Test Case

Show / Hide direct link   <MAIN> 3611PA: NW test items verification in Yamato NW environment - PP-80477



Version 1.2
Created on 19/01/2007 12:00:44  by Muralidharan Seshadri
Summary
Preconditions
Status:   New
Priority:   Medium
BASIC INFORMATION
Section:S/W Test Require attachment:No
Team:Network Group:Test Coverage
Lessons Learned:Yes Phase:SIT
Locations:Inhouse: AWS and Cambridge, Inhouse: AWS, Inhouse: Cambridge, Compal, Flextronics, Quanta, Wistron Owned By:Eiji Ogata/LENOVO
Objective:To verify the network related test items that must be performed in Yamato due to the infrastructure requirement
CRITERIA
All the authentication must be validated in Yamato actual network environment.
No system malfunction, network disconnection
EUT QUANTITY
Two systems
EQUIPMENT
PA & Yamato Network facilities
Critical Attribute:[0] : WLS - Wireless

CONFIGURATION
REFERENCE PROCEDURE

STATISTIC INFO
Operating System Win10-32bit Win10-64bit Win7- 64bit Win7- 32bit Total
Test Points
Duration
Workload
# Step actions Win10-32bitWin10-64bitWin7- 64bitWin7- 32bit
1 EAP-TLS Authentication Client side Configuration and Verification AAAA
2 Network Reliability Test AAAA
3 Excessive Roaming Verification Test AAAA
4 IPv6 function verification test AAAA
DETAILS
ATTENTION!! Please follow below information.
1. Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead, then arrange to open defect, if needed.

2. Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case).

3. All Test Activity should be performed with AMT Enabled as Default (applicable on vPro enabled systems).

4. Please check Usability / Cosmetic issues (correct sentence/appropriate display/etc.) and open defect, if needed.

Note :

1. This must be tested with all the supported wireless adapters for each product.
2. This must be tested with all the supported operating system


EAP-TLS verification must be done with the LENOVO CAMPUS NETWORK. Obatain the necessary credentials and perform the test.

Before connecting to Lenovo Network, update the system with all the necessary security patches, antivirus software etc.. System must follow the Lenovo IT network rules.

EAP-TLS Authentication Client side Configuration and Verification

Perform the below test scenarios in both Admin and User modes
Test Item Check Item / Criteria
Configuration
Result
Win XP
Vista 32
Vista 64
Wireless Client Configuration
  1. Configure the client system with the necessary security patches, antivirus software. Confirm that the system confirms to the Lenovo IT network connecitivity requirements.
  2. Download and install necessary credentials from the Lenovo network and install the same.

  • The User Certificate shall be successfully downloaded
  • No Error Message while downloading the Certificate


Standalone


A


A


A
EAPTLSWEP
  1. Launch Access Connection application
  2. Assign Name as EAP-TLS , Choose the Network connection type as 'Wireless LAN (802.11)"
  3. Select the Wireless Adapter and click Next
  4. Type the SSID Name (For Ex.: lenovo). Set the following settings :-Connection Type :- Infrastructure and Wireless Mode : Auto (If applicable), In the WL Security Type, Choose the option `Use IEEE 802.1x Authentication` and Click Properties
  5. In `Enter your IEEE 802.1x Settings, Choose the following options:- Access Point Authentication : Open Data Encryption : WEP EAP Type : TLS
  6. Select Validate Server Certificate and Select the Certificate Issuer Name
  7. Choose the option Server Name Must match Exactly or Domain Name must end in specified name and type the Server Name
  8. Check whether the option "Use Client certificate" is checked. and enter the Logon Name
  9. Click OK, Save and Apply the profile
  10. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  11. Check Network Connectivity by issuing Ping Command to Server
  12. Change the Data Encryption to "CKIP" in Step.5 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.5 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.5 and confirm steps 9 - 11
  15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.5 and confirm steps 9 - 11
  • Mutual Authentication of Server-Client and Client - Server shall happen
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available


Standalone


A


A


A
EAPTLS - With the option Validate Server Certificate unchecked and the Server details not entered
  1. Launch Access Connection application
  2. Assign Name as EAP-TLS , Choose the Network connection type as 'Wireless LAN (802.11)"
  3. Select the Wireless Adapter and click Next
  4. Type the SSID Name (For Ex.: EAP-AP). Set the following settings :-Connection Type :- Infrastructure and Wireless Mode : Auto (If applicable), In the WL Security Type, Choose the option `Use IEEE 802.1x Authentication` and Click Properties
  5. In `Enter your IEEE 802.1x Settings, Choose the following options:- Access Point Authentication : Open Data Encryption : WEP EAP Type : TLS
  6. Uncheck the box `Validate Server Certificate` option and Leave to the Default option of `Use Any Certificate Authority`
  7. Do Not enter any Server name or Domain Name
  8. Check the option Use Client certificateand enter the Logon Name
  9. Click OK, Save and Apply the profile
  10. Verify IP Address is assigned by the DHCP Server after Authentication is successfull
  11. Check Network Connectivity by issuing Ping Command to Server
  12. Change the Data Encryption to "CKIP" in Step.5 and confirm steps 9 - 11
  13. Change the AP Authenticaion to "WPA" and Data Encryption to "TKIP" in Step.5 and confirm steps 9 - 11
  14. Change the AP Authenticaion to "WPA" and Data Encryption to "AES" in Step.5 and confirm steps 9 - 11
  15. Change the AP Authenticaion to "WPA2" and Data Encryption to "AES" in Step.5 and confirm steps 9 - 11
  • EAP-TLS authentication shall be successful with the options Validate Server Certificate unchecked and without the Server /Domain details
  • No Error Message related to authentication failure shall occur.
  • IP Address shall be assigned by DHCP Server
  • Network Connectivity shall be available


Standalone


A


A


A
User switching with EAP-TLS (different user certificate)
  1. Log in admin mode.
  2. Install user certificate for admin mode.
  3. Create and apply a EAP-TLS profile.
  4. Make sure to allow all users to switch profiles option.
  5. Log off admin mode, log in to different user.
  6. Download and install user certificate for user mode.
  7. Connect the EAP-TLS profile.
  8. A pop-up message should appear prompting you to enter user credentials.
  9. Configure the profile for correct credentials, then apply.
  • Access Connections should prompt for user credentials after applying the EAP-TLS profile when switching from one user to another.
  • Connection should be established correct user credentials is selected.
  • Pop-up message will appear everytime switch user and apply profile


Standalone


A


A


A
User switching with EAP-TLS (same user certificate)
  1. Log in admin mode.
  2. Install user certificate for admin mode.
  3. Create and apply a EAP-TLS profile.
  4. Make sure to allow all users to switch profiles option.
  5. Log off admin mode, log in to different user.
  6. Install the same user certificate as in STEP 2 for user mode.
  7. Connect the EAP-TLS profile.
  8. Pop-up message should NOT appear.
  9. Configure the profile for correct credentials, then apply.
  • Access Connections should not prompt for user credentials after applying the WPA-TLS profile when switching from one user to another.
  • Connection should be established even without entering correct user credentials.
  • Pop-up message will not appear everytime switch user and apply profile


Standalone


A


A


A
Multiadapter EAP-TLS profile
1.. Configure multiadapter profile with EAP-TLS wireless setting
2. Download the user certificate for EAP-TLS profile
3. Cilck on connect for getting connected to this profile
4. Make sure "close all network connections when user logs off" is not checked in Global settings
5. Log in to the system with