Scep

These scenarios show how to configure the protocol SCEP to retrieve certificates from a PKI server; and then, establish a VPN site-to-site connection between two end-points.

../../../../_images/scep.svg

Test SCEP Credentials Ready

Description

In this scenario, the credentials (X509 certificates) are retrieved before VPN settings are configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 10.215.168.64/24
set protocols static route 192.168.212.0/22 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT2 :

set interfaces ethernet eth1 address 10.215.168.66/24
set protocols static route 192.168.212.0/22 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Ping IP address 192.168.213.25 from DUT0:

admin@DUT0$ ping 192.168.213.25 count 1 size 56 timeout 1
Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data.
64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.606 ms

--- 192.168.213.25 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.606/0.606/0.606/0.000 ms

Step 4: Ping IP address 192.168.213.25 from DUT2:

admin@DUT2$ ping 192.168.213.25 count 1 size 56 timeout 1
Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data.
64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.566 ms

--- 192.168.213.25 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.566/0.566/0.566/0.000 ms

Step 5: Modify the following configuration lines in DUT0 :

set interfaces dummy dum0 address 192.168.1.1/24
set interfaces ethernet eth0 address 8.0.0.2/24
set protocols static route 0.0.0.0/0 next-hop 8.0.0.1
set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe
set system certificate scep csr CSR distinguished-names 'DC=scep, DC=com, CN=entity1'
set system certificate scep csr CSR encrypted-password U2FsdGVkX19vzQgJcUpZ1tFjtqk59/EmZRNcI/7RnONmTDcQgToO5Xvv+t2vWDhIbWrzh2J+yD7hFTJqv1weTg==
set system certificate scep csr CSR url 'http://192.168.213.25/'

Step 6: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 8.0.0.1/24
set interfaces ethernet eth1 address 9.0.0.1/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 7: Modify the following configuration lines in DUT2 :

set interfaces dummy dum0 address 192.168.2.1/24
set interfaces ethernet eth0 address 9.0.0.2/24
set protocols static route 0.0.0.0/0 next-hop 9.0.0.1
set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe
set system certificate scep csr CSR distinguished-names 'DC=scep, DC=com, CN=entity2'
set system certificate scep csr CSR encrypted-password U2FsdGVkX189upu4iaCk81p3Qurxkp+lNMQhZaR3SiAaxfOU7hHLznmwUVK6B7NCKpyQmcYLiToT9hS4Nzxd0Q==
set system certificate scep csr CSR url 'http://192.168.213.25/'

Step 8: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:

CA_CERT\s+Valid
USER_CERT\s+Valid
Show output
-----------------------------------------------------------------------
Certificate  Status         NotBefore                  NotAfter
-----------------------------------------------------------------------
CA_CERT      Valid   Dec 14 10:00:35 2023 GMT  Dec 14 10:10:34 2053 GMT
USER_CERT    Valid   Jan 10 14:39:04 2025 GMT  Jan 10 18:39:04 2025 GMT

Step 9: Run command pki scep show CSR at DUT2 and check if output matches the following regular expressions:

CA_CERT\s+Valid
USER_CERT\s+Valid
Show output
-----------------------------------------------------------------------
Certificate  Status         NotBefore                  NotAfter
-----------------------------------------------------------------------
CA_CERT      Valid   Dec 14 10:00:35 2023 GMT  Dec 14 10:10:34 2053 GMT
USER_CERT    Valid   Jan 10 14:39:06 2025 GMT  Jan 10 18:39:06 2025 GMT

Note

Now, the credentials are ready, so let’s configure the VPN site-to-site tunnel.

Step 10: Modify the following configuration lines in DUT0 :

set vpn ipsec auth-profile AUTH local csr CSR
set vpn ipsec auth-profile AUTH mirror-config false
set vpn ipsec auth-profile AUTH mode x509
set vpn ipsec esp-group ESP-POLICY lifetime 28800
set vpn ipsec esp-group ESP-POLICY proposal 1 encryption null
set vpn ipsec esp-group ESP-POLICY proposal 1 hash sha1
set vpn ipsec esp-group ESP-POLICY proposal 1 pfs dh-group15
set vpn ipsec ike-group IKE-POLICY key-exchange ikev2
set vpn ipsec ike-group IKE-POLICY lifetime 28800
set vpn ipsec ike-group IKE-POLICY proposal 1 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 1 encryption null
set vpn ipsec ike-group IKE-POLICY proposal 1 hash sha1
set vpn ipsec ike-group IKE-POLICY proposal 2 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 2 encryption aes256
set vpn ipsec ike-group IKE-POLICY proposal 2 hash sha1
set vpn ipsec logging log-types any log-level 1
set vpn ipsec site-to-site peer PEER auth-profile AUTH
set vpn ipsec site-to-site peer PEER connection-type initiate
set vpn ipsec site-to-site peer PEER ike-group IKE-POLICY
set vpn ipsec site-to-site peer PEER local-address 8.0.0.2
set vpn ipsec site-to-site peer PEER remote-address 9.0.0.2
set vpn ipsec site-to-site peer PEER tunnel 1 esp-group ESP-POLICY
set vpn ipsec site-to-site peer PEER tunnel 1 local prefix 192.168.1.0/24
set vpn ipsec site-to-site peer PEER tunnel 1 remote prefix 192.168.2.0/24

Step 11: Modify the following configuration lines in DUT2 :

set vpn ipsec auth-profile AUTH local csr CSR
set vpn ipsec auth-profile AUTH mirror-config false
set vpn ipsec auth-profile AUTH mode x509
set vpn ipsec esp-group ESP-POLICY lifetime 28800
set vpn ipsec esp-group ESP-POLICY proposal 1 encryption null
set vpn ipsec esp-group ESP-POLICY proposal 1 hash sha1
set vpn ipsec esp-group ESP-POLICY proposal 1 pfs dh-group15
set vpn ipsec ike-group IKE-POLICY key-exchange ikev2
set vpn ipsec ike-group IKE-POLICY lifetime 28800
set vpn ipsec ike-group IKE-POLICY proposal 1 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 1 encryption null
set vpn ipsec ike-group IKE-POLICY proposal 1 hash sha1
set vpn ipsec ike-group IKE-POLICY proposal 2 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 2 encryption aes256
set vpn ipsec ike-group IKE-POLICY proposal 2 hash sha1
set vpn ipsec logging log-types any log-level 1
set vpn ipsec site-to-site peer PEER auth-profile AUTH
set vpn ipsec site-to-site peer PEER connection-type respond
set vpn ipsec site-to-site peer PEER ike-group IKE-POLICY
set vpn ipsec site-to-site peer PEER local-address 9.0.0.2
set vpn ipsec site-to-site peer PEER remote-address 8.0.0.2
set vpn ipsec site-to-site peer PEER tunnel 1 esp-group ESP-POLICY
set vpn ipsec site-to-site peer PEER tunnel 1 local prefix 192.168.2.0/24
set vpn ipsec site-to-site peer PEER tunnel 1 remote prefix 192.168.1.0/24

Step 12: Run command vpn ipsec show sa at DUT0 and check if output matches the following regular expressions:

vpn-peer-PEER: \#\d, ESTABLISHED, IKEv2
Show output
vpn-peer-PEER: #1, ESTABLISHED, IKEv2, 3b1698f33f5552c3_i* 85e64c0d76ae8dc4_r
  local  'DC=scep, DC=com, CN=entity1' @ 8.0.0.2[500]
  remote 'DC=scep, DC=com, CN=entity2' @ 9.0.0.2[500]
  NULL/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_3072
  established 18s ago, rekeying in 14594s
  peer-PEER-tunnel-1: #1, reqid 1, INSTALLED, TUNNEL, ESP:NULL/HMAC_SHA1_96
    installed 18s ago, rekeying in 22377s, expires in 31662s
    in  c76d5476,      0 bytes,     0 packets
    out c751868f,      0 bytes,     0 packets
    local  192.168.1.0/24
    remote 192.168.2.0/24

Step 13: Run command vpn ipsec show sa at DUT2 and check if output matches the following regular expressions:

vpn-peer-PEER: \#\d, ESTABLISHED, IKEv2
Show output
vpn-peer-PEER: #1, ESTABLISHED, IKEv2, 3b1698f33f5552c3_i 85e64c0d76ae8dc4_r*
  local  'DC=scep, DC=com, CN=entity2' @ 9.0.0.2[500]
  remote 'DC=scep, DC=com, CN=entity1' @ 8.0.0.2[500]
  NULL/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_3072
  established 19s ago, rekeying in 22912s
  peer-PEER-tunnel-1: #1, reqid 1, INSTALLED, TUNNEL, ESP:NULL/HMAC_SHA1_96
    installed 19s ago, rekeying in 15855s, expires in 31661s
    in  c751868f,      0 bytes,     0 packets
    out c76d5476,      0 bytes,     0 packets
    local  192.168.2.0/24
    remote 192.168.1.0/24

