IPSec Site-to-Site VPN Test Plan
Author: Laxmanagouda Patil
+----+ 140.1.1.0/24 +----+ 150.1.1.0/24 +----+
Head Office | R1 |----------------| R2 |-----------------| R3 | Branch Office
+----+ dp0s9 dp0s3 +----+ dp0s8 dp0s8 +----+
dp0s3 / <========= IPSEC VPN Tunnel ========> \ dp0s3
/ \
/ 10.1.1.0/24 \ 172.16.1.0/24
/ \
+------+ +------+
| LAN1 | | LAN2 |
+------+ +------+
- 1 Test Cases
- 1.1 dan-ipsec_01 - Launch, Installation and validation of DANOS software on Ubuntu s/w (18.0.4) and KVM based hypervisor
- 1.2 dan-ipsec_02 - Test case to bring up and validate site-to-site IPSec tunnel
- 1.3 dan-ipsec_03 - Test case to validate IPSec tunnel is able to re-establish after reset
- 1.4 dan-ipsec_04 - Validate IPSec tunnel is able to re-establish tunnel after lifetime expires
- 1.5 dan-ipsec_05 - Validate IPSec tunnel is able to recreate tunnel after change in ESP encryption parameters
- 1.6 dan-ipsec_06 - Validate IPSec tunnel is able to recreate tunnel after change in IKE hash parameters
- 1.7 dan-ipsec_07 - Validate IPSec tunnel is able to reestablish tunnel after change in authentication key
- 1.8 dan-ipsec_08 - Validate IPSec tunnel is able to establish more than one tunnel with different configuration
- 1.9 dan-ipsec_09 - Validate IPSec tunnel is able to establish with authentication using RSA key
- 1.10 dan-ipsec_10 - Validate IPSec tunnel is able to establish with authentication using X.509 certificate
- 1.11 dan-ipsec_11 - Validate IPSec tunnel when local IP address is removed and reconfigured
- 1.12 dan-ipsec_12 - Validate IPSec tunnel when remote IP address is removed and reconfigured
Test Cases
dan-ipsec_01 - Launch, Installation and validation of DANOS software on Ubuntu s/w (18.0.4) and KVM based hypervisor
Test Purpose: | The purpose of this test is to validate the installation of DANOS s/w on KVM based VMs |
Test Setup: | As per the diagram Topology1: DANOS-IPSec |
Prerequisites: | · VM launched on top of X86 server with below configuration o Ubuntu 18.04 LTS with 4GB RAM and 8GB harddisk o Supported NICs (4 Interfaces) · KVM Virt-Manager |
Procedure: |
install image”
vyatta”
|
Expected Results: |
|
dan-ipsec_02 - Test case to bring up and validate site-to-site IPSec tunnel
Test Purpose: | The purpose of this test is to emulate Head-Office to Branch-office connectivity using two VMs connected behind the router |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
|
Expected Results: |
|
dan-ipsec_03 - Test case to validate IPSec tunnel is able to re-establish after reset
Test Purpose: | The purpose of this test is to verify connectivity b/n two VMs over tunnel |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
o “reset vpn ipsec-peer” on router R3
|
Expected Results: |
|
dan-ipsec_04 - Validate IPSec tunnel is able to re-establish tunnel after lifetime expires
Test Purpose: | Test case to validate IPSec tunnel re-establishment after lifetime expiry |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
|
Expected Results: |
|
dan-ipsec_05 - Validate IPSec tunnel is able to recreate tunnel after change in ESP encryption parameters
Test Purpose: | Test case to validate tunnel re-establishment after change in ESP parameters |
Test Setup: | As per the diagram Topology1: DANOS-IPSec |
Prerequisites: |
aes128gcm128” |
Procedure: |
aes256” on router R1
|
Expected Results: |
|
dan-ipsec_06 - Validate IPSec tunnel is able to recreate tunnel after change in IKE hash parameters
Test Purpose: | Test case to validate tunnel reestablishment after change in IKE HASH parameters |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
sha1_160” |
Procedure: |
sha2_512” on router R1
|
Expected Results: |
|
dan-ipsec_07 - Validate IPSec tunnel is able to reestablish tunnel after change in authentication key
Test Purpose: | Test case to validate tunnel reestablishment after change/revert in authentication key |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
test123” on router R1
|
Expected Results: |
|
dan-ipsec_08 - Validate IPSec tunnel is able to establish more than one tunnel with different configuration
Test Purpose: | Test case to validate more than one tunnel creation with different IPSec params |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
|
Expected Results: |
|
dan-ipsec_09 - Validate IPSec tunnel is able to establish with authentication using RSA key
Test Purpose: | Test case to validate IPSec tunnel establish when authentication mode is set to RSA key |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
RSA-KEY”
|
Expected Results: |
|
dan-ipsec_10 - Validate IPSec tunnel is able to establish with authentication using X.509 certificate
Test Purpose: | Test case to validate IPSec tunnel establish when authentication mode is set to X.509 certificate |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
X.509 certificate”
|
Expected Results: |
X.509 certificate
|
dan-ipsec_11 - Validate IPSec tunnel when local IP address is removed and reconfigured
Test Purpose: | Test case to validate IPSec tunnel when local IP address is removed and reconfigured |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
|
Expected Results: |
|
dan-ipsec_12 - Validate IPSec tunnel when remote IP address is removed and reconfigured
Test Purpose: | Test case to validate IPSec tunnel when remote IP address is removed and reconfigured |
Test Setup: | As per diagram Topology1: DANOS-IPSec |
Prerequisites: |
|
Procedure: |
|
Expected Results: |
|