Interoperability Test Result Matrix


[A word about viewing the matrix results]

[A word about Marks & Symbols used within the Matrix]

OO: Both Initiater & Responder Tests [Step 1] completed successfully.
O: Test completion for the marked portion only.
X: Test did not complete successfully.
*1: Re-keying started from Phase I for [Step 2] instead of Phase II.
Lt Blue
Bkgd
:
There was either not enough time to perform Step 2 or test was not perform for other reasons .

Test Result Matrix (Step 1)

  Responder

Initiator

Watch
Guard
Shiva VPN Gateway Plus PERMIT Ravlin Raptor Firewall NT Side Winder Security Server Contivity Extranet Switch OneGate (Free Gate) 1000 cIPro VPNet Mucho -EV Yamaha RT140e Cisco 1700 A2DIS Path Builder SafeNet Fort Knox STAR-
Gateware
WatchGuard Watch
Guard
  OO OO X X X OO OO OO OO O O   OO X OO O
Shiva O Shiva OO OO X O X OO O OO OO X X   O O OO O
PERMIT OO OO PERMIT OO OO OO ? OO OO OO OO OO OO   OO OO OO OO
Ravlin OO OO OO Ravlin OO OO X OO X OO OO O OO   OO X OO OO
Raptor X O OO OO Raptor O X X OO OO OO X X   O OO X OO
SideWinder X X OO OO X Side Winder X X X OO OO X X   X X X X
Contivity O X O X X O Contivity X O O O X O   X X X X
OneGate OO OO OO OO O X X OneGate O OO O X OO   X X X X
cIPro OO X OO O OO O X X cIPro OO OO   OO   X X X OO
VPNet OO OO OO OO OO OO X OO OO VPNet OO OO OO   X OO OO OO
Mucho-EV OO OO OO OO OO OO X X OO OO Mucho OO OO   OO OO OO OO
Yamaha X X OO X O X X O   OO OO Yamaha OO   OO X   X
Cisco 1700 X O OO OO X O X OO OO OO OO OO Cisco   X OO OO OO
A2DIS                           A2DIS        
PathBuilder OO X OO OO X X X O O O OO OO O   Path Builder X OO O
SafeNet X X OO O OO O X X X OO OO X OO   X SafeNet X OO
FortKnox OO OO OO OO X O X O O OO OO   OO   OO X Fort Knox O
STAR-
Gateware
X X OO OO OO O X X OO OO OO O OO   X OO X STAR-
Gateware

Test Result Matrix (Step 2)

The products included in this [Step 2] Matrix are only those which successfully completed [Step 1] with a [OO].


  Responder

Initiator

Watch
Guard
Shiva VPN Gateway Plus PERMIT Ravlin Raptor Firewall NT Side Winder Security Server Contivity Extranet Switch OneGate (Free Gate) 1000 cIPro VPNet Mucho -EV Yamaha RT140e Cisco 1700 A2DIS Path Builder SafeNet Fort Knox STAR-
Gateware
WatchGuard Watch Guard T OO OO T T T - - OO OO T T T OO T O T
Shiva T Shiva ? ? T T T ? T ? ? T T T T T - T
PERMIT OO O PERMIT OO OO OO T - OO OO OO O OO T OO - - OO
Ravlin OO O OO Ravlin OO OO T - T OO OO T OO T OO T T OO
Raptor T T OO OO Raptor T T T - OO OO T T T T OO T OO
Side Winder T T OO OO T Side Winder T T T OO OO T T T T T T T
Contivity T T T T T T Contivity T T T T T T T T T T T
OneGate O - - O   T T OneGate   O T T - T T T T T
cIPro O T OO T - T T   cIPro OO OO   OO T T T T OO
VPNet OO O OO OO OO OO T - OO VPNet OO O OO T T OO - OO
Mucho-EV OO O OO OO OO OO T T OO OO Mucho ? OO T OO O ? OO
YAMAHA T T ? T T T T T   ? ? Yamaha ? T ? T   T
Cisco 1700 T T OO OO T T T - OO OO OO ? Cisco T T - - OO
A2DIS T T T T T T T T T T T T T A2DIS T T T T
PathBuilder OO T OO OO T T T T T T OO ? T T Path Builder T T T
SafeNet T T O T OO T T T T OO ? T - T T SafeNet T OO
FortKnox ? - O O T T T T T O ?   O T O T Fort Knox T
STAR-
Gateware
T T OO OO OO T T T OO OO OO T OO T T OO T STAR-
Gateware



[Amendments]


Amendment 1 Shiva VPN Gateway The [SA Lifetime] and [ISAKMP LifeTime] settings are one in the same, thus [Step 2] (Phase II only) could not be completed without restarting at [Step 1] Phase 1 again.

Operationally, proper communications can be re-established from Phase 1 each time although it will require the Phase I additional traffic each time it is re-negotiated.

Also, if the other side initiates a Phase II first, an error will occur on the remote side and a new negotiation process will re-start from Phase II again.
Amendment 2 FortKnox The SA LifeTime only lasts for half of the time which is specified. Also, occasionally during re-keying, several Pinged packets tend to timeout during the Phase II re-negotiation process which should occur instantly which may interrupt communications for several seconds.

