Share via


RAS Authentication Test (Compact 7)

3/12/2014

The RAS Authentication Test exercises authentication protocols and RAS flags supported by Windows Embedded Compact 7. This is done by combining the six authentication types with the twelve RASEO_* flags. The six authentication types are as follows:

* PAP

* MSCHAP

* MSCHAPv2

* MD5CHAP

* EAP

* NODCC

The RASEO_* flags are as follows:

* RASEO_ProhibitPAP

* RASEO_ProhibitMsCHAP2

* RASEO_ProhibitMsCHAP

* RASEO_ProhibitCHAP

* RASEO_ProhibitEAP

* RASEO_RequireEncryptedPw

* RASEO_RequireMsEncryptedPw

* RASEO_RequireDataEncryption

* RASEO_RequireEncryptedPw | RASEO_RequireMsEncryptedPw

* RASEO_RequireMsEncryptedPw | RASEO_RequireDataEncryption

* RASEO_RequireEncryptedPw | RASEO_RequireMsEncryptedPw | RASEO_RequireDataEncryption

* <no flag>

This combination of 72 test cases (12 flags x 6 authentication types) is repeated for the following three RAS connection types:

* PPTP

* L2TP (using a preshared key)

* DCC (serial cable)

Note:

No authentication is done over DCC. Instead, regardless of the combinations of RAS flags and authentication types, the test cases for DCC check for successful connection to the RAS server.

Test Prerequisites

Your device must meet the following requirements before you run this test.

The following tables show the hardware requirements for the RAS Authentication Test.

Requirements Description

Windows Embedded Compact device

The device being tested

RAS server with serial cable

Should accept incoming clients without authentication. Must be connected to the Windows Embedded Compact device via a serial cable.

VPN server with Ethernet or other network connection

Must be reachable over the network for VPN test cases (PPTP and L2TP). The VPN server must accept all authentication protocols and must have dial-in permission for the username given in the command line.

The following tables show the software requirements for the RAS Authentication Test.

Requirements Description

Tux.exe

Test harness, required for all tests

Kato.dll

Logging engine, required for all tests

PPPAuth.dll

Library containing the test cases

Subtests

The table below lists the subtests included in this test.