Step 14: Run command pki show remote-certificate site-to-site PEER filter-issuer TELDAT at DUT0 and check if output contains the following tokens:

DC = scep, DC = com, CN = entity2
Show output
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0c:34:ca:27:d7:f2:55:c7:f4:00:00:00:00:8c:0c
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:39:04 2025 GMT
            Not After : Jan 10 18:39:04 2025 GMT
        Subject: DC = scep, DC = com, CN = entity1
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:b5:8f:59:c9:59:0f:2f:01:3e:90:6e:34:99:79:
                    29:2d:c7:fb:2d:f7:0c:12:5d:38:57:e3:b5:2b:fc:
                    07:62:c5:f3:95:ef:e8:bd:c1:7d:77:1a:61:92:b2:
                    fb:c2:65:8e:62:41:fc:f1:fa:fe:d0:5d:1c:a1:cc:
                    e8:9d:75:7b:c9:d8:8e:af:89:43:14:64:56:06:7f:
                    94:ad:a4:23:1d:a8:98:3a:89:59:ae:9e:42:83:d7:
                    b7:c8:02:b1:27:a1:9d:3a:69:fb:95:65:8f:95:23:
                    de:d9:ed:3e:55:84:7c:c5:7e:01:37:38:22:15:9a:
                    60:89:1f:92:34:af:d0:7f:83:0f:96:59:a3:95:17:
                    23:bc:c2:00:6d:47:1b:ce:cd:26:9d:ca:39:83:c6:
                    b8:e1:ab:08:6f:d0:6d:a9:72:1d:6e:39:76:ca:9c:
                    14:f9:9f:ea:60:3d:24:58:1f:df:3c:3a:0d:35:f7:
                    4a:e9:71:c8:96:d5:91:60:5a:8b:1b:b0:d3:36:b0:
                    5c:50:df:04:b2:b0:5c:30:4d:7c:5b:49:ee:c1:91:
                    03:a8:20:3b:1b:39:ce:70:f8:be:37:48:2d:35:d4:
                    5a:e1:34:8b:0f:6c:1f:3a:3f:d6:90:88:43:60:40:
                    16:d8:96:d3:72:58:96:64:fb:80:17:08:53:0f:dd:
                    20:61
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                52:37:63:99:7F:7A:D6:2E:41:0D:FD:26:D3:61:41:5C:0B:1B:63:46
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        29:3b:92:3a:f3:54:f9:50:91:36:46:66:b0:e3:24:74:a8:78:
        dd:d5:7c:fe:14:60:73:ed:06:02:6f:03:99:26:9d:c9:e8:db:
        2c:d9:e6:97:35:c0:52:37:89:58:1e:a0:a5:dd:36:76:9c:fc:
        0c:bf:6c:ea:8a:ef:6b:f3:24:ae:11:32:e8:4e:2d:ae:f6:b5:
        d0:a7:cc:89:bd:3e:8d:b1:6c:6a:59:aa:7f:16:94:5b:21:01:
        0e:3d:90:08:e8:ba:3d:86:0a:80:54:06:f1:28:dd:a3:b8:55:
        3e:3f:d9:c2:59:a2:89:02:e5:24:01:cd:f0:0a:5b:46:29:81:
        bc:dd:fb:04:2b:d3:75:79:30:f6:38:21:34:92:af:d4:3b:04:
        a2:67:0d:9d:eb:08:d5:1d:25:25:7f:77:18:23:63:40:42:fa:
        f0:2c:65:95:c1:53:b0:2b:91:70:d4:6a:7d:93:70:2f:4f:07:
        3e:bd:e0:f2:e3:85:82:f9:b1:57:9b:3e:d3:39:ce:87:e8:9e:
        6a:2c:ef:85:2f:5e:be:72:4e:17:86:e6:e0:80:65:77:d8:e1:
        92:6f:8a:9c:49:83:62:fd:b8:d8:3b:4f:03:7f:a0:53:5b:80:
        b7:d1:57:77:8b:9d:74:06:ce:fd:1a:ab:bd:60:4b:ba:65:b3:
        8b:17:5b:17

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0d:82:65:0d:95:9a:e1:5c:ea:00:00:00:00:8c:0d
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:39:06 2025 GMT
            Not After : Jan 10 18:39:06 2025 GMT
        Subject: DC = scep, DC = com, CN = entity2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:96:fb:5b:28:5a:76:19:be:1f:f6:47:ee:27:f3:
                    39:6d:67:9b:0b:62:97:99:5c:82:9a:6c:08:30:60:
                    bf:f6:20:e8:2c:68:46:b7:99:b3:b1:08:fa:f0:c8:
                    39:43:6e:09:84:aa:f0:ec:95:a4:fc:9f:9d:44:5f:
                    cf:6f:59:5b:ee:b7:22:8b:61:42:3c:34:c2:ce:df:
                    83:3c:c6:c0:ee:1d:fc:7e:7d:9e:21:b4:4b:31:1d:
                    f2:d7:c3:b0:3f:b0:1a:93:80:02:b9:64:a7:d8:c3:
                    42:77:dc:e1:02:c6:43:9c:e8:4b:7c:f9:e9:b9:25:
                    57:e7:a6:b1:b4:48:c8:fc:05:20:72:2e:d2:4f:82:
                    81:27:bf:9e:7b:b8:a9:c0:07:b8:be:7a:b6:d6:9d:
                    c6:2d:ee:af:db:26:f9:4d:ad:1c:50:7d:ba:5b:92:
                    f0:52:ca:83:33:e6:ac:f4:6d:f0:c0:67:1c:a0:90:
                    f5:53:5a:d8:de:ef:63:69:6c:c6:d3:f1:d5:ae:eb:
                    c4:34:bd:62:42:60:db:59:7c:f9:f0:1d:5b:f4:48:
                    22:d9:f4:95:1d:62:0a:1b:88:10:2e:7f:06:4e:cf:
                    53:dd:3c:0b:88:0f:77:a4:ac:86:ad:1d:96:07:10:
                    2f:a7:ca:1f:d7:1b:ce:e3:2e:ba:b1:45:81:fe:b4:
                    e4:f1
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                D6:FB:31:96:2C:8C:66:6C:32:9B:19:02:2E:93:7E:C1:0E:19:98:1D
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        0c:70:10:ea:bd:d0:a6:f1:09:10:9b:c3:6e:20:24:f6:c1:6c:
        66:6a:b0:76:de:72:b5:cd:77:6e:00:06:35:44:50:07:0f:a2:
        a0:fc:a0:24:43:a4:72:87:07:10:55:57:5a:93:03:c4:03:d4:
        3d:bc:23:0f:65:d7:0e:76:2d:bb:2d:ba:52:cf:9e:04:61:32:
        cf:b0:27:7a:b9:68:c6:51:ef:ed:49:4c:11:85:3d:60:3e:85:
        fa:98:73:1f:86:72:4b:f5:a3:c0:04:ed:10:bd:25:33:ff:94:
        bb:b7:bd:e7:f3:72:17:46:ed:9e:c3:69:ba:2a:79:53:f2:63:
        a2:ae:04:8f:07:67:66:54:7d:1b:d5:df:21:ef:89:33:6f:ec:
        10:a0:c9:e9:7f:33:79:98:dc:6e:02:60:39:7d:cb:8e:91:0a:
        42:b0:02:4d:5a:e4:1c:77:d6:ed:45:29:bb:bb:63:a2:d3:5b:
        b7:0a:38:d4:81:44:78:0e:66:f4:ae:9a:ab:c9:0c:86:f1:35:
        99:52:b5:d1:1e:c1:ca:1e:77:eb:89:5c:7e:64:ed:33:ac:7f:
        71:6c:98:88:45:84:3f:3f:92:cd:f7:52:f2:b3:9a:0a:2b:de:
        31:67:8c:ef:1e:6a:ce:a6:86:54:93:ca:5c:63:49:79:50:54:
        d5:d9:1b:7c

