Test Case

Show / Hide direct link   <MAIN> 3196PA: PEAPGTC Wireless Authentication Verification - PP-80415



Version 1.5
Created on 25/01/2006 18:56:29  by Muralidharan Seshadri
Summary
Preconditions
Status:   New
Priority:   Medium
BASIC INFORMATION
Section:S/W Test Require attachment:No
Team:Network Group:Basic Function
Lessons Learned:No Phase:FVT, SIV (BBFV), SIT
Locations:Inhouse: AWS and Cambridge, Inhouse: AWS, Inhouse: Cambridge, Compal, Flextronics, Quanta, Wistron Owned By:Eiji Ogata/LENOVO
Objective:To verify PEAP-GTC functions on ThinkPad using all supported WL adapters
CRITERIA
Successful PEAP-GTC authentications
No system malfucntion/performance degradation
EUT QUANTITY
Two systems
EQUIPMENT
PA Networking facilities.
Critical Attribute:[0] : WLS - Wireless

CONFIGURATION
REFERENCE PROCEDURE
STATISTIC INFO
Operating System Win81-64bit Win81-32bit Win7- 64bit Win7- 32bit Total
Test Points
Duration
Workload
# Step actions Win81-64bitWin81-32bitWin7- 64bitWin7- 32bit
1 PEAP-GTC Verification Authentication Matrix AAAA
2 Prompt for User Credentials Behavior for Access Connections AAAA
3 PEAP-GTC Authentication , Client side Configuration and Verification AAAA
4 CCX-4 AAAA
5 Network Reliability Test AAAA
DETAILS
ATTENTION!! Please follow below information.
1. Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead, then arrange to open defect, if needed.

2. Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case).

3. All Test Activity should be performed with AMT Enabled as Default (applicable on vPro enabled systems).

4. Please check Usability / Cosmetic issues (correct sentence/appropriate display/etc.) and open defect, if needed.

PEAP-GTC Verification Authentication Matrix

Using Access Connections
Authentication
SSID
Authentication
Server
User Credential
Encryption
Atheros
Intel
Realtek
Broadcomm
PEAP-GTCWEP
CISCO ACS/ RSA Secure ID
Saved Username & Password
WEP
A
A
A
A
Temp Prompt Username & Password
WEP
A
A
A
A
Hardware Token
WEP
A
A
A
A
PEAP-GTCCKIP
CISCO ACS/ RSA Secure ID
Saved Username & Password
CKIP
A
A
A
A
Temp Prompt Username & Password
CKIP
A
A
A
A
Hardware Token
CKIP
A
A
A
A
WPAPEAP-GTCTKIP
CISCO ACS/
RSA Secure ID
Saved Username & Password
TKIP
A
A
A
A
Temp Prompt Username & Password
TKIP
A
A
A
A
Hardware Token
TKIP
A
A
A
A
WPAPEAP-GTCAES
CISCO ACS/
RSA Secure ID
Saved Username & Password
AES
A
A
A
A
Temp Prompt Username & Password
AES
A
A
A
A
Hardware Token
AES
A
A
A
A
WPA2PEAP-GTCAES
CISCO ACS/
RSA Secure ID
Saved Username & Password
AES
A
A
A
A
Temp Prompt Username & Password
AES
A
A
A
A
Hardware Token
AES
A
A
A
A


Using Zero Config
Test Item
Configuration
Atheros
Intel
Realtek
Broadcomm
PEAP-GTC-WEP Verification
Standalone
A
A
A
A
WPA-GTC-TKIP Verification
Standalone
A
A
A
A
WPA-GTC-AES Verification
Standalone
A
A
A
A
WPA2-GTC-TKIP Verification
Standalone
A
A
A
A
WPA2-GTC-AES Verification
Standalone
A
A
A
A
CCKM Verification
Standalone
A
A
A
A

Prompt for User Credentials Behavior for Access Connections

GS - Global Settings option (Close all wireless network connections when user logs off.)
Yes - Prompt a Dialog Box
No- No Prompt

PEAP
Standby
Hibernate
Logon/Logoff
Restart
Disable (GS)
GTC Prompt
No
No
No
Yes
GTC Token
Yes
Yes
Yes
Yes
Enable (GS)
GTC Prompt
No
No
Yes
Yes
GTC Token
Yes
Yes
Yes
Yes