SubTest ID Description

1

PPTP_PAP_PROHIBIT_PAP

2

PPTP_PAP_PROHIBIT_MSCHAPV2

3

PPTP_PAP_PROHIBIT_MSCHAP

4

PPTP_PAP_PROHIBIT_CHAP

5

PPTP_PAP_PROHIBIT_EAP

6

PPTP_PAP_REQUIRE_ENC_PW

7

PPTP_PAP_REQUIRE_MS_ENC_PW

8

PPTP_PAP_REQUIRE_DATA_ENC

9

PPTP_PAP_REQUIRE_ENC_MS_PW

10

PPTP_PAP_REQUIRE_MS_DATA_ENC

11

PPTP_PAP_REQUIRE_MS_DATA_ENC_PW

12

PPTP_PAP_REQUIRE_NO_FLAGS

101

PPTP_MSCHAP_PROHIBIT_PAP

102

PPTP_MSCHAP_PROHIBIT_MSCHAPV2

103

PPTP_MSCHAP_PROHIBIT_MSCHAP

104

PPTP_MSCHAP_PROHIBIT_CHAP

105

PPTP_MSCHAP_PROHIBIT_EAP

106

PPTP_MSCHAP_REQUIRE_ENC_PW

107

PPTP_MSCHAP_REQUIRE_MS_ENC_PW

108

PPTP_MSCHAP_REQUIRE_DATA_ENC

109

PPTP_MSCHAP_REQUIRE_ENC_MS_PW

110

PPTP_MSCHAP_REQUIRE_MS_DATA_ENC

111

PPTP_MSCHAP_REQUIRE_MS_DATA_ENC_PW

112

PPTP_MSCHAP_REQUIRE_NO_FLAGS

201

PPTP_MSCHAPv2_PROHIBIT_PAP

202

PPTP_MSCHAPv2_PROHIBIT_MSCHAPV2

203

PPTP_MSCHAPv2_PROHIBIT_MSCHAP

204

PPTP_MSCHAPv2_PROHIBIT_CHAP

205

PPTP_MSCHAPv2_PROHIBIT_EAP

206

PPTP_MSCHAPv2_REQUIRE_ENC_PW

207

PPTP_MSCHAPv2_REQUIRE_MS_ENC_PW

208

PPTP_MSCHAPv2_REQUIRE_DATA_ENC

209

PPTP_MSCHAPv2_REQUIRE_ENC_MS_PW

210

PPTP_MSCHAPv2_REQUIRE_MS_DATA_ENC

211

PPTP_MSCHAPv2_REQUIRE_MS_DATA_ENC_PW

212

PPTP_MSCHAPv2_REQUIRE_NO_FLAGS

301

PPTP_EAP_PROHIBIT_PAP

302

PPTP_EAP_PROHIBIT_MSCHAPV2

303

PPTP_EAP_PROHIBIT_MSCHAP

304

PPTP_EAP_PROHIBIT_CHAP

305

PPTP_EAP_PROHIBIT_EAP

306

PPTP_EAP_REQUIRE_ENC_PW

307

PPTP_EAP_REQUIRE_MS_ENC_PW

308

PPTP_EAP_REQUIRE_DATA_ENC

309

PPTP_EAP_REQUIRE_ENC_MS_PW

310

PPTP_EAP_REQUIRE_MS_DATA_ENC

311

PPTP_EAP_REQUIRE_MS_DATA_ENC_PW

312

PPTP_EAP_REQUIRE_NO_FLAGS

401

PPTP_MD5CHAP_PROHIBIT_PAP

402

PPTP_MD5CHAP_PROHIBIT_MSCHAPV2

403

PPTP_MD5CHAP_PROHIBIT_MSCHAP

404

PPTP_MD5CHAP_PROHIBIT_CHAP

405

PPTP_MD5CHAP_PROHIBIT_EAP

406

PPTP_MD5CHAP_REQUIRE_ENC_PW

407

PPTP_MD5CHAP_REQUIRE_MS_ENC_PW

408

PPTP_MD5CHAP_REQUIRE_DATA_ENC

409

PPTP_MD5CHAP_REQUIRE_ENC_MS_PW

410

PPTP_MD5CHAP_REQUIRE_MS_DATA_ENC

411

PPTP_MD5CHAP_REQUIRE_MS_DATA_ENC_PW

412

PPTP_MD5CHAP_REQUIRE_NO_FLAGS

501

PPTP_NODCC_PROHIBIT_PAP

502

PPTP_NODCC_PROHIBIT_MSCHAPV2

503

PPTP_NODCC_PROHIBIT_MSCHAP

504

PPTP_NODCC_PROHIBIT_CHAP

505

PPTP_NODCC_PROHIBIT_EAP

506

PPTP_NODCC_REQUIRE_ENC_PW

507

PPTP_NODCC_REQUIRE_MS_ENC_PW

508

PPTP_NODCC_REQUIRE_DATA_ENC

509

PPTP_NODCC_REQUIRE_ENC_MS_PW

510

PPTP_NODCC_REQUIRE_MS_DATA_ENC

511