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1a:ea:6d:57:94:fe:a5:9c:42:14:81:ca:79:1b:75:d7
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Dec 14 10:00:35 2023 GMT
            Not After : Dec 14 10:10:34 2053 GMT
        Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:bf:c5:be:9a:32:e2:a5:42:6c:b8:42:b5:7b:21:
                    e5:71:b0:79:46:b1:41:bd:25:c3:40:e1:33:8e:1a:
                    3b:12:ca:26:1e:f3:c9:44:d6:b5:9a:03:cb:14:f5:
                    82:6f:a8:7e:47:bc:e7:e0:b3:1f:c6:ff:84:54:2b:
                    fd:b6:0d:e1:4f:c3:b7:6a:0f:98:99:c2:8a:b6:b8:
                    9d:f3:5d:36:f3:af:48:0f:7d:cd:5a:6c:a8:10:0c:
                    02:b2:0c:af:b3:d8:c3:b4:de:0e:b8:15:6d:4a:f0:
                    4e:67:7d:c2:3a:dd:03:f7:3d:80:69:63:2c:f9:97:
                    fa:d3:4d:80:13:dd:24:ac:54:ad:f7:cc:25:94:41:
                    fd:2d:e8:2a:8e:a8:91:96:89:d2:9f:0c:17:03:99:
                    11:f5:ce:2c:db:78:b7:09:75:d1:96:af:58:82:58:
                    62:86:63:01:16:68:fc:06:db:92:d0:c5:6d:9d:6d:
                    fd:5d:13:b0:2b:37:2f:9c:ae:3b:e3:34:d6:42:7b:
                    12:01:93:da:ea:b4:c8:ba:9f:57:35:4f:6a:a1:95:
                    c2:5f:40:9d:6b:c1:72:ec:91:9b:72:cc:6a:b8:9e:
                    dc:08:f0:53:09:4f:d4:09:75:28:99:56:f5:66:be:
                    7d:ca:59:0e:9b:50:4d:be:98:04:20:4d:98:e6:5f:
                    58:c5
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            1.3.6.1.4.1.311.20.2:
                ...C.A
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            1.3.6.1.4.1.311.21.1:
                ...
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        6c:44:b8:33:b1:75:08:00:07:7f:2b:a4:80:f2:6a:ff:94:4c:
        ee:85:cc:61:db:49:59:19:cc:01:2f:c5:45:4b:d2:8d:dc:77:
        54:7d:3c:34:75:28:c9:16:28:94:15:51:3d:e6:f7:dc:9b:d8:
        cd:63:bb:d3:ec:fc:ae:32:7e:cd:be:50:c2:9f:f7:91:de:9e:
        bb:44:d3:24:09:4d:dd:5f:67:ad:58:ad:7e:cc:9e:9f:8f:c8:
        48:f5:d9:03:9a:a3:df:cd:e5:8a:e0:03:9e:36:f9:ba:fd:ff:
        0b:a0:15:8c:66:9f:49:bc:e8:94:3e:61:7d:78:ff:48:66:d1:
        13:54:1d:41:61:63:28:ba:d9:f8:6a:c4:df:48:16:d2:69:39:
        c0:38:ea:54:84:e0:40:17:d9:2c:43:58:be:e4:a1:5d:e2:6c:
        e9:23:55:b7:6e:61:8f:4e:72:4f:c2:d5:c4:7a:74:f5:8e:b3:
        0e:2c:bc:5d:7d:ba:f8:ae:3b:f0:d6:b0:2e:1f:3f:fd:2d:77:
        7d:52:bf:f7:07:ba:9d:64:60:57:1d:68:34:bb:cb:44:ac:dd:
        55:c2:40:a1:98:84:b7:74:50:a4:50:95:0e:12:59:96:b9:af:
        bc:b3:09:e6:67:39:26:7e:b0:41:07:90:57:72:40:2a:11:7a:
        2e:ac:be:b8

Step 15: Run command pki show remote-certificate site-to-site PEER filter-issuer TELDAT at DUT2 and check if output contains the following tokens:

DC = scep, DC = com, CN = entity1
Show output
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0c:34:ca:27:d7:f2:55:c7:f4:00:00:00:00:8c:0c
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:39:04 2025 GMT
            Not After : Jan 10 18:39:04 2025 GMT
        Subject: DC = scep, DC = com, CN = entity1
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:b5:8f:59:c9:59:0f:2f:01:3e:90:6e:34:99:79:
                    29:2d:c7:fb:2d:f7:0c:12:5d:38:57:e3:b5:2b:fc:
                    07:62:c5:f3:95:ef:e8:bd:c1:7d:77:1a:61:92:b2:
                    fb:c2:65:8e:62:41:fc:f1:fa:fe:d0:5d:1c:a1:cc:
                    e8:9d:75:7b:c9:d8:8e:af:89:43:14:64:56:06:7f:
                    94:ad:a4:23:1d:a8:98:3a:89:59:ae:9e:42:83:d7:
                    b7:c8:02:b1:27:a1:9d:3a:69:fb:95:65:8f:95:23:
                    de:d9:ed:3e:55:84:7c:c5:7e:01:37:38:22:15:9a:
                    60:89:1f:92:34:af:d0:7f:83:0f:96:59:a3:95:17:
                    23:bc:c2:00:6d:47:1b:ce:cd:26:9d:ca:39:83:c6:
                    b8:e1:ab:08:6f:d0:6d:a9:72:1d:6e:39:76:ca:9c:
                    14:f9:9f:ea:60:3d:24:58:1f:df:3c:3a:0d:35:f7:
                    4a:e9:71:c8:96:d5:91:60:5a:8b:1b:b0:d3:36:b0:
                    5c:50:df:04:b2:b0:5c:30:4d:7c:5b:49:ee:c1:91:
                    03:a8:20:3b:1b:39:ce:70:f8:be:37:48:2d:35:d4:
                    5a:e1:34:8b:0f:6c:1f:3a:3f:d6:90:88:43:60:40:
                    16:d8:96:d3:72:58:96:64:fb:80:17:08:53:0f:dd:
                    20:61
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                52:37:63:99:7F:7A:D6:2E:41:0D:FD:26:D3:61:41:5C:0B:1B:63:46
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        29:3b:92:3a:f3:54:f9:50:91:36:46:66:b0:e3:24:74:a8:78:
        dd:d5:7c:fe:14:60:73:ed:06:02:6f:03:99:26:9d:c9:e8:db:
        2c:d9:e6:97:35:c0:52:37:89:58:1e:a0:a5:dd:36:76:9c:fc:
        0c:bf:6c:ea:8a:ef:6b:f3:24:ae:11:32:e8:4e:2d:ae:f6:b5:
        d0:a7:cc:89:bd:3e:8d:b1:6c:6a:59:aa:7f:16:94:5b:21:01:
        0e:3d:90:08:e8:ba:3d:86:0a:80:54:06:f1:28:dd:a3:b8:55:
        3e:3f:d9:c2:59:a2:89:02:e5:24:01:cd:f0:0a:5b:46:29:81:
        bc:dd:fb:04:2b:d3:75:79:30:f6:38:21:34:92:af:d4:3b:04:
        a2:67:0d:9d:eb:08:d5:1d:25:25:7f:77:18:23:63:40:42:fa:
        f0:2c:65:95:c1:53:b0:2b:91:70:d4:6a:7d:93:70:2f:4f:07:
        3e:bd:e0:f2:e3:85:82:f9:b1:57:9b:3e:d3:39:ce:87:e8:9e:
        6a:2c:ef:85:2f:5e:be:72:4e:17:86:e6:e0:80:65:77:d8:e1:
        92:6f:8a:9c:49:83:62:fd:b8:d8:3b:4f:03:7f:a0:53:5b:80:
        b7:d1:57:77:8b:9d:74:06:ce:fd:1a:ab:bd:60:4b:ba:65:b3:
        8b:17:5b:17