Manufacturer has said that this problem will be fixed in a future release.
Amendment 3 OneGate This is actually a beta version and was included in the testing, but the results will not be published.

A final release version is expected in the near future though.
Amendment 4 YAMAHA RT-140 This is actually a beta version and was included in the testing, but the results will not be published.

A final release version is expected in the near future though.
Amendment 5 A2DIS VPNGateway This product was able to establish secure communications with several vendors, but as it's unique [Identification] method caused negotiation [Fail] errors on various other vendors equipment, it was not included in this report.

This is actually a beta version and was included in the testing, but the results will not be published.

A final release version is expected in the near future though.
Amendment 6 SafeNet This client supports an internal Virtual IP address support which is supported in the latest specifications, but which also didn't work with vendors whom didn't support the latest specs.

If both the Peer and Target IP are one in the same, some vendors won't communicate with it. These vendors' products haven't yet provided the [Virtual IP Address] support in their products yet.

One interesting item noticed was that 3Com's box send the same packet twice in both Secure and Clear Traffic when both Peer and Target IP addresses were the same. This problem is supposedly fixed in their latest release.


For those devices which did not pass [Step 1] and/or [Step 2], the main cause and supposition are included below:

To discover the main cause of not being able to pass the tests, the IKEVIEW Analyzer and Debug Logs included in other vendors products were used to summarize the findings.
Even if certain devices were unable to pass all of the specified tests, by using various other settings not specified for this test, secure communications were able to be established.

(Just because some devices didn't pass the [Step 2] test per NTT's specifications
doesn't necessarily mean that they were totally unable to securely communicate.)


Note 1 Misuse of the [ID_Type] and [Identification_Data] within the [Identification_Payload] was the major cause of FAIL errors between devices.
(ID_TYPEFID_IPV4_ADDRAID_IPV4_ADDR_SUBNET, etc.)
Many of the times, the [Notification] message specified that the HASH(2) portion didn't respond and thus negotiations were terminated.
Several of the devices required specific fine-tuning to the parameters (usually scripts, or text editable parameters) before successful communications were made.
Ex) Cisco & Sidewinder
Note 2 Some of the Phase I failures were caused by the IPSEC Notify Messages "INITIAL_CONTACT" could not be made.
Upon modification of certain parameters without rebooting some machine caused many of the "INITIAL_CONTACT" errors. This is probably due to the fact that an SA was previously established using one set of parameters and to clear those already learned settings, some systems had to be reset.
Note 3 If the Responder could not identify the "Vender_ID" of the originator, it was reported as a failure. This could also be related to Note 1: above.
If Phase1 cannot properly identify the payload, it cannot complete Phase 1 and therefore is fails to establish a secure session.
Problems related to this were in the form of [PAYLOAD_MALFORM], [PAYLOAD_SYNTAX_ERROR], etc.
Depending on the version of both VPN devices, the information provided in the "Vender_ID" depends on each manufacturer's implementation.
Ex) Shiva VPN Gateway & RaptorFirewall
Note 4 If the "IKE LifeTime" with in the proposal_payload is blank, it will cause Phase 1 to fail. Per specifications, this cannot be blank. The IPSec spec defaults to 28800 seconds if not specified otherwise by user.
Note 5 If the device does not support "Multi-proposals" in the "Proposal_Payload", it will FAIL Phase1.
This could occur if either:
     - One (1) Proposal includes multiple Transforms.
     - Multiple Proposals are sent consecutively.
This problem can be overcome by closely examining the devices and by fine tuning where required.
Ex) StarGateware & Sidewinder
Note 6 Invalid Proposals were the main cause of the Responder not being able to process the request properly and thus it would FAIL the test between both devices.
Ex) Ravlin & Contivity
Note 7 If the [IKE LifeTime] & [IPSEC SA LifeTime] settings are one in the same, upon re-keying a new SA, the negotiation re-starts at Phase 1 instead of Phase 2.
Note: If the Phase 1 netogiation is restarted properly, then communications can continue and there is no real problem other than it FAILS to renegotiate from Phase 2 only and thus FAILS the specified Step 2 test.
See the comments at the end of STEP 2 for more details.
Ex) ShivaVPNGateway & Permit
Note 8 A word about [Re-Key] negotiation FAILures:
Depending on how the [IPSEC SA LifeTime] was set, when the Responder initiates the [Re-Key] request, the Initiator must reply to the [Re-Key] negotiation, but the following problems were experienced by the Responder:
    Pattern 1: Renegotiation is not performed.
    Pattern 2: All ESP packets are ignored and then the Initiator starts the [Re-Key] request and it completes successfully.
    Pattern 3: The current SA is Deleted and re-negotiation starts at Phase 1.
During actual testing, various parameters had to be fine tuned on several vendors' products for this to be performed properly.
Ex) FortKnox CE & VPNet

Other problems also existed but they are still being diagnosed.

Back