PPTP_NODCC_REQUIRE_MS_DATA_ENC_PW

512

PPTP_NODCC_REQUIRE_NO_FLAGS

601

L2TP_PAP_PROHIBIT_PAP

602

L2TP_PAP_PROHIBIT_MSCHAPV2

603

L2TP_PAP_PROHIBIT_MSCHAP

604

L2TP_PAP_PROHIBIT_CHAP

605

L2TP_PAP_PROHIBIT_EAP

606

L2TP_PAP_REQUIRE_ENC_PW

607

L2TP_PAP_REQUIRE_MS_ENC_PW

608

L2TP_PAP_REQUIRE_DATA_ENC

609

L2TP_PAP_REQUIRE_ENC_MS_PW

610

L2TP_PAP_REQUIRE_MS_DATA_ENC

611

L2TP_PAP_REQUIRE_MS_DATA_ENC_PW

612

L2TP_PAP_REQUIRE_NO_FLAGS

701

L2TP_MSCHAP_PROHIBIT_PAP

702

L2TP_MSCHAP_PROHIBIT_MSCHAPV2

703

L2TP_MSCHAP_PROHIBIT_MSCHAP

704

L2TP_MSCHAP_PROHIBIT_CHAP

705

L2TP_MSCHAP_PROHIBIT_EAP

706

L2TP_MSCHAP_REQUIRE_ENC_PW

707

L2TP_MSCHAP_REQUIRE_MS_ENC_PW

708

L2TP_MSCHAP_REQUIRE_DATA_ENC

709

L2TP_MSCHAP_REQUIRE_ENC_MS_PW

710

L2TP_MSCHAP_REQUIRE_MS_DATA_ENC

711

L2TP_MSCHAP_REQUIRE_MS_DATA_ENC_PW

712

L2TP_MSCHAP_REQUIRE_NO_FLAGS

801

L2TP_MSCHAPv2_PROHIBIT_PAP

802

L2TP_MSCHAPv2_PROHIBIT_MSCHAPV2

803

L2TP_MSCHAPv2_PROHIBIT_MSCHAP

804

L2TP_MSCHAPv2_PROHIBIT_CHAP

805

L2TP_MSCHAPv2_PROHIBIT_EAP

806

L2TP_MSCHAPv2_REQUIRE_ENC_PW

807

L2TP_MSCHAPv2_REQUIRE_MS_ENC_PW

808

L2TP_MSCHAPv2_REQUIRE_DATA_ENC

809

L2TP_MSCHAPv2_REQUIRE_ENC_MS_PW

810

L2TP_MSCHAPv2_REQUIRE_MS_DATA_ENC

811

L2TP_MSCHAPv2_REQUIRE_MS_DATA_ENC_PW

812

L2TP_MSCHAPv2_REQUIRE_NO_FLAGS

901

L2TP_EAP_PROHIBIT_PAP

902

L2TP_EAP_PROHIBIT_MSCHAPV2

903

L2TP_EAP_PROHIBIT_MSCHAP

904

L2TP_EAP_PROHIBIT_CHAP

905

L2TP_EAP_PROHIBIT_EAP

906

L2TP_EAP_REQUIRE_ENC_PW

907

L2TP_EAP_REQUIRE_MS_ENC_PW

908

L2TP_EAP_REQUIRE_DATA_ENC

909

L2TP_EAP_REQUIRE_ENC_MS_PW

910

L2TP_EAP_REQUIRE_MS_DATA_ENC

911

L2TP_EAP_REQUIRE_MS_DATA_ENC_PW

912

L2TP_EAP_REQUIRE_NO_FLAGS

1001

L2TP_MD5CHAP_PROHIBIT_PAP

1002

L2TP_MD5CHAP_PROHIBIT_MSCHAPV2

1003

L2TP_MD5CHAP_PROHIBIT_MSCHAP

1004

L2TP_MD5CHAP_PROHIBIT_CHAP

1005

L2TP_MD5CHAP_PROHIBIT_EAP

1006

L2TP_MD5CHAP_REQUIRE_ENC_PW

1007

L2TP_MD5CHAP_REQUIRE_MS_ENC_PW

1008

L2TP_MD5CHAP_REQUIRE_DATA_ENC

1009

L2TP_MD5CHAP_REQUIRE_ENC_MS_PW

1010

L2TP_MD5CHAP_REQUIRE_MS_DATA_ENC

1011

L2TP_MD5CHAP_REQUIRE_MS_DATA_ENC_PW

1012

L2TP_MD5CHAP_REQUIRE_NO_FLAGS

1101

L2TP_NODCC_PROHIBIT_PAP

1102

L2TP_NODCC_PROHIBIT_MSCHAPV2

1103

L2TP_NODCC_PROHIBIT_MSCHAP

1104

L2TP_NODCC_PROHIBIT_CHAP

1105

L2TP_NODCC_PROHIBIT_EAP

1106

L2TP_NODCC_REQUIRE_ENC_PW

1107

L2TP_NODCC_REQUIRE_MS_ENC_PW

1108

L2TP_NODCC_REQUIRE_DATA_ENC