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0d:82:65:0d:95:9a:e1:5c:ea:00:00:00:00:8c:0d
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:39:06 2025 GMT
            Not After : Jan 10 18:39:06 2025 GMT
        Subject: DC = scep, DC = com, CN = entity2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:96:fb:5b:28:5a:76:19:be:1f:f6:47:ee:27:f3:
                    39:6d:67:9b:0b:62:97:99:5c:82:9a:6c:08:30:60:
                    bf:f6:20:e8:2c:68:46:b7:99:b3:b1:08:fa:f0:c8:
                    39:43:6e:09:84:aa:f0:ec:95:a4:fc:9f:9d:44:5f:
                    cf:6f:59:5b:ee:b7:22:8b:61:42:3c:34:c2:ce:df:
                    83:3c:c6:c0:ee:1d:fc:7e:7d:9e:21:b4:4b:31:1d:
                    f2:d7:c3:b0:3f:b0:1a:93:80:02:b9:64:a7:d8:c3:
                    42:77:dc:e1:02:c6:43:9c:e8:4b:7c:f9:e9:b9:25:
                    57:e7:a6:b1:b4:48:c8:fc:05:20:72:2e:d2:4f:82:
                    81:27:bf:9e:7b:b8:a9:c0:07:b8:be:7a:b6:d6:9d:
                    c6:2d:ee:af:db:26:f9:4d:ad:1c:50:7d:ba:5b:92:
                    f0:52:ca:83:33:e6:ac:f4:6d:f0:c0:67:1c:a0:90:
                    f5:53:5a:d8:de:ef:63:69:6c:c6:d3:f1:d5:ae:eb:
                    c4:34:bd:62:42:60:db:59:7c:f9:f0:1d:5b:f4:48:
                    22:d9:f4:95:1d:62:0a:1b:88:10:2e:7f:06:4e:cf:
                    53:dd:3c:0b:88:0f:77:a4:ac:86:ad:1d:96:07:10:
                    2f:a7:ca:1f:d7:1b:ce:e3:2e:ba:b1:45:81:fe:b4:
                    e4:f1
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                D6:FB:31:96:2C:8C:66:6C:32:9B:19:02:2E:93:7E:C1:0E:19:98:1D
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        0c:70:10:ea:bd:d0:a6:f1:09:10:9b:c3:6e:20:24:f6:c1:6c:
        66:6a:b0:76:de:72:b5:cd:77:6e:00:06:35:44:50:07:0f:a2:
        a0:fc:a0:24:43:a4:72:87:07:10:55:57:5a:93:03:c4:03:d4:
        3d:bc:23:0f:65:d7:0e:76:2d:bb:2d:ba:52:cf:9e:04:61:32:
        cf:b0:27:7a:b9:68:c6:51:ef:ed:49:4c:11:85:3d:60:3e:85:
        fa:98:73:1f:86:72:4b:f5:a3:c0:04:ed:10:bd:25:33:ff:94:
        bb:b7:bd:e7:f3:72:17:46:ed:9e:c3:69:ba:2a:79:53:f2:63:
        a2:ae:04:8f:07:67:66:54:7d:1b:d5:df:21:ef:89:33:6f:ec:
        10:a0:c9:e9:7f:33:79:98:dc:6e:02:60:39:7d:cb:8e:91:0a:
        42:b0:02:4d:5a:e4:1c:77:d6:ed:45:29:bb:bb:63:a2:d3:5b:
        b7:0a:38:d4:81:44:78:0e:66:f4:ae:9a:ab:c9:0c:86:f1:35:
        99:52:b5:d1:1e:c1:ca:1e:77:eb:89:5c:7e:64:ed:33:ac:7f:
        71:6c:98:88:45:84:3f:3f:92:cd:f7:52:f2:b3:9a:0a:2b:de:
        31:67:8c:ef:1e:6a:ce:a6:86:54:93:ca:5c:63:49:79:50:54:
        d5:d9:1b:7c

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1a:ea:6d:57:94:fe:a5:9c:42:14:81:ca:79:1b:75:d7
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Dec 14 10:00:35 2023 GMT
            Not After : Dec 14 10:10:34 2053 GMT
        Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:bf:c5:be:9a:32:e2:a5:42:6c:b8:42:b5:7b:21:
                    e5:71:b0:79:46:b1:41:bd:25:c3:40:e1:33:8e:1a:
                    3b:12:ca:26:1e:f3:c9:44:d6:b5:9a:03:cb:14:f5:
                    82:6f:a8:7e:47:bc:e7:e0:b3:1f:c6:ff:84:54:2b:
                    fd:b6:0d:e1:4f:c3:b7:6a:0f:98:99:c2:8a:b6:b8:
                    9d:f3:5d:36:f3:af:48:0f:7d:cd:5a:6c:a8:10:0c:
                    02:b2:0c:af:b3:d8:c3:b4:de:0e:b8:15:6d:4a:f0:
                    4e:67:7d:c2:3a:dd:03:f7:3d:80:69:63:2c:f9:97:
                    fa:d3:4d:80:13:dd:24:ac:54:ad:f7:cc:25:94:41:
                    fd:2d:e8:2a:8e:a8:91:96:89:d2:9f:0c:17:03:99:
                    11:f5:ce:2c:db:78:b7:09:75:d1:96:af:58:82:58:
                    62:86:63:01:16:68:fc:06:db:92:d0:c5:6d:9d:6d:
                    fd:5d:13:b0:2b:37:2f:9c:ae:3b:e3:34:d6:42:7b:
                    12:01:93:da:ea:b4:c8:ba:9f:57:35:4f:6a:a1:95:
                    c2:5f:40:9d:6b:c1:72:ec:91:9b:72:cc:6a:b8:9e:
                    dc:08:f0:53:09:4f:d4:09:75:28:99:56:f5:66:be:
                    7d:ca:59:0e:9b:50:4d:be:98:04:20:4d:98:e6:5f:
                    58:c5
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            1.3.6.1.4.1.311.20.2:
                ...C.A
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            1.3.6.1.4.1.311.21.1:
                ...
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        6c:44:b8:33:b1:75:08:00:07:7f:2b:a4:80:f2:6a:ff:94:4c:
        ee:85:cc:61:db:49:59:19:cc:01:2f:c5:45:4b:d2:8d:dc:77:
        54:7d:3c:34:75:28:c9:16:28:94:15:51:3d:e6:f7:dc:9b:d8:
        cd:63:bb:d3:ec:fc:ae:32:7e:cd:be:50:c2:9f:f7:91:de:9e:
        bb:44:d3:24:09:4d:dd:5f:67:ad:58:ad:7e:cc:9e:9f:8f:c8:
        48:f5:d9:03:9a:a3:df:cd:e5:8a:e0:03:9e:36:f9:ba:fd:ff:
        0b:a0:15:8c:66:9f:49:bc:e8:94:3e:61:7d:78:ff:48:66:d1:
        13:54:1d:41:61:63:28:ba:d9:f8:6a:c4:df:48:16:d2:69:39:
        c0:38:ea:54:84:e0:40:17:d9:2c:43:58:be:e4:a1:5d:e2:6c:
        e9:23:55:b7:6e:61:8f:4e:72:4f:c2:d5:c4:7a:74:f5:8e:b3:
        0e:2c:bc:5d:7d:ba:f8:ae:3b:f0:d6:b0:2e:1f:3f:fd:2d:77:
        7d:52:bf:f7:07:ba:9d:64:60:57:1d:68:34:bb:cb:44:ac:dd:
        55:c2:40:a1:98:84:b7:74:50:a4:50:95:0e:12:59:96:b9:af:
        bc:b3:09:e6:67:39:26:7e:b0:41:07:90:57:72:40:2a:11:7a:
        2e:ac:be:b8

Step 16: Ping IP address 192.168.2.1 from DUT0:

admin@DUT0$ ping 192.168.2.1 local-address 192.168.1.1 count 1 size 56 timeout 1
Show output
PING 192.168.2.1 (192.168.2.1) from 192.168.1.1 : 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=0.383 ms

--- 192.168.2.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.383/0.383/0.383/0.000 ms

Step 17: Ping IP address 192.168.1.1 from DUT2:

admin@DUT2$ ping 192.168.1.1 local-address 192.168.2.1 count 1 size 56 timeout 1
Show output
PING 192.168.1.1 (192.168.1.1) from 192.168.2.1 : 56(84) bytes of data.
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=0.374 ms

--- 192.168.1.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.374/0.374/0.374/0.000 ms

Step 18: Run command pki scep request-ca CSR at DUT0 and check if output contains the following tokens:

CA certificate acquisition completed successfully
Show output
CA certificate acquisition completed successfully for CSR 'CSR'

Step 19: Run command pki scep request-ca CSR at DUT2 and check if output contains the following tokens:

CA certificate acquisition completed successfully
Show output
CA certificate acquisition completed successfully for CSR 'CSR'

Test SCEP Credentials Not Ready

Description

In this scenario, the credentials (X509 certificates) are not available when the VPN configuration is committed. However, once the credentials are downloaded, the VPN tunnel is set-up automatically.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth1 address 10.215.168.64/24
set protocols static route 192.168.212.0/22 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT2 :

set interfaces ethernet eth1 address 10.215.168.66/24
set protocols static route 192.168.212.0/22 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Ping IP address 192.168.213.25 from DUT0:

admin@DUT0$ ping 192.168.213.25 count 1 size 56 timeout 1
Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data.
64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.539 ms

--- 192.168.213.25 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.539/0.539/0.539/0.000 ms

