RTU_E_In_PadLen255 - Router Tunnel Mode ESP Inbound Padding Length is 255
Router
RTU_E_In_PadLen255.seq [-tooloption ...] -pkt RTU_E_PadLen255.def
-tooloption : v6eval tool option
See also RTU_E_common.def and RTU_common.def
For details of Network Topology, see 00README
Set NUT's SAD and SPD as following:
(Link0) (Link1)
NET4 NET2 NET0 NET1
HOST1_NET4 -- SG1 -- Router -- NUT -- HOST1_NET1
=====tunnel======>
Security Association Database (SAD)
| source address | SG1_NET2 |
| destination address | NUT_NET0 |
| SPI | 0x1000 |
| mode | tunnel |
| protocol | ESP |
| ESP algorithm | DES-CBC |
| ESP algorithm key | TAHITEST |
Security Policy Database (SPD)
| No SPD entry |
Tester Target Tester
(Link0) (Link1)
| | |
|-------------------------->| |
| ICMP Echo Request | |
| (with ESP) | |
| |-------------------------->|
| | ICMP Echo Request |
| | |
| | |
| | |
v v v
ICMP Echo Request with ESP to Link0
| IP Header | Source Address | SG1_NET2 |
| Destination Address | NUT_NET0 | |
| ESP | SPI | 0x1000 |
| Algorithm | NULL | |
| Authentication | HMAC-MD5 | |
| Authentication Key | TAHITEST89ABCDEF | |
| Padding | Sequential | |
| Padding Length | 255 | |
| IP Header | Source Address | HOST1_NET4 |
| Destination Address | HOST1_NET1 | |
| ICMP | Type | 128 (Echo Request) |
| Data Length | 207 |
ICMP Echo Request from Link1
| IP Header | Source Address | HOST1_NET4 |
| Destination Address | HOST1_NET1 | |
| ICMP | Type | 128 (Echo Request) |
| Data Length | 207 |
PASS: ICMP Echo Request received
perldoc V6evalTool
IPSEC.html IPsec Test Common Utility