Test Case

Show / Hide direct link   <MAIN> 3414PA: WL Authentication with MultiDomain verification Test - PP-80419



Version 1.2
Created on 03/04/2006 17:31:44  by Muralidharan Seshadri
Summary
Preconditions
Status:   New
Priority:   Medium
BASIC INFORMATION
Section:S/W Test Require attachment:No
Team:Network Group:Integration
Lessons Learned:No Phase:FVT, SIV (BBFV), SIT
Locations:Inhouse: AWS and Cambridge, Inhouse: AWS, Inhouse: Cambridge, Compal, Flextronics, Quanta, Wistron Owned By:Eiji Ogata/LENOVO
Objective:To verify the authentciations using multidoamin setup as part of the customer scenerio.
CRITERIA
Successful authenticaiton with Multi domain environment.
EUT QUANTITY
Two systems
EQUIPMENT
PA Networking facilities.
Critical Attribute:[0] : WLS - Wireless

CONFIGURATION
REFERENCE PROCEDURE


Root Domain: (You can use the existing EAP-TTLS server as root domain)

- Install a Windows 2003 Enterprise server and update all the latest patches
- Configure the server as the parent domain controller

Domain name: EAP-TTLS.COM
Server name : FUNK.EAP-TTLS.COM

- Configure DNS / DHCP / Funk / CA in this system

CHILD Domain:

- Install another Windows 2003 Enterprise server connected to the same hub
- Configure the server as a child domain controller of existing root domain controller EAP-TTLS.com

Child Domain name: TTLSCHILD.eap-ttls.com
Server Name: TTLS.TTLSCHILD.eap-ttls.com

- The DNS/DHCP will be pointed to Root server EAP-TTLS.COM





PEAPCHAP multi domain setup

Root Domain: (You can use the existing PEAPCHAP server as root domain)

- Install a Windows 2003 Enterprise server and update all the latest patches
- Configure the server as the parent domain controller

Domain name: EAP.COM
Server name : EAPSRV.EAP.COM

- Configure DNS / DHCP / Funk / CA in this system
- Create a policy for PEAPCHAP in IAS

CHILD Domain: - A New server needed

- Install another Windows 2003 Enterprise server connected to the same hub
- Configure the server as a child domain controller of existing root domain controller

Child Domain name: PEAPCHILD.eap.com
Server Name: PEAPMSCHAP.PEAPCHILD.eap.com

- The DNS/DHCP will be pointed to Root server EAP.COM

STATISTIC INFO
Operating System Win81-64bit Win81-32bit Win10-32bit Win10-64bit Win7- 64bit Win7- 32bit Total
Test Points
Duration
Workload
# Step actions Win81-64bitWin81-32bitWin10-32bitWin10-64bitWin7- 64bitWin7- 32bit
1 EAP-TTLS Verification AAAAAA
2 Network Reliability Test AAAAAA
3 PEAP Authentication , Client side Configuration and Verification AAAAAA
DETAILS
ATTENTION!! Please follow below information.
1. Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead, then arrange to open defect, if needed.

2. Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case).

3. All Test Activity should be performed with AMT Enabled as Default (applicable on vPro enabled systems).

4. Please check Usability / Cosmetic issues (correct sentence/appropriate display/etc.) and open defect, if needed.

EAP-TTLS Verification

Perform the below test scenarios in both Admin and User modes

Check the below logon options during testing and confirm that profile connects successfully with upn <user principle name> logon options