Step 4: Ping IP address 192.168.213.25 from DUT2:

admin@DUT2$ ping 192.168.213.25 count 1 size 56 timeout 1
Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data.
64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.592 ms

--- 192.168.213.25 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.592/0.592/0.592/0.000 ms

Step 5: Modify the following configuration lines in DUT0 :

set interfaces dummy dum0 address 192.168.1.1/24
set interfaces ethernet eth0 address 8.0.0.2/24
set protocols static route 0.0.0.0/0 next-hop 8.0.0.1
set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe
set system certificate scep csr CSR distinguished-names 'DC=scep, DC=com, CN=entity1'
set system certificate scep csr CSR encrypted-password U2FsdGVkX18fifNEDVqtRGeFq+ROeU2FgggxcpeLG0/L8qLVMNEBuAf6PweJ71wDyHmgWVIP3+qGng2dDpoQiA==
set system certificate scep csr CSR port 443
set system certificate scep csr CSR url 'http://192.168.213.25/'
set vpn ipsec auth-profile AUTH local csr CSR
set vpn ipsec auth-profile AUTH mirror-config false
set vpn ipsec auth-profile AUTH mode x509
set vpn ipsec esp-group ESP-POLICY lifetime 28800
set vpn ipsec esp-group ESP-POLICY proposal 1 encryption null
set vpn ipsec esp-group ESP-POLICY proposal 1 hash sha1
set vpn ipsec esp-group ESP-POLICY proposal 1 pfs dh-group15
set vpn ipsec ike-group IKE-POLICY key-exchange ikev2
set vpn ipsec ike-group IKE-POLICY lifetime 28800
set vpn ipsec ike-group IKE-POLICY proposal 1 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 1 encryption null
set vpn ipsec ike-group IKE-POLICY proposal 1 hash sha1
set vpn ipsec ike-group IKE-POLICY proposal 2 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 2 encryption aes256
set vpn ipsec ike-group IKE-POLICY proposal 2 hash sha1
set vpn ipsec logging log-types any log-level 1
set vpn ipsec site-to-site peer PEER auth-profile AUTH
set vpn ipsec site-to-site peer PEER connection-type initiate
set vpn ipsec site-to-site peer PEER ike-group IKE-POLICY
set vpn ipsec site-to-site peer PEER local-address 8.0.0.2
set vpn ipsec site-to-site peer PEER remote-address 9.0.0.2
set vpn ipsec site-to-site peer PEER tunnel 1 esp-group ESP-POLICY
set vpn ipsec site-to-site peer PEER tunnel 1 local prefix 192.168.1.0/24
set vpn ipsec site-to-site peer PEER tunnel 1 remote prefix 192.168.2.0/24

Step 6: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 8.0.0.1/24
set interfaces ethernet eth1 address 9.0.0.1/24
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 7: Modify the following configuration lines in DUT2 :

set interfaces dummy dum0 address 192.168.2.1/24
set interfaces ethernet eth0 address 9.0.0.2/24
set protocols static route 0.0.0.0/0 next-hop 9.0.0.1
set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe
set system certificate scep csr CSR distinguished-names 'DC=scep, DC=com, CN=entity2'
set system certificate scep csr CSR encrypted-password U2FsdGVkX18TTGhsWaMuEncl1FYySQntNQYGKrJ0Z0670iykaiQtsUR//jTx9180Ytz88rzTg9xnRVMfy6/4DA==
set system certificate scep csr CSR port 443
set system certificate scep csr CSR url 'http://192.168.213.25/'
set vpn ipsec auth-profile AUTH local csr CSR
set vpn ipsec auth-profile AUTH mirror-config false
set vpn ipsec auth-profile AUTH mode x509
set vpn ipsec esp-group ESP-POLICY lifetime 28800
set vpn ipsec esp-group ESP-POLICY proposal 1 encryption null
set vpn ipsec esp-group ESP-POLICY proposal 1 hash sha1
set vpn ipsec esp-group ESP-POLICY proposal 1 pfs dh-group15
set vpn ipsec ike-group IKE-POLICY key-exchange ikev2
set vpn ipsec ike-group IKE-POLICY lifetime 28800
set vpn ipsec ike-group IKE-POLICY proposal 1 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 1 encryption null
set vpn ipsec ike-group IKE-POLICY proposal 1 hash sha1
set vpn ipsec ike-group IKE-POLICY proposal 2 dh-group 15
set vpn ipsec ike-group IKE-POLICY proposal 2 encryption aes256
set vpn ipsec ike-group IKE-POLICY proposal 2 hash sha1
set vpn ipsec logging log-types any log-level 1
set vpn ipsec site-to-site peer PEER auth-profile AUTH
set vpn ipsec site-to-site peer PEER connection-type respond
set vpn ipsec site-to-site peer PEER ike-group IKE-POLICY
set vpn ipsec site-to-site peer PEER local-address 9.0.0.2
set vpn ipsec site-to-site peer PEER remote-address 8.0.0.2
set vpn ipsec site-to-site peer PEER tunnel 1 esp-group ESP-POLICY
set vpn ipsec site-to-site peer PEER tunnel 1 local prefix 192.168.2.0/24
set vpn ipsec site-to-site peer PEER tunnel 1 remote prefix 192.168.1.0/24

Step 8: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:

CA_CERT\s+Uninitialized
USER_CERT\s+Uninitialized
Show output
-----------------------------------------------
Certificate     Status      NotBefore  NotAfter
-----------------------------------------------
CA_CERT      Uninitialized
USER_CERT    Uninitialized

Step 9: Run command pki scep show CSR at DUT2 and check if output matches the following regular expressions:

CA_CERT\s+Uninitialized
USER_CERT\s+Uninitialized
Show output
-----------------------------------------------
Certificate     Status      NotBefore  NotAfter
-----------------------------------------------
CA_CERT      Uninitialized
USER_CERT    Uninitialized

Note

The credentials will not be downloaded because the port for the connection to PKI server is configured wrong on purpose. Once the credentials are ready, the VPN should be established automatically.

Step 10: Modify the following configuration lines in DUT2 :

set system certificate scep csr CSR port 80

Step 11: Modify the following configuration lines in DUT0 :

set system certificate scep csr CSR port 80

Step 12: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:

CA_CERT\s+Valid
USER_CERT\s+Valid
Show output
-----------------------------------------------------------------------
Certificate  Status         NotBefore                  NotAfter
-----------------------------------------------------------------------
CA_CERT      Valid   Dec 14 10:00:35 2023 GMT  Dec 14 10:10:34 2053 GMT
USER_CERT    Valid   Jan 10 14:40:39 2025 GMT  Jan 10 18:40:39 2025 GMT

Step 13: Run command pki scep show CSR at DUT2 and check if output matches the following regular expressions:

CA_CERT\s+Valid
USER_CERT\s+Valid
Show output
-----------------------------------------------------------------------
Certificate  Status         NotBefore                  NotAfter
-----------------------------------------------------------------------
CA_CERT      Valid   Dec 14 10:00:35 2023 GMT  Dec 14 10:10:34 2053 GMT
USER_CERT    Valid   Jan 10 14:40:34 2025 GMT  Jan 10 18:40:34 2025 GMT

Step 14: Run command vpn ipsec show sa at DUT0 and check if output matches the following regular expressions:

vpn-peer-PEER: \#\d, ESTABLISHED, IKEv2
Show output
vpn-peer-PEER: #1, ESTABLISHED, IKEv2, 94f4907787eed596_i* a504205c447e29ce_r
  local  'DC=scep, DC=com, CN=entity1' @ 8.0.0.2[500]
  remote 'DC=scep, DC=com, CN=entity2' @ 9.0.0.2[500]
  NULL/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_3072
  established 19s ago, rekeying in 21206s
  peer-PEER-tunnel-1: #1, reqid 1, INSTALLED, TUNNEL, ESP:NULL/HMAC_SHA1_96
    installed 19s ago, rekeying in 16926s, expires in 31661s
    in  c434180e,      0 bytes,     0 packets
    out c2fa0377,      0 bytes,     0 packets
    local  192.168.1.0/24
    remote 192.168.2.0/24

Step 15: Run command vpn ipsec show sa at DUT2 and check if output matches the following regular expressions:

vpn-peer-PEER: \#\d, ESTABLISHED, IKEv2
Show output
vpn-peer-PEER: #1, ESTABLISHED, IKEv2, 94f4907787eed596_i a504205c447e29ce_r*
  local  'DC=scep, DC=com, CN=entity2' @ 9.0.0.2[500]
  remote 'DC=scep, DC=com, CN=entity1' @ 8.0.0.2[500]
  NULL/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_3072
  established 19s ago, rekeying in 21951s
  peer-PEER-tunnel-1: #1, reqid 1, INSTALLED, TUNNEL, ESP:NULL/HMAC_SHA1_96
    installed 19s ago, rekeying in 17535s, expires in 31661s
    in  c2fa0377,      0 bytes,     0 packets
    out c434180e,      0 bytes,     0 packets
    local  192.168.2.0/24
    remote 192.168.1.0/24