1109

L2TP_NODCC_REQUIRE_ENC_MS_PW

1110

L2TP_NODCC_REQUIRE_MS_DATA_ENC

1111

L2TP_NODCC_REQUIRE_MS_DATA_ENC_PW

1112

L2TP_NODCC_REQUIRE_NO_FLAGS

1201

DCC_PAP_PROHIBIT_PAP

1202

DCC_PAP_PROHIBIT_MSCHAPV2

1203

DCC_PAP_PROHIBIT_MSCHAP

1204

DCC_PAP_PROHIBIT_CHAP

1205

DCC_PAP_PROHIBIT_EAP

1206

DCC_PAP_REQUIRE_ENC_PW

1207

DCC_PAP_REQUIRE_MS_ENC_PW

1208

DCC_PAP_REQUIRE_DATA_ENC

1209

DCC_PAP_REQUIRE_ENC_MS_PW

1210

DCC_PAP_REQUIRE_MS_DATA_ENC

1211

DCC_PAP_REQUIRE_MS_DATA_ENC_PW

1212

DCC_PAP_REQUIRE_NO_FLAGS

1301

DCC_MSCHAP_PROHIBIT_PAP

1302

DCC_MSCHAP_PROHIBIT_MSCHAPV2

1303

DCC_MSCHAP_PROHIBIT_MSCHAP

1304

DCC_MSCHAP_PROHIBIT_CHAP

1305

DCC_MSCHAP_PROHIBIT_EAP

1306

DCC_MSCHAP_REQUIRE_ENC_PW

1307

DCC_MSCHAP_REQUIRE_MS_ENC_PW

1308

DCC_MSCHAP_REQUIRE_DATA_ENC

1309

DCC_MSCHAP_REQUIRE_ENC_MS_PW

1310

DCC_MSCHAP_REQUIRE_MS_DATA_ENC

1311

DCC_MSCHAP_REQUIRE_MS_DATA_ENC_PW

1312

DCC_MSCHAP_REQUIRE_NO_FLAGS

1401

DCC_MSCHAPv2_PROHIBIT_PAP

1402

DCC_MSCHAPv2_PROHIBIT_MSCHAPV2

1403

DCC_MSCHAPv2_PROHIBIT_MSCHAP

1404

DCC_MSCHAPv2_PROHIBIT_CHAP

1405

DCC_MSCHAPv2_PROHIBIT_EAP

1406

DCC_MSCHAPv2_REQUIRE_ENC_PW

1407

DCC_MSCHAPv2_REQUIRE_MS_ENC_PW

1408

DCC_MSCHAPv2_REQUIRE_DATA_ENC

1409

DCC_MSCHAPv2_REQUIRE_ENC_MS_PW

1410

DCC_MSCHAPv2_REQUIRE_MS_DATA_ENC

1411

DCC_MSCHAPv2_REQUIRE_MS_DATA_ENC_PW

1412

DCC_MSCHAPv2_REQUIRE_NO_FLAGS

1501

DCC_EAP_PROHIBIT_PAP

1502

DCC_EAP_PROHIBIT_MSCHAPV2

1503

DCC_EAP_PROHIBIT_MSCHAP

1504

DCC_EAP_PROHIBIT_CHAP

1505

DCC_EAP_PROHIBIT_EAP

1506

DCC_EAP_REQUIRE_ENC_PW

1507

DCC_EAP_REQUIRE_MS_ENC_PW

1508

DCC_EAP_REQUIRE_DATA_ENC

1509

DCC_EAP_REQUIRE_ENC_MS_PW

1510

DCC_EAP_REQUIRE_MS_DATA_ENC

1511

DCC_EAP_REQUIRE_MS_DATA_ENC_PW

1512

DCC_EAP_REQUIRE_NO_FLAGS

1601

DCC_MD5CHAP_PROHIBIT_PAP

1602

DCC_MD5CHAP_PROHIBIT_MSCHAPV2

1603

DCC_MD5CHAP_PROHIBIT_MSCHAP

1604

DCC_MD5CHAP_PROHIBIT_CHAP

1605

DCC_MD5CHAP_PROHIBIT_EAP

1606

DCC_MD5CHAP_REQUIRE_ENC_PW

1607

DCC_MD5CHAP_REQUIRE_MS_ENC_PW

1608

DCC_MD5CHAP_REQUIRE_DATA_ENC

1609

DCC_MD5CHAP_REQUIRE_ENC_MS_PW

1610

DCC_MD5CHAP_REQUIRE_MS_DATA_ENC

1611

DCC_MD5CHAP_REQUIRE_MS_DATA_ENC_PW

1612

DCC_MD5CHAP_REQUIRE_NO_FLAGS

1701

DCC_NODCC_PROHIBIT_PAP

1702

DCC_NODCC_PROHIBIT_MSCHAPV2

1703

DCC_NODCC_PROHIBIT_MSCHAP

1704

DCC_NODCC_PROHIBIT_CHAP

1705

DCC_NODCC_PROHIBIT_EAP

1706

DCC_NODCC_REQUIRE_ENC_PW

