|
US$1979.00 · In stock Delivery: <= 13 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 28456-2012: Testing specification for applications of IPsec protocol Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 28456-2012 | English | 1979 |
Add to Cart
|
13 days [Need to translate]
|
Testing specification for applications of IPsec protocol
| Valid |
GB/T 28456-2012
|
PDF similar to GB/T 28456-2012
Basic data | Standard ID | GB/T 28456-2012 (GB/T28456-2012) | | Description (Translated English) | Testing specification for applications of IPsec protocol | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.020 | | Word Count Estimation | 90,999 | | Quoted Standard | GB/T 5271.8-2001; GB/T 17178.1-1997 | | Regulation (derived from) | National Standards Bulletin No. 13 of 2012 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | | Summary | This standard specifies the IPsec protocol application test content and test steps. This standard applies to the IPsec protocol application development unit, a third party authorized testing and certification bodies, users, etc. for IPsec protocol applica |
GB/T 28456-2012: Testing specification for applications of IPsec protocol---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Testing specification for applications of IPsec protocol
ICS 35.020
L80
National Standards of People's Republic of China
IPsec application protocol test specification
Issued on. 2012-06-29
2012-10-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 4
Test description 4 5
5.1 Test Object Description 4
5.2 Test Description 5
5.3 Test Environment Note 5
6 6 test content
6.1 AH transport mode test content 6
6.2 AH tunnel mode test content 7
6.3 ESP transport mode test content 8
6.4 ESP tunnel mode test content 9
6.5 Transfer mode adjacent test content 10
6.6 Iterative tunnel mode test content 11
6.7 IKEv1 main mode test content 12
6.8 IKEv1 aggressive mode test content 14
6.9 IKEv1 quick mode test content 16
6.10 IKEv2 Initial Exchanges test content 17
6.11 IKEv2 create sub SA exchange test content 19
6.12 IKEv2 information exchange test content 20
7 Test Procedure 21
7.1 AH transport mode test step 21
7.2 AH tunnel mode test step 25
7.3 ESP transport mode test step 26
7.4 ESP tunnel mode test step 30
7.5 Transfer adjacent mode test step 31
7.6 Iterative tunnel mode test step 33
7.7 IKEv1 Main Mode Test Procedure 36
7.8 IKEv1 Aggressive Mode Test Procedure 43
7.9 IKEv1 quick mode test step 47
7.10 IKEv2 Initial Exchanges test step 52
7.11 IKEv2 create sub SA exchange test step 59
7.12 IKEv2 information exchange test step 63
Appendix A (Informative Appendix) IPsec protocol specification 66
Appendix B (Informative Appendix) IKEv1 key exchange mechanism 69
Appendix C (Informative Appendix) IKEv2 key exchange mechanism 79
References 84
Network topology Figure 1 IPsec protocol application testing 5
Figure A.1 adjacent transport combined mode 67
Figure A.2 same tunnel endpoint recursive tunnel combined mode 68
Figure A.3 a same tunnel endpoint recursive tunnel combined mode 68
Figure A.4 tunnel endpoints are not the same iteration tunnel combined mode 68
Figure B.1 IKEv1 Main Mode exchange initiator behavior state of FIG. 72
Figure B.2 IKEv1 Main Mode exchange responder behavior state of FIG. 73
Figure B.3 IKEv1 aggressive mode exchange initiator behavior state of FIG. 75
Figure B.4 IKEv1 aggressive mode exchange responder behavior state of FIG. 76
Figure B.5 IKEv1 quick mode exchange initiator behavior state diagram 77
Figure B.6 IKEv1 quick mode exchange responder behavior state 78
Figure C.1 IKEv2 Initial Exchanges initiator behavior state of FIG. 80
Figure C.2 IKEv2 Initial Exchanges responder behavior state of FIG. 81
Figure C.3 IKEv2 create CHILDSA exchange initiator behavior state of FIG. 82
Figure C.4 IKEv2 create CHILDSA exchange responder behavior state of FIG. 83
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
Please note that some of the content of this document may involve patents. Release mechanism of the present document does not assume responsibility for the identification of these patents.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
This standard was drafted. Information Engineering, Information Engineering University.
The main drafters of this standard. Zeng Yong-jun, WANG Qing-xian, Yanxue Xiong, Wu Dongying, Zhujun Hu, Yin Meijuan.
Introduction
IPsec network security protocol is widely used, the relevant product categories. Although the manufacturers are claiming to support IPsec protocol,
However, due to different protocols of understanding, resulting in product implementation, to complete the function, there are differences on the security services provided. Also present
Lack of standardized assessment and detection methods, it is difficult to determine the IPsec protocol and application protocol standards conformance, difficult to give an accurate assessment of products
Classification and price, which is not conducive to the promotion and use of IPsec protocol. To further regulate the development of the IPsec protocol, evaluation and use, it is necessary to
Test standard IPsec protocol to study and develop.
This standard is a test standard IPsec protocol applications, developed in accordance with the relevant protocol IPsec RFC standards.
According to this standard IPsec protocol mode, functionality, performance, robustness, and interoperability test content and organizational design
Test steps. Test procedure given in this standard, designed to regulate the basic test steps and key points, the tester can select on the basis of relative
Off aids, generate specific test cases and test.
IPsec application protocol test specification
1 Scope
This standard test content and test procedures were applied IPsec protocol specification.
This standard applies to measuring application IPsec protocol application development unit, third-party testing and certification bodies authorized user of IPsec and other protocols
Reference used again.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB/T 5271.8-2001 Information technology - Vocabulary - Part 8. Security
GB/T 17178.1-1997 Information technology - OSI conformance testing methodology and framework - Part 1. Basic Concepts
3 Terms and Definitions
GB/T 5271.8-2001 defined and the following terms and definitions apply to this document.
3.1
IP Security Protocol IPsecurity
A set of security protocols for protecting IP communications. It is a series of optional protocol to IPv4, IPv6 is one of the components,
It is a network layer protocol. It provides authentication and encryption two security mechanisms. authentication mechanism so that the data recipient can confirm the number of IP communication
According to the sender's identity and whether the data during transmission has been tampered with; encryption mechanisms by encoding data to ensure data
Confidentiality, prevent data from being intercepted during transmission and compromised.
3.2
IPsec protocol application applicationoftheIPsecprotocol
Product or function module in accordance with the IPsec protocol standard to achieve.
3.3
Security Association securityassociation
One kind of agreement between the two communicating entities set up in consultation, which describes how to use the Entity security services to communicate securely.
Security association includes information to perform a variety of network security services required.
3.4
Associated Internet Security and Key Management Protocol internetsecurityassociationandkeymanagementprotocol
Defines establish, negotiate, modify and delete security associations process and packet formats, exchange and defines key generation and authentication data
Payload format. The format for the transfer key and authentication information provides a consistent framework.
3.5
Load payload
ISAKMP traffic exchanged form of transmission of information, it is the basic unit structure ISAKMP message.
3.6
Authentication Header authenticationheader
A protocol belonging IPsec for providing data integrity IP datagram, data origin authentication and anti-replay service attack.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 28456-2012_English be delivered?Answer: Upon your order, we will start to translate GB/T 28456-2012_English as soon as possible, and keep you informed of the progress. The lead time is typically 9 ~ 13 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 28456-2012_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 28456-2012_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|