Step 16: Run command pki show remote-certificate site-to-site PEER filter-issuer TELDAT at DUT0 and check if output contains the following tokens:

DC = scep, DC = com, CN = entity2
Show output
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0f:56:ac:34:73:a4:8e:56:be:00:00:00:00:8c:0f
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:40:39 2025 GMT
            Not After : Jan 10 18:40:39 2025 GMT
        Subject: DC = scep, DC = com, CN = entity1
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:c1:dd:36:79:76:19:b1:31:75:f9:bc:d0:5b:40:
                    4c:dd:c4:db:77:f7:28:6c:c0:50:ee:25:74:b6:7f:
                    85:51:39:60:45:a4:37:ca:0c:3a:88:ae:bf:0e:c2:
                    a6:fb:a8:f8:0a:81:c7:46:01:d3:fe:00:25:99:cb:
                    b0:cd:92:b1:e9:0f:90:e6:5a:8b:fe:86:2f:79:f7:
                    65:31:d0:f4:90:81:b2:76:ee:b8:aa:c5:38:47:d8:
                    36:af:16:d9:bf:b0:46:16:39:20:9d:cf:5f:bf:87:
                    64:ce:d1:81:ce:3d:a6:75:db:5d:29:60:92:02:dd:
                    19:ec:da:a9:8c:1f:74:64:49:97:d9:db:2f:08:a5:
                    f3:f9:63:2a:b1:e3:7b:67:35:69:05:59:e8:ae:6b:
                    3d:ba:c6:09:94:a6:02:51:aa:37:11:f6:09:2b:c5:
                    bb:05:0e:4d:54:65:9f:f2:88:19:4e:36:79:10:b0:
                    7a:79:5c:f0:22:95:a7:99:fe:a3:1d:65:0e:e5:c2:
                    39:8e:c7:81:a3:17:42:db:22:85:7c:26:e5:b4:cf:
                    42:c9:a6:46:1a:18:5b:c9:73:cd:59:b0:38:6b:ba:
                    a6:ed:54:56:66:c4:f0:c1:95:3d:0c:c1:0c:5b:f8:
                    c6:ea:ae:b7:11:b3:cc:14:5f:b2:f5:90:ba:ee:80:
                    1a:eb
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                E0:66:F8:57:05:68:02:0B:DE:8C:21:60:5D:EE:06:F8:3E:C3:86:C3
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        04:82:11:3e:40:65:62:e2:3e:85:ad:46:d8:20:ca:9c:49:01:
        1c:74:42:dd:f9:53:72:fc:76:d0:5e:0c:80:4c:92:4d:6a:30:
        6d:77:4a:f9:c7:00:48:5d:87:a6:13:46:1a:2b:08:26:a1:bb:
        86:be:60:b8:c2:19:ae:af:13:60:d5:34:06:e5:23:03:41:ec:
        29:d2:be:ec:00:85:65:03:f8:6e:08:56:84:c4:ef:68:aa:74:
        78:1d:e4:09:8a:e1:66:8f:ec:43:f3:c8:0b:63:38:5e:78:de:
        02:c5:7e:e0:99:de:8c:bf:0a:9a:f8:73:6f:b2:ca:1f:84:6c:
        9a:c9:72:76:d5:49:34:23:7b:93:d0:64:36:ee:e4:06:1d:66:
        1c:8f:2d:b8:68:b4:cc:e9:d8:b6:b5:b2:04:e2:d7:80:f8:ab:
        6c:c3:d2:5d:34:54:de:b8:fb:dd:16:11:7a:d2:fc:bf:f1:e8:
        cc:6d:26:e8:ff:56:3d:d1:37:41:74:4e:c9:b3:ca:05:9c:f2:
        23:b9:9f:00:75:2a:8a:ed:ca:9c:e5:f5:93:e4:71:59:f5:01:
        19:bc:5f:8f:2c:4c:40:12:89:01:13:3d:bd:6b:39:41:0b:1c:
        4e:67:e7:ec:dc:02:2e:92:9a:9a:6a:dd:42:c6:2e:4b:6d:bd:
        4f:d3:7f:10

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0e:dc:0d:76:42:73:5a:60:c7:00:00:00:00:8c:0e
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:40:34 2025 GMT
            Not After : Jan 10 18:40:34 2025 GMT
        Subject: DC = scep, DC = com, CN = entity2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:b3:5e:34:e0:08:72:65:cd:ed:ad:f6:65:6c:bd:
                    c8:2e:37:b6:26:22:26:47:1c:e7:49:0e:f5:9e:c3:
                    d5:13:ee:26:dc:48:98:a0:68:c7:60:8f:7c:3f:b4:
                    eb:5e:49:bd:a3:ab:96:6b:4b:e5:3e:09:c9:16:81:
                    04:2d:e6:ac:62:dc:eb:f6:ee:cc:d1:39:ab:68:34:
                    7f:86:6d:f5:f4:d6:f7:fa:da:b4:30:b4:d6:b1:6a:
                    23:71:65:1b:e7:75:12:79:7b:cd:ac:15:e4:88:7f:
                    df:2f:66:10:d9:5f:1b:a4:d4:23:4f:08:02:6d:fb:
                    06:60:5f:0a:38:80:ab:d7:7b:b8:df:65:46:6d:e5:
                    e3:99:08:db:86:1c:e5:fc:3a:10:b3:47:66:45:c6:
                    ad:a4:6d:23:05:ab:17:ce:fa:03:f5:72:93:b6:c8:
                    9b:7e:44:f3:fa:6b:25:c5:cd:b8:6b:01:9e:9c:f7:
                    83:b9:73:7f:dc:c0:18:9b:b5:02:6c:3b:eb:02:ef:
                    18:e6:b6:8f:f7:b3:53:e0:e0:05:58:de:ad:8b:84:
                    e2:78:6a:40:59:95:ef:7e:ca:4f:32:51:8d:07:3f:
                    67:27:ee:b8:cd:68:54:0c:8f:d9:eb:55:9d:f2:63:
                    43:69:3a:2a:28:c9:fd:52:8c:9f:b4:64:55:df:9a:
                    d0:57
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                5C:CB:51:84:53:92:E8:5C:C9:98:27:60:F8:77:C9:86:16:12:55:CF
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        3d:7d:03:de:0f:6c:bc:81:b0:b8:27:5d:01:56:46:c0:02:1d:
        46:46:9d:be:48:b7:e7:f1:00:19:4d:f6:c4:8d:75:e2:25:45:
        ce:53:d7:8a:e9:39:30:6f:86:bc:05:16:0e:e9:2e:46:82:bb:
        9e:39:75:e6:3e:b3:3d:08:68:6c:91:d7:72:1a:20:e5:90:d8:
        a9:fe:ef:52:50:19:94:d3:cc:0d:2b:98:c7:a1:d9:07:03:12:
        e7:0a:da:f2:0f:79:16:e5:b7:1e:a9:d9:a5:9e:ab:4c:49:b5:
        59:6c:57:53:68:73:d0:e9:d9:05:8d:b1:ef:d9:e0:17:d7:37:
        51:d8:cc:3f:c9:da:58:04:28:fe:ad:e1:1f:ba:70:9d:c0:b1:
        25:9b:b8:23:e3:95:02:a6:84:19:c3:79:5a:93:d6:36:a1:ad:
        40:7e:7b:c7:8d:09:28:54:3d:32:c0:90:19:de:ff:c8:95:12:
        76:a9:0f:9f:37:e1:62:47:c1:86:24:7b:be:df:b8:09:e0:36:
        e8:ee:d9:e8:90:ed:ba:48:0d:9f:33:c8:9f:96:6c:2a:de:35:
        c7:ed:14:6e:d5:36:68:21:c6:cf:25:ff:97:83:1c:bf:66:91:
        61:f9:b5:b8:30:40:ca:5d:03:7e:5e:e5:bf:a1:9d:5e:3d:a2:
        da:c4:0c:4a