1. <Domain name>\<logon name>
Ex: TTLSCHILD\user1

2. <logon name>@<Domain name>.com
Ex: user1@TTLSCHILD.eap-ttls.com
Test Item
Check Item / Criteria
Configuration
Result
Intel
Atheros
Wireless Client Configuration.
(Downloading Certificate)
  1. Connect the System to Wndows 2003 Child Domain Network by ethernet
  2. Join the client system to the child domain (TTLSCHILD)
  3. Add the Child Domain User to the Local Administrator group.
  4. Log in as the Child Domain user.
  5. Download Root Certificate using Internet Explorer or Microsoft Management Console from Certification Server in Windows 2003/ Windows 2000 Domain. (For ex: 192.168.51.1 /certsrv)
  6. Install the Root Certificate
    - Root CA Server Certificate needs to be stored by the following procedure:
    1. Start Certificate Import Wizard by clicking the Install Certificate button.
    2. Click "Next" and check at "Place all certificates in the following store"
    3. Click "Browse"and check at "Show physical stores"
    4. Explode at "Trusted Root Certification Authorities"
    5. Click "Local Computer" and then "Ok"
8. After Certificate is successfully installed , from Internet
Explorer, Click Tools>Internet options>content>
certification and verify the downloaded certificate is listed.
  • The User Certificate shall be successfully downloaded
  • No Error Message while downloading the Certificate
Stand alone
A
A
EAP-TTLS (Use Saved Username and Password)
  1. Launch Access Connection application and create a EAP-TTLS profile
  2. Create a EAP-TTLS profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : TTLS
  5. In the Authentication protocol -->Choose MS-CHAP-V2
  6. Enter User Credentials (Used Saved Username and Password)
  7. Select Validate Server Certificate and Select the Certificate Issuer Name
  8. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (Forexample:funk-eap-ttls.com)
  9. Click Next , Save and Apply the profile
  10. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  11. Check Network Connectivity by issuing Ping Command to Server
  12. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Make sure that the maximum characters that is allowed for both username and password fields is 50
Stand alone
A
A
EAP-TTLS(Use Windows log on username and password)
  1. Launch Access Connection application and create a EAP-TTLS profile
  2. Create a EAP-TTLS profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : TTLS
  5. In the Authentication protocol -->Choose MS-CHAP-V2
  6. Enter User Credentials (Use Windows logon username and password)
  7. Select Validate Server Certificate and Select the Certificate Issuer Name
  8. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (Forexample:funk.eap-ttls.com)
  9. Click Next , Save and Apply the profile
  10. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  11. Check Network Connectivity by issuing Ping Command to Server
  12. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Make sure that the maximum characters that is allowed for both username and password fields is 50
Stand alone
A
A
EAP-TTLS (Prompt Temporary name and Password)
  1. Launch Access Connection application and create a EAP-TTLS profile
  2. Create a EAP-TTLS profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : TTLS
  5. In the Authentication protocol -->Choose MS-CHAP-V2
  6. Enter User Credentials (Prompt temporary name and password)
  7. Select Validate Server Certificate and Select the Certificate Issuer Name
  8. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (Forexample: funk.eap-ttls.com)
  9. Click Next , Save and Apply the profile
  10. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  11. Check Network Connectivity by issuing Ping Command to Server
  12. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Make sure that the maximum characters that is allowed for both username and password fields is 50
Stand alone
A
A
EAP-TTLS with Validate Server Certificate Unchecked
  1. Launch Access Connection application and create a EAP-TTLS profile
  2. Create a EAP-TTLS profile with the following settings
  3. Select "Use IEEE 802.1x Authentication" --> Properties
  4. Access Point Authentication : Open Data Encryption : WEP EAP Type : TTLS
  5. In the Authentication protocol -->Choose MS-CHAP-V2
  6. Enter User Credentials (Use Saved Username and Password)
  7. Uncheck the option "Validate Server Certificate"
  8. Click Next , Save and Apply the profile
  9. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  10. Check Network Connectivity by issuing Ping Command to Server
  11. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 9 - 11
  12. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 9 - 11
  15. Perform the same operation for EAPTTLS with "Prompt username and password"
  16. Perform the same operation for EAPTTLS with "Use windows logon username and password"
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Make sure that the maximum characters that is allowed for both username and password fields is 50
Stand alone
A
A

Network Reliability Test

Test Item
Check Item / Criteria
Configuration
Result
Intel
Atheros
Warm Boot Tests
  1. After Successfull authentication and Network Connection is established, Restart the System
  2. Login as Child Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. If any error Message is found during Reboot operation, Please report this problem
  • Authentication shall be successfull after each Restart
  • Network Connectivity shall be established after each Restart
  • Network connection be restored to Previously used Profile unless AP is powered off
  • No Error Message after Restart