1707

DCC_NODCC_REQUIRE_MS_ENC_PW

1708

DCC_NODCC_REQUIRE_DATA_ENC

1709

DCC_NODCC_REQUIRE_ENC_MS_PW

1710

DCC_NODCC_REQUIRE_MS_DATA_ENC

1711

DCC_NODCC_REQUIRE_MS_DATA_ENC_PW

1712

DCC_NODCC_REQUIRE_NO_FLAGS

Setting Up the Test

The RAS Authentication Test requires the image to have the following SYSGENs set depending on what is being tested:

* SYSGEN_PPP for DCC cases

* SYSGEN_PPTP for PPTP cases

* SYSGEN_L2TP for L2TP cases

If you do not have one or more of these SYSGENs, you can exclude the relevant test cases by specifying only the desired test cases w the -x option in Tux.

Also, if you do not have the serial cable setup, you can skip the relevant test cases by specifying only the desired test cases using the -x option in Tux.

Boot the Windows Embedded Compact-based device and attach the serial cable to a RAS server. Run case 100 in the TAPIclient Tux suite to get the device identifier of the serial port you wish to use. For example: s tux -o -d tapiclient -x 100.

Running the Test

Before you can run the RAS Authentication Test, you must modify the current command line for this test by specifying the parameters after the -c.

s tux -o -d PPPAuth -c "[Parameters]"

The following table shows the command line parameters for use with the RAS Authentication Test.

Command line parameter Description

-device id

choose available RAS device

-user username

User name to be authenticated

-dccuser username

Direct cable connection user name

-pwd password

User password

-dccpw password

User Direct cable connection user password

-domain domain

The server domain

-svr VPN_server

(PPTP and L2TP) The VPN server name

-psk key

(L2TP only) The preshared key

-x test_cases

Specifies the test case or cases to run

Tux -o -d PPPAuth.dll -c" parameters"

Verifying the Test

When the test completes running, verify that "PASS" appears in the test log for all sub-tests.

Troubleshooting the Test

If any of the test cases fail, be sure you can connect to your VPN Server and RAS server using the Network Configuration Window from the control panel. Make sure that your VPN Server and RAS Server are set up correctly as described in Test Prerequisites for the RAS Authentication Test.

For additional platform specific issues, consult the CTK articles on the TechNet wiki.

See Also

Other Resources

Networking - Bluetooth, Modem, Wireless Tests