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1a:ea:6d:57:94:fe:a5:9c:42:14:81:ca:79:1b:75:d7
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Dec 14 10:00:35 2023 GMT
            Not After : Dec 14 10:10:34 2053 GMT
        Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:bf:c5:be:9a:32:e2:a5:42:6c:b8:42:b5:7b:21:
                    e5:71:b0:79:46:b1:41:bd:25:c3:40:e1:33:8e:1a:
                    3b:12:ca:26:1e:f3:c9:44:d6:b5:9a:03:cb:14:f5:
                    82:6f:a8:7e:47:bc:e7:e0:b3:1f:c6:ff:84:54:2b:
                    fd:b6:0d:e1:4f:c3:b7:6a:0f:98:99:c2:8a:b6:b8:
                    9d:f3:5d:36:f3:af:48:0f:7d:cd:5a:6c:a8:10:0c:
                    02:b2:0c:af:b3:d8:c3:b4:de:0e:b8:15:6d:4a:f0:
                    4e:67:7d:c2:3a:dd:03:f7:3d:80:69:63:2c:f9:97:
                    fa:d3:4d:80:13:dd:24:ac:54:ad:f7:cc:25:94:41:
                    fd:2d:e8:2a:8e:a8:91:96:89:d2:9f:0c:17:03:99:
                    11:f5:ce:2c:db:78:b7:09:75:d1:96:af:58:82:58:
                    62:86:63:01:16:68:fc:06:db:92:d0:c5:6d:9d:6d:
                    fd:5d:13:b0:2b:37:2f:9c:ae:3b:e3:34:d6:42:7b:
                    12:01:93:da:ea:b4:c8:ba:9f:57:35:4f:6a:a1:95:
                    c2:5f:40:9d:6b:c1:72:ec:91:9b:72:cc:6a:b8:9e:
                    dc:08:f0:53:09:4f:d4:09:75:28:99:56:f5:66:be:
                    7d:ca:59:0e:9b:50:4d:be:98:04:20:4d:98:e6:5f:
                    58:c5
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            1.3.6.1.4.1.311.20.2:
                ...C.A
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            1.3.6.1.4.1.311.21.1:
                ...
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        6c:44:b8:33:b1:75:08:00:07:7f:2b:a4:80:f2:6a:ff:94:4c:
        ee:85:cc:61:db:49:59:19:cc:01:2f:c5:45:4b:d2:8d:dc:77:
        54:7d:3c:34:75:28:c9:16:28:94:15:51:3d:e6:f7:dc:9b:d8:
        cd:63:bb:d3:ec:fc:ae:32:7e:cd:be:50:c2:9f:f7:91:de:9e:
        bb:44:d3:24:09:4d:dd:5f:67:ad:58:ad:7e:cc:9e:9f:8f:c8:
        48:f5:d9:03:9a:a3:df:cd:e5:8a:e0:03:9e:36:f9:ba:fd:ff:
        0b:a0:15:8c:66:9f:49:bc:e8:94:3e:61:7d:78:ff:48:66:d1:
        13:54:1d:41:61:63:28:ba:d9:f8:6a:c4:df:48:16:d2:69:39:
        c0:38:ea:54:84:e0:40:17:d9:2c:43:58:be:e4:a1:5d:e2:6c:
        e9:23:55:b7:6e:61:8f:4e:72:4f:c2:d5:c4:7a:74:f5:8e:b3:
        0e:2c:bc:5d:7d:ba:f8:ae:3b:f0:d6:b0:2e:1f:3f:fd:2d:77:
        7d:52:bf:f7:07:ba:9d:64:60:57:1d:68:34:bb:cb:44:ac:dd:
        55:c2:40:a1:98:84:b7:74:50:a4:50:95:0e:12:59:96:b9:af:
        bc:b3:09:e6:67:39:26:7e:b0:41:07:90:57:72:40:2a:11:7a:
        2e:ac:be:b8

Step 17: Run command pki show remote-certificate site-to-site PEER filter-issuer TELDAT at DUT2 and check if output contains the following tokens:

DC = scep, DC = com, CN = entity1
Show output
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0f:56:ac:34:73:a4:8e:56:be:00:00:00:00:8c:0f
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:40:39 2025 GMT
            Not After : Jan 10 18:40:39 2025 GMT
        Subject: DC = scep, DC = com, CN = entity1
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:c1:dd:36:79:76:19:b1:31:75:f9:bc:d0:5b:40:
                    4c:dd:c4:db:77:f7:28:6c:c0:50:ee:25:74:b6:7f:
                    85:51:39:60:45:a4:37:ca:0c:3a:88:ae:bf:0e:c2:
                    a6:fb:a8:f8:0a:81:c7:46:01:d3:fe:00:25:99:cb:
                    b0:cd:92:b1:e9:0f:90:e6:5a:8b:fe:86:2f:79:f7:
                    65:31:d0:f4:90:81:b2:76:ee:b8:aa:c5:38:47:d8:
                    36:af:16:d9:bf:b0:46:16:39:20:9d:cf:5f:bf:87:
                    64:ce:d1:81:ce:3d:a6:75:db:5d:29:60:92:02:dd:
                    19:ec:da:a9:8c:1f:74:64:49:97:d9:db:2f:08:a5:
                    f3:f9:63:2a:b1:e3:7b:67:35:69:05:59:e8:ae:6b:
                    3d:ba:c6:09:94:a6:02:51:aa:37:11:f6:09:2b:c5:
                    bb:05:0e:4d:54:65:9f:f2:88:19:4e:36:79:10:b0:
                    7a:79:5c:f0:22:95:a7:99:fe:a3:1d:65:0e:e5:c2:
                    39:8e:c7:81:a3:17:42:db:22:85:7c:26:e5:b4:cf:
                    42:c9:a6:46:1a:18:5b:c9:73:cd:59:b0:38:6b:ba:
                    a6:ed:54:56:66:c4:f0:c1:95:3d:0c:c1:0c:5b:f8:
                    c6:ea:ae:b7:11:b3:cc:14:5f:b2:f5:90:ba:ee:80:
                    1a:eb
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                E0:66:F8:57:05:68:02:0B:DE:8C:21:60:5D:EE:06:F8:3E:C3:86:C3
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        04:82:11:3e:40:65:62:e2:3e:85:ad:46:d8:20:ca:9c:49:01:
        1c:74:42:dd:f9:53:72:fc:76:d0:5e:0c:80:4c:92:4d:6a:30:
        6d:77:4a:f9:c7:00:48:5d:87:a6:13:46:1a:2b:08:26:a1:bb:
        86:be:60:b8:c2:19:ae:af:13:60:d5:34:06:e5:23:03:41:ec:
        29:d2:be:ec:00:85:65:03:f8:6e:08:56:84:c4:ef:68:aa:74:
        78:1d:e4:09:8a:e1:66:8f:ec:43:f3:c8:0b:63:38:5e:78:de:
        02:c5:7e:e0:99:de:8c:bf:0a:9a:f8:73:6f:b2:ca:1f:84:6c:
        9a:c9:72:76:d5:49:34:23:7b:93:d0:64:36:ee:e4:06:1d:66:
        1c:8f:2d:b8:68:b4:cc:e9:d8:b6:b5:b2:04:e2:d7:80:f8:ab:
        6c:c3:d2:5d:34:54:de:b8:fb:dd:16:11:7a:d2:fc:bf:f1:e8:
        cc:6d:26:e8:ff:56:3d:d1:37:41:74:4e:c9:b3:ca:05:9c:f2:
        23:b9:9f:00:75:2a:8a:ed:ca:9c:e5:f5:93:e4:71:59:f5:01:
        19:bc:5f:8f:2c:4c:40:12:89:01:13:3d:bd:6b:39:41:0b:1c:
        4e:67:e7:ec:dc:02:2e:92:9a:9a:6a:dd:42:c6:2e:4b:6d:bd:
        4f:d3:7f:10

