3.5 Confirm Use of Non-Proprietary Network Protocols

3.5 – Confirm Use of Non-Proprietary Network Protocols

Requirement Description

Verify that no proprietary network protocols are used in the device. If proprietary protocols are present, complete implementation details and the source code shall be provided for assessment.


DUT Confirmation Details

(To be provided by the vendor/OEM)

  • Device Name: [Insert Device Name]

  • Model Number: [Insert Model Number]

  • Manufacturer: [Insert Manufacturer Name]


DUT Software Details

  • Firmware Version: [Insert Version]

  • Operating System/Platform: [e.g., Linux Kernel vX, Embedded RTOS]

  • Build ID/Release Date: [Insert Details]


Hash Checksum Verification for DUT’s Software Image

  • Hashing Algorithm Used: SHA-256

  • Verified Checksum: [Insert Checksum]

  • Integrity Status: Verified / Not Verified


DUT Configuration

  • Network Interfaces: [e.g., Ethernet, Wi-Fi, Cellular]

  • Protocol Stack Used: [e.g., TCP/IP, MQTT, HTTP/HTTPS, etc.]

  • Security Protocols: [e.g., TLS 1.2, SSH, etc.]


Pre-Conditions

The vendor shall provide the following:

  • A detailed document listing all network protocols used in the firmware/device

  • For any proprietary protocol, complete documentation including:

    • Functional overview

    • Security controls

    • Source code or binaries for assessment


Test Plan

  • Total Number of Test Cases: 1

  • Validation Method:

    • Documentation review

    • Optional: Traffic analysis using tools such as Wireshark to detect non-standard protocol usage


Test-bed Diagram with Interfaces and IP Addresses

(Attach or refer to a network diagram showing the DUT, test interfaces, IP assignments, and capturing system if applicable. This is used for protocol behavior validation during active testing.)

Last updated

Was this helpful?