PEAP-GTC Authentication , Client side Configuration and Verification

Perform the below test scenarios in both Admin and User modes
Test Item
Check Item / Criteria
Configuration
Result
WinXP
Win7 [32/64]
Win8 [32/64]
Wireless Client Configuration (Downloading Certificate)
  1. Make sure that Windows XP MS WPA Patch Q834565 is installed in the test system (Applicable only for Win XP SP1. This is included in XP-SP2)
  2. Connect the System to Wndows 2003 / Windows 2000 Domain Network by ethernet
  3. Register the Wireless Client as Domain Member of Windows 2003 /Windows 2000 Domain
  4. Add the Domain User to the Local Administrator group.
  5. Log in as the Domain user.
  6. Download Root Certificate using Internet Explorer or Microsoft Management Console from Certification Server in Windows 2003/ Windows 2000 Domain. (For ex: 192.168.51.1 /certsrv)
  7. Install the Root Certificate - Root CA Server Certificate needs to be stored by the following procedure:
    - Start Certificate Import Wizard by clicking the Install Certificate button.
    - Click "Next" and check at "Place all certificates in the following store"
    - Click "Browse"and check at "Show physical stores"
    - Explode at "Trusted Root Certification Authorities"
    - Click "Local Computer" and then "Ok"
8. After Certificate is successfully installed , from Internet
Explorer, Click Tools>Internet options>content> certification and verify the downloaded certificate is listed.

  • The Root Certificate shall be successfully downloaded
  • No Error Message while downloading the Certificate


Standalone


A


A


A
PEAP-GTC Verification (Use Saved Username and Password)
  1. Launch Access Connection application
  2. Create a PEAP-GTC profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : PEAP
  5. In the Tunneled Authentication Select,GTC
  6. Click the option `Enter User Credentials`
  7. Enter the Roaming Identity/logon name
  8. Choose the option `Use Saved user Name and password`, Enter the credentials and Click `Ok`
  9. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOGTCSVR)
  10. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : PEAP-GTC) and give OK
  11. Save and Apply the profile.
  12. Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
  13. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 11-12
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 11-12
  15. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  16. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • Outer Authentication (EAP-Phase-1):PEAP and Inner Authentication (EAP-Phase-2):EAP-GTC should be established
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
Standalone
A
A
A
PEAP-GTC Verification (Prompt temporary name and Password)
  1. Launch Access Connection application
  2. Create a PEAP-GTC profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : PEAP
  5. In the Tunneled Authentication Select,GTC
  6. Click the option `Enter User Credentials`
  7. Enter the Roaming Identity/logon name
  8. Choose the option `Prompt temporary name and password`, Enter the credentials and Click `Ok`
  9. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOGTCSVR)
  10. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : PEAP-GTC) and give OK
  11. Save and Apply the profile. Provide the username and password when prompted
  12. Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
  13. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 11-12
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 11-12
  15. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  16. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • Outer Authentication (EAP-Phase-1):PEAP and Inner Authentication (EAP-Phase-2):EAP-GTC should be established
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
Standalone
A
A
A
PEAP-GTC Verification - (Using Hardware Token)
  1. Launch Access Connection application
  2. Create a PEAP-GTC profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : PEAP
  5. In the Tunneled Authentication Select,GTC
  6. Click the option `Enter User Credentials`
  7. Enter the Roaming Identity/logon name
  8. Choose the option `Use one time token (password)`, Enter the credentials and Click `Ok``
  9. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOGTCSVR)
  10. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : PEAP-GTC) and give OK
  11. Save and Apply the profile.
  12. "Enter Your Token Number" will appear
  13. You will put here the first 4 digit PIN assigned on specific HW Token + the 6 digit PIN appearing on the HW token screen).Example for HW Token assigned PIN (pahwtoken:7297 + the 6 digit # you will see in the hw token screen)
  14. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 11-12
  15. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 11-12
  16. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  17. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 11-12 successfull.
  • PEAP-GTC authentication shall be successful
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
Standalone
A
A
A
PEAP-GTC Verification - (Using Software Token)
  1. Launch Access Connection application
  2. Create a PEAP-GTC profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : PEAP
  5. In the Tunneled Authentication Select,GTC
  6. Click the option `Enter User Credentials`
  7. Enter the Roaming Identity/logon name
  8. Choose the option `Use one time token (password)`, Enter the credentials and Click `Ok``
  9. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOGTCSVR)
  10. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : PEAP-GTC) and give OK
  11. Save and Apply the profile.
  12. "Enter Your Token Number" will appear
  13. Password: (You will put here the 8 digit PIN appearing on the SW token screen)
  14. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 11-12
  15. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 11-12
  16. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  17. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 11-12 successfull.
  • PEAP-GTC authentication shall be successful
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
Standalone
A
A
A
PEAP-GTC with blank Roaming Identity
63811 XP/2K:PEAPGTC onetime token w/o roaming ID doesnt prompt usrname
  1. Recover WinXP/Win2K
  2. Install latest Wireless driver and restart the computer.
  3. Install latest Access Connections and restart
  4. Create a single adapter WL profile “PEAP-GTC” with Wireless Security Type option “Enabled – Use 802.1x Authentication” selected.
  5. Select EAP Type as “PEAP” and Authentication Protocol as “GTC”.
  6. Select "Enter user credentials" and then select “Use one time token (password)” option
  7. Do not provide the roaming identity
  8. Apply the profile