Standalone


A

A

Cold Boot Tests
  1. After Successfull authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Child Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria
  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • No Error Message occurs

Standalone



A

A

Power Management Tests
  1. After Successfull authentication and Network Connection is established,Close the Lid (Fn+F4) to suspend the system
  2. Open the Lid after 3 Minutes
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for ten times and verify the criteria
  5. Press Fn+F12 and hibernate the system
  6. Resume after 3 Minutes
  7. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  8. Repeat Steps 5-7 for ten times and verify the criteria
  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs

Standalone


A

A

Power Management Test with Logoff/Login
  1. Create a EAPTTLS profile with "Prompt for Temporary username/password" and apply
  2. Press Fn+F4 to suspend the system
  3. After 1 minute , resume the system . Make sure Network Connectivity is restored
  4. Logoff/Login the system and make sure Network Connectivity is restored
  5. Now again Press Fn+F4 to suspend the system
  6. After 1 minute , resume the system . Make sure Network Connectivity is restored
  7. Perform the same operation for EAPTTLS with "Saved Username and Password"
  8. Perform the same operation for EAPTTLS with SSO option
  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs








Standalone

A

A


PEAP Authentication , Client side Configuration and Verification

Perform the below test scenarios in both Admin and User modes

Check the below logon options during testing and confirm that profile connects successfully with upn <user principle name> logon options

1. <Domain name>\<logon name>
Ex: TTLSCHILD\user1

2. <logon name>@<Domain name>.com
Ex: user1@TTLSCHILD.eap-ttls.com

Test Item
Check Item / Criteria
Configuration
Result
Win XP
Win 2K
Win V32
Win V64
Wireless Client Configuration (Downloading Certificate)
  1. Connect the System to Wndows 2003 Child Domain Network by ethernet
  2. Join the client system to the child domain (PEAPCHILD)
  3. Add the Child Domain User to the Local Administrator group.
  4. Log in as the Child Domain user.
  5. Download & Install Root Certificate using Internet Explorer or Microsoft Management Console from CA Server in Windows 2003/ Windows 2000 Domain. (For ex: http://192.168.28.2 /certsrv)
  6. Root CA Server Certificate needs to be stored by the following procedure:
  7. - Start Certificate Import Wizard by clicking the Install Certificate button.
  8. - Click "Next" and check at "Place all certificates in the following store".
  9. - Click "Browse"and check at "Show physical stores".
  10. - Explode at "Trusted Root Certification Authorities".
  11. - Click "Local Computer" and then "Ok".
  12. After Certificate is successfully installed , from Internet Explorer, Click
  13. Tools => Internet options =>content => certificates
and verify the downloaded certificate is listed.
  • The Root Certificate shall be successfully downloaded
  • No Error Message while downloading the Certificate.
  • Verify that the downloaded certificate is listed in Internet Explorer Tools => Internet options =>content => certificates.


Standalone


A


A
A
A
PEAPCHAP Verification (Use saved user name and password)

1. Launch Access Connection application.
2. Create a PEAPCHAP profile with the following settings:
3. Select "Use IEEE 802.1x Authentication" --> Properties
4. Access Point Authentication : Open
Data Encryption: WEP
EAP Type: PEAP
Authentication protocol: MS-CHAP-V2
5. Click the option `Enter User Credentials`.
6. Enter the Child domain name /logon name
7. Choose the option `Use Saved user Name and password`, Enter the credentials and Click `Ok`.
8. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOAP).
9. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : eapsrv.eap.com) and give OK
10. Save and Apply the profile.
11. Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
12. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 10-11
13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 10-11
14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 10-11
15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 10-11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
  • Check the root server Event Log and Authentication is successfull.
Standalone
A
A
A
A
PEAPCHAP Verification (Prompt temporary name and password)