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1c:00:00:8c:0e:dc:0d:76:42:73:5a:60:c7:00:00:00:00:8c:0e
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Jan 10 14:40:34 2025 GMT
            Not After : Jan 10 18:40:34 2025 GMT
        Subject: DC = scep, DC = com, CN = entity2
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:b3:5e:34:e0:08:72:65:cd:ed:ad:f6:65:6c:bd:
                    c8:2e:37:b6:26:22:26:47:1c:e7:49:0e:f5:9e:c3:
                    d5:13:ee:26:dc:48:98:a0:68:c7:60:8f:7c:3f:b4:
                    eb:5e:49:bd:a3:ab:96:6b:4b:e5:3e:09:c9:16:81:
                    04:2d:e6:ac:62:dc:eb:f6:ee:cc:d1:39:ab:68:34:
                    7f:86:6d:f5:f4:d6:f7:fa:da:b4:30:b4:d6:b1:6a:
                    23:71:65:1b:e7:75:12:79:7b:cd:ac:15:e4:88:7f:
                    df:2f:66:10:d9:5f:1b:a4:d4:23:4f:08:02:6d:fb:
                    06:60:5f:0a:38:80:ab:d7:7b:b8:df:65:46:6d:e5:
                    e3:99:08:db:86:1c:e5:fc:3a:10:b3:47:66:45:c6:
                    ad:a4:6d:23:05:ab:17:ce:fa:03:f5:72:93:b6:c8:
                    9b:7e:44:f3:fa:6b:25:c5:cd:b8:6b:01:9e:9c:f7:
                    83:b9:73:7f:dc:c0:18:9b:b5:02:6c:3b:eb:02:ef:
                    18:e6:b6:8f:f7:b3:53:e0:e0:05:58:de:ad:8b:84:
                    e2:78:6a:40:59:95:ef:7e:ca:4f:32:51:8d:07:3f:
                    67:27:ee:b8:cd:68:54:0c:8f:d9:eb:55:9d:f2:63:
                    43:69:3a:2a:28:c9:fd:52:8c:9f:b4:64:55:df:9a:
                    d0:57
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                5C:CB:51:84:53:92:E8:5C:C9:98:27:60:F8:77:C9:86:16:12:55:CF
            X509v3 Authority Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            X509v3 CRL Distribution Points:
                Full Name:
                  URI:http://192.168.213.25/CertEnroll/scep-TELDATPKI-CA.crl
            Authority Information Access:
                CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment, Data Encipherment
            1.3.6.1.4.1.311.21.7:
                0..&+.....7.....3......./...(...f<...[...]..d..
            X509v3 Extended Key Usage:
                1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2
            1.3.6.1.4.1.311.21.10:
                0y0...+.....7..0..
+.....7
..0
..+.......0...U.%.0
..+.......0...+......0
..+.......0...+.....7..0..
+.....7...0
..+.......
            S/MIME Capabilities:
                050...*.H..
......0...*.H..
......0...+....0
..*.H..
..
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        3d:7d:03:de:0f:6c:bc:81:b0:b8:27:5d:01:56:46:c0:02:1d:
        46:46:9d:be:48:b7:e7:f1:00:19:4d:f6:c4:8d:75:e2:25:45:
        ce:53:d7:8a:e9:39:30:6f:86:bc:05:16:0e:e9:2e:46:82:bb:
        9e:39:75:e6:3e:b3:3d:08:68:6c:91:d7:72:1a:20:e5:90:d8:
        a9:fe:ef:52:50:19:94:d3:cc:0d:2b:98:c7:a1:d9:07:03:12:
        e7:0a:da:f2:0f:79:16:e5:b7:1e:a9:d9:a5:9e:ab:4c:49:b5:
        59:6c:57:53:68:73:d0:e9:d9:05:8d:b1:ef:d9:e0:17:d7:37:
        51:d8:cc:3f:c9:da:58:04:28:fe:ad:e1:1f:ba:70:9d:c0:b1:
        25:9b:b8:23:e3:95:02:a6:84:19:c3:79:5a:93:d6:36:a1:ad:
        40:7e:7b:c7:8d:09:28:54:3d:32:c0:90:19:de:ff:c8:95:12:
        76:a9:0f:9f:37:e1:62:47:c1:86:24:7b:be:df:b8:09:e0:36:
        e8:ee:d9:e8:90:ed:ba:48:0d:9f:33:c8:9f:96:6c:2a:de:35:
        c7:ed:14:6e:d5:36:68:21:c6:cf:25:ff:97:83:1c:bf:66:91:
        61:f9:b5:b8:30:40:ca:5d:03:7e:5e:e5:bf:a1:9d:5e:3d:a2:
        da:c4:0c:4a

----------------------------------------------------------------------

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            1a:ea:6d:57:94:fe:a5:9c:42:14:81:ca:79:1b:75:d7
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Validity
            Not Before: Dec 14 10:00:35 2023 GMT
            Not After : Dec 14 10:10:34 2053 GMT
        Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:bf:c5:be:9a:32:e2:a5:42:6c:b8:42:b5:7b:21:
                    e5:71:b0:79:46:b1:41:bd:25:c3:40:e1:33:8e:1a:
                    3b:12:ca:26:1e:f3:c9:44:d6:b5:9a:03:cb:14:f5:
                    82:6f:a8:7e:47:bc:e7:e0:b3:1f:c6:ff:84:54:2b:
                    fd:b6:0d:e1:4f:c3:b7:6a:0f:98:99:c2:8a:b6:b8:
                    9d:f3:5d:36:f3:af:48:0f:7d:cd:5a:6c:a8:10:0c:
                    02:b2:0c:af:b3:d8:c3:b4:de:0e:b8:15:6d:4a:f0:
                    4e:67:7d:c2:3a:dd:03:f7:3d:80:69:63:2c:f9:97:
                    fa:d3:4d:80:13:dd:24:ac:54:ad:f7:cc:25:94:41:
                    fd:2d:e8:2a:8e:a8:91:96:89:d2:9f:0c:17:03:99:
                    11:f5:ce:2c:db:78:b7:09:75:d1:96:af:58:82:58:
                    62:86:63:01:16:68:fc:06:db:92:d0:c5:6d:9d:6d:
                    fd:5d:13:b0:2b:37:2f:9c:ae:3b:e3:34:d6:42:7b:
                    12:01:93:da:ea:b4:c8:ba:9f:57:35:4f:6a:a1:95:
                    c2:5f:40:9d:6b:c1:72:ec:91:9b:72:cc:6a:b8:9e:
                    dc:08:f0:53:09:4f:d4:09:75:28:99:56:f5:66:be:
                    7d:ca:59:0e:9b:50:4d:be:98:04:20:4d:98:e6:5f:
                    58:c5
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            1.3.6.1.4.1.311.20.2:
                ...C.A
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Key Identifier:
                AF:CF:34:AD:5B:BC:15:CF:9E:0B:FB:4A:ED:09:79:E0:01:68:5D:B8
            1.3.6.1.4.1.311.21.1:
                ...
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        6c:44:b8:33:b1:75:08:00:07:7f:2b:a4:80:f2:6a:ff:94:4c:
        ee:85:cc:61:db:49:59:19:cc:01:2f:c5:45:4b:d2:8d:dc:77:
        54:7d:3c:34:75:28:c9:16:28:94:15:51:3d:e6:f7:dc:9b:d8:
        cd:63:bb:d3:ec:fc:ae:32:7e:cd:be:50:c2:9f:f7:91:de:9e:
        bb:44:d3:24:09:4d:dd:5f:67:ad:58:ad:7e:cc:9e:9f:8f:c8:
        48:f5:d9:03:9a:a3:df:cd:e5:8a:e0:03:9e:36:f9:ba:fd:ff:
        0b:a0:15:8c:66:9f:49:bc:e8:94:3e:61:7d:78:ff:48:66:d1:
        13:54:1d:41:61:63:28:ba:d9:f8:6a:c4:df:48:16:d2:69:39:
        c0:38:ea:54:84:e0:40:17:d9:2c:43:58:be:e4:a1:5d:e2:6c:
        e9:23:55:b7:6e:61:8f:4e:72:4f:c2:d5:c4:7a:74:f5:8e:b3:
        0e:2c:bc:5d:7d:ba:f8:ae:3b:f0:d6:b0:2e:1f:3f:fd:2d:77:
        7d:52:bf:f7:07:ba:9d:64:60:57:1d:68:34:bb:cb:44:ac:dd:
        55:c2:40:a1:98:84:b7:74:50:a4:50:95:0e:12:59:96:b9:af:
        bc:b3:09:e6:67:39:26:7e:b0:41:07:90:57:72:40:2a:11:7a:
        2e:ac:be:b8

Step 18: Ping IP address 192.168.2.1 from DUT0:

admin@DUT0$ ping 192.168.2.1 local-address 192.168.1.1 count 1 size 56 timeout 1
Show output
PING 192.168.2.1 (192.168.2.1) from 192.168.1.1 : 56(84) bytes of data.
64 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=0.384 ms

--- 192.168.2.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.384/0.384/0.384/0.000 ms

Step 19: Ping IP address 192.168.1.1 from DUT2:

admin@DUT2$ ping 192.168.1.1 local-address 192.168.2.1 count 1 size 56 timeout 1
Show output
PING 192.168.1.1 (192.168.1.1) from 192.168.2.1 : 56(84) bytes of data.
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=0.390 ms

--- 192.168.1.1 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.390/0.390/0.390/0.000 ms