  • In the case of Intel adapters , "Enter the Token number" popup window will appear
  • In the case of Atheros adapters , "Enter the Token number" popup window will not appear


Standalone


A


A


A
PEAP-GTC with Incorrect Roaming Identity
64708 WXP:Atheros:Peap-GTC auth fails with incorrect roaming identity
  1. Recover WinXP/Win2K
  2. Install latest Wireless driver and restart the computer.
  3. Install latest Access Connections and restart
  4. Create a single adapter WL profile “PEAP-GTC” with Wireless Security Type option “Enabled – Use 802.1x Authentication” selected.
  5. Select EAP Type as “PEAP” and Authentication Protocol as “GTC”.
  6. Select "Enter user credentials" and then select “Use one time token (password)” option
  7. Provide Incorrect Roaming Identity
  8. Apply the profile

  • In the case of Intel adapters , "Enter the Token number" popup window will still appear and connection will be established if correct username is provided
  • In the case of Atheros adapters , "Enter the Token number" popup window will appear but even if correct username is provided , connection will still fail


Standalone


A


A


A

CCX-5
PEAP PROFILE
WinXP
Win7 [32/64]
Win8 [32/64]
GTC
Use One Time Token A prompt is always shown everytime this profile tries to connect
Suspend resume case prompt is shown
Used Saved Username and Password No prompt is shown for this profile, even for log off and log on scenario as well as restart
For suspend resume scenario, user credential is cached

Network Reliability Test

Test Item Check Item / Criteria Configuration
Result
WinXP
Win7 [32/64]
Win8 [32/64]
Warm Boot Tests
  1. After Successfull authentication and Network Connection is established, Restart the System
  2. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. Network Connectivity shall be established after each Restart
  5. Network connection be restored to Previously used Profile unless AP is powered off
  6. Network Connection shall not be available until the Windows Login is completed.

  • Authentication shall be successfull after each Restart
  • No Error Message after Restart


Access Connection Profile (Win8 NA)
Windows Zero Config


A


A


A
Connect /Disconnect Tests
  1. Launch Access Connection. Connect the Wireless Profile > PEAP-GTC Static. Verify Authentication is successfull and Network Connection is established.
  2. Disconnect the Profile. Connect the same profile again.Verify Authentication is successfull and Network Connection is established.
  3. Repeat this operation in Step 1-2 for five times.
  4. Launch Access Connection. Connect the Wireless Profile > PEAP-GTC-Token. Verify Authentication is successfull and Network Connection is established.
  5. Disconnect the Profile. Connect the same profile again.Verify Authentication is successfull and Network Connection is established.
  6. Repeat this operation in Step 4-5 for five times.


  • Authentication shall be successfull after every Disconnect / Connect operation
  • Network Connectivity shall be established after every Disconnect / Connect operation
  • No Error Message occurs

Access Connection Profile (Win8 NA)
Windows Zero Config


A


A


A
Cold Boot Tests
  1. After Successfull authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria

  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs

Access Connection Profile (Win8 NA)
Windows Zero Config



A


A


A
Power Management Tests - UR-2725
Suspend
  1. After Successful authentication and Network Connection is established, Press Fn+F4 to suspend the system.
  2. Resume the system by presing the Fn key after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

Hibernate
  1. After Successful authentication and Network Connection is established, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Power button key after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

Lid-close
  1. After Successfull authentication and Network Connection is established close the lid to suspend the system
  2. Resume the system by opening the lid after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

(UR-03035AP)
Note: For Intel Wireless Cards in Windows 7 and Vista, Wireless profile authentication does not prompt even if "remember my user credentials" option is unchecked. This is working as designed using Intel Wireless LAN cards. (Ref:ECR83575, ECR86357)

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs
Access Connection Profile (Win8 NA)
Windows Zero Config


A


A


A
Power Management Test with Logoff/Login
PEAPGTC with "Prompt for Temporary username/password" option:

Suspend
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Power button after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

PEAPGTC with "Saved Username and Password" option:

Suspend
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Power button after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

PEAPGTC with SSO option :

Suspend
  1. Create a PEAPGTC profile with SSO option and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with SSO option and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Power button after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with SSO option and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

Note: For Intel Wireless Cards in Windows 7 and Vista, Wireless profile authentication does not prompt even if "remember my user credentials" option is unchecked. This is working as designed using Intel Wireless LAN cards. (Ref:ECR83575, ECR86357)

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs

Access Connection Profile (Win8 NA)
Windows Zero Config


A


A


A
Idling Test
CMVC#67055 All:PEAPGTC prompt for token again even when connected in Lee

Idling Test
  1. Create/apply PEAP-GTC "One Time Token" profile
  2. After Successfull authentication and Network Connection is established, leave the system idle for 5 minutes.
  3. Suspend/Resume the system , make sure connection is established and leave the system idle for 5 minutes
  4. Restart the system ,make sure connection is established and leave the system idle for 5 minutes

  • One Time Token" prompt should not appear again asking for token number

Access Connection Profile (Win8 NA)
Windows Zero Config


A


A


A
OTHER DETAILS
EUT Quantity : Two systems 1. "Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead."
2. "Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case)"
(All Test Activity should be performed with AMT Enabled) Note :
1. Perform the test in User mode as well as Administrator mode
2. Please check the version of Access Connection to be used for each product. Access Connection may require specific version of device driver to be installed for the adapters to be tested.
3. Refer latest Access Connection Function specification for the feature support.

Perform Access Connection on Japanese OS for SIT for the final verification. Initial stages of testing can be performed on US version. While doing JP coverage, verify the japanese characters, error messages and help menu contents.

Access Connections applications may have other functions/GUI not mentioned in this test case. Please verify all the available functions and GUI that comes with the particular version of Access Connections. Any updation required to the test case, Please inform Lenovo Engineers.



Known Limitations/Restrictions/Information
Known Limitations
1. Note: For Intel Wireless Cards in Windows 7 and Vista, Wireless profile authentication does not prompt even if "remember my user credentials" option is unchecked. This is working as designed using Intel Wireless LAN cards. (Ref:ECR83575, ECR86357)
Restriction
1. Even "Allow all users of this system to create and apply loation profiles" Global settings option check box is checked, limited user account can not modify or create the setting for TCP/IP settings or security settings of local driver share, firewall settings due to Widnows security protection. Such setting is used with Windows default settings. Default is not checked.
2. Global settings can be only modified by the user when the logon privilege is administrator privilege.
3. The global settings option "Disable Adhoc connection type option in wireless LAN profiles" is not applicable, if the user create the profile using WIndows wireless LAN property window.
4. Profile disconnects when user change wireless security type of 802.1x peap to LEAP or vice versa
(Reference: ECR112851, W7:Profile disconnect when change wireless security type of 802.1x)
Information
1. When "Allow all users of this system to create and apply loation profiles" check box is checked, it allows user to create the location profiles and enables location switching regardless of the windows logon privilege (administrator or limited users).
2. Wireless profiles will be listed in the upper part of the profile list and the Ethernet profiles will be displayed at the lower part of the location profile list on "Automatic switching profile priority window". Due to the faster speed, the Ethernet profiles have higher priority than the wireless profiles.
3. Static IP address wireless profile will be listed in automtic location switching, as per the new design. However, static IP address ethernet profile will not be listed in automatic location switching.
4. ThinkPad 11b/g/n Wireless LAN Mini-PCI Express Adapter II has 1x2 antennas - 1 antenna for transmitter (Tx) and 2 antennas for receiver (Rx), and the maximum theoretical speed is 150Mbps (Tx) / 300Mbps (Rx) in the 802.11n mode. However, the current Realtek driver displays Tx speed as design. So it displays 150Mbps in the 802.11n mode even though the Rx speed is 300Mbps.
Solution : Display the Rx speed, instead of the Tx speed in the Realtek WLAN driver.



Summary of Results
Details
Intel
Atheros
Realtek
Broadcom
WinXP
Win7 [32/64]
Win8 [32/64]
WinXP
Win7 [32/64]
Win8 [32/64]
WinXP
Win7 [32/64]
Win8 [32/64]
WinXP
Win7 [32/64]
Win8 [32/64]
Certificate Download and Client Configuration
PEAPGTC-WEP/CKIP/WPATKIP/WPAAES/WPA2AES Authentication using
- Use Saved Username/ Password
PEAPGTC-WEP/CKIP/WPATKIP/WPAAES/WPA2AES Authentication using
- Prompt for Temporary Username/Password
PEAPGTC-WEP/CKIP/WPATKIP/WPAAES/WPA2AES Authentication using
- Use 1 time token password (Hardware Token)
PEAPGTC-WEP/CKIP/WPATKIP/WPAAES/WPA2AES Authentication using
- Use 1 time token password (Software Token)
Warm Boot Tests
Cold Boot Tests
Power Management Tests

TEMS Reviewer Log:
Review Logs
Keywords:   None
Requirements :   None
Attached files :

Update History:
This document is not yet modified.