1. Launch Access Connection application.
2. Create a PEAPCHAP profile with the following settings:
3. Select "Use IEEE 802.1x Authentication" --> Properties
4. Access Point Authentication : Open
Data Encryption: WEP
EAP Type: PEAP
Authentication protocol: MS-CHAP-V2
5. Click the option `Enter User Credentials`.
6. Enter the Roaming Identity/logon name
7. Choose the option `Prompt temporary name and password`and Click `Ok`.
8. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOAP).
9. Choose the option Server Name Must match Exactly or Child Domain Name must end in specified name and type the Server Name (For example : eapsrv.eap.com) and give OK
10. Save and Apply the profile. Enter the correct credentials at the popup window.
11. Check the Event Log of ACS Server/Access Point and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
12. Check the Event Log of root server ===> system log
Authentication should be successfull. verify the Child domain name.
13. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 10-11
14. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 10-11
15. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 10-11
16. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 10-11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
  • Check the Root server Event Log and Authentication is successfull.
Standalone
A
A
A
A
PEAPCHAP Verification (Use Windows logon user name and password)

1. Launch Access Connection application.
2. Enable SSO Global Settings "Allow wireless connection at WIndows logon (requires system restart)" and restart the system.
3. Create a PEAPCHAP profile with the following settings:
4. Select "Use IEEE 802.1x Authentication" --> Properties
5. Access Point Authentication : Open
Data Encryption: WEP
EAP Type: PEAP
Authentication protocol: MS-CHAP-V2
6. Click the option `Enter User Credentials`.
7. Enter the Roaming Identity/logon name
8. Choose the option `Use Windows logon user name and password`, and click `Ok`.
9. Select Validate Server Certificate and Select the Certificate Issuer Name (For Example :CISCOAP).
10. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name (For example : PEAPCHAP) and give OK
11. Save and Apply the profile.
12. Check the Event Log of ACS Server and Authentication is successfull. Verify the EAP Type is shown as PEAP and Correct MAC Address of the Wireless Client system is shown in the Eventlog
13. Check the Event Log of root server ===> system log
Authentication should be successfull. verify the Child domain name
14. Change the Data Encryption to "CKIP" in Step.4 and confirm steps 11-12
15. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.4 and confirm steps 11-12
16. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
17. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.4 and confirm steps 11-12
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
  • check the root server Event Log and Authentication is successfull.
Standalone
A
A
A
A
PEAPCHAP Verification (In Relaxed Mode - w/o selecting Validate Server Certificate)

Perform the above verifications
- Use saved user name and password
- Prompt temporary name and password
- Use Windows logon user name and password
by uncheck the option "Validate Server Certificate" in step 9
and verify the the profile is working properly without any error.
  • The authentication shall be successful with the options Validate Server Certificate unchecked and without the Server /Domain details
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available
  • Check the Access Point Event Log and Authentication is successfull.
  • Check the Root server Event Log and Authentication is successfull.
Standalone
A
A


A


A

Network Reliability Test

Test Item Check Item / Criteria Configuration
Result
Win XP
Win 7
Win Vista
Warm Boot Tests
  1. After Successfull authentication and Network Connection is established, Restart the System
  2. Login as Child Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. Network Connectivity shall be established after each Restart
  5. Network connection be restored to Previously used Profile unless AP is powered off
  6. Network Connection shall not be available until the Windows Login is completed.

  • Authentication shall be successfull after each Restart
  • No Error Message after Restart


Access Connection Profile


A


A


A
Connect /Disconnect Tests
  1. Launch Access Connection. Connect the Wireless Profile > PEAPCHAP. Verify Authentication is successfull and Network Connection is established.
  2. Disconnect the Profile. Connect the same profile again.Verify Authentication is successfull and Network Connection is established.
  3. Repeat this operation in Step 1-2 for five times.

