.1 Private IPv6 Address = 2001::1
Tcl Parameter: DataIkeReqPrivateAddrEn1 Tcl Parameter: DataReqPrivateIpV4Addr1 Tcl Parameter: DataReqPrivateIpV6Addr1 Tcl Parameter: DataRequestIpV4DNS1 Tcl Parameter: DataRequestIpV4Pcscf1 Tcl Parameter: DataRequestIpV4NetMask1 Tcl Parameter: DataRequestIpV6DNS1 Tcl Parameter: DataRequestIpV6Pcscf1 Tcl Parameter: WfoApIkeReqPrivateAddrEn1 Tcl Parameter: WfoApRequestIpV4DNS1 Tcl Parameter: WfoApPrivateIpV6Addr1 Tcl Parameter: WfoApRequestIpV4Pcscf1 Tcl Parameter: WfoApRequestIpV4NetMask1 Tcl Parameter: WfoApRequestIpV6DNS1 Tcl Parameter: WfoApRequestIpV6Pcscf1 Tcl Parameter: NWuIkeReqPrivateAddrEn1 Tcl Parameter: NWuReqPrivateIpV4Addr1 Tcl Parameter: NWuReqPrivateIpV6Addr1 Tcl Parameter: NWuIkev2ReqPrivIpV4AddrEn1 Tcl Parameter: NWuIkev2ReqPrivIpV6AddrEn1 Tcl Parameter: NWuRequestIpV4DNS1 |
||||||||
Advanced... |
See Advanced IPSec Settings if you are testing with IKEv2. |
DataCfgFileEn1 |
BsAsnCfgFileEn1 |
Mip4CfgFileEn1 |
Mip6CfgFileEn1 |
NOTES:
|