  • Authentication shall be successfull after every Disconnect / Connect operation
  • Network Connectivity shall be established after every Disconnect / Connect operation
  • No Error Message occurs


Access Connection Profile


A


A


A
Cold Boot Tests
  1. After Successfull authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Child Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria

  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs


Access Connection Profile


A


A


A
Power Management Tests - UR-2726
Suspend
  1. After Successful authentication and Network Connection is established, Press Fn+F4 to suspend the system.
  2. Resume the system by presing the Fn key after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

Hibernate
  1. After Successful authentication and Network Connection is established, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Fn key after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

Lid-close
  1. After Successfull authentication and Network Connection is established close the lid to suspend the system
  2. Resume the system by opening the lid after 1 minute.
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for 10 times and verify the criteria

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs


Access Connection Profile
Power Management Test with Logoff/Login
PEAPGTC with "Prompt for Temporary username/password" option:

Suspend
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with "Prompt for Temporary username/password" and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

PEAPGTC with "Saved Username and Password" option:

Suspend
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with "Saved Username and Password" and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

PEAPGTC with SSO option :

Suspend
  1. Create a PEAPGTC profile with SSO option and apply, Press Fn+F4 to suspend the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F4 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Hibernate
  1. Create a PEAPGTC profile with SSO option and apply, Press Fn+F12 to hibernate the system.
  2. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again Press Fn+F12 to suspend the system.
  5. Resume the system by pressing the Fn key after 1 minute. Make sure Network Connectivity is restored.

Lid-close
  1. Create a PEAPGTC profile with SSO option and apply close the lid to suspend the system.
  2. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.
  3. Logoff/Login the system and make sure Network Connectivity is restored
  4. Now again close the lid to suspend the system.
  5. Resume the system by opening the lid after 1 minute. Make sure Network Connectivity is restored.

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs


Access Connection Profile


A


A


A

OTHER DETAILS
EUT Quantity : Two systems 1. "Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead."
2. "Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case)"
(All Test Activity should be performed with AMT Enabled) Note :
1. Perform the test in User mode as well as Administrator mode
2. Please check the version of Access Connection to be used for each product. Access Connection may require specific version of device driver to be installed for the adapters to be tested.
3. Refer latest Access Connection Function specification for the feature support.

Perform Access Connection on Japanese OS for SIT for the final verification. Initial stages of testing can be performed on US version. While doing JP coverage, verify the japanese characters, error messages and help menu contents.

Access Connections applications may have other functions/GUI not mentioned in this test case. Please verify all the available functions and GUI that comes with the particular version of Access Connections. Any updation required to the test case, Please inform Lenovo Engineers.



Known Limitations/Restrictions/Information
Known Limitations
Restriction
1. Even "Allow all users of this system to create and apply loation profiles" Global settings option check box is checked, limited user account can not modify or create the setting for TCP/IP settings or security settings of local driver share, firewall settings due to Widnows security protection. Such setting is used with Windows default settings. Default is not checked.
2. Global settings can be only modified by the user when the logon privilege is administrator privilege.
3. The global settings option "Disable Adhoc connection type option in wireless LAN profiles" is not applicable, if the user create the profile using WIndows wireless LAN property window.
4. Profile disconnects when user change wireless security type of 802.1x peap to LEAP or vice versa
(Reference: ECR112851, W7:Profile disconnect when change wireless security type of 802.1x)

Currently Vista version of AC supports WEP/EAP-TLS/WPA/PEAP-MSCHAP authentications ONLY. Other authentications like CKIP, PEAP-GTC, LEAP, EAP-FAST are NOT supported.
Information
1. When "Allow all users of this system to create and apply loation profiles" check box is checked, it allows user to create the location profiles and enables location switching regardless of the windows logon privilege (administrator or limited users).
2. Wireless profiles will be listed in the upper part of the profile list and the Ethernet profiles will be displayed at the lower part of the location profile list on "Automatic switching profile priority window". Due to the faster speed, the Ethernet profiles have higher priority than the wireless profiles.
3. Static IP address wireless profile will be listed in automtic location switching, as per the new design. However, static IP address ethernet profile will not be listed in automatic location switching.

Test Item
Windows XP
Windows 2000
Windows V32
Windows V64
EAP-TTLS - Multidomain
NA NA
MSCHAP Multi domain

TEMS Reviewer Log:04/04/2006 10:35:12 PM by Kazuo 1 Matsumoto/Japan/Lenovo/IDE (Review Comment: OK
Review Logs
Keywords:   None
Requirements :   None
Attached files :

Update History:
This document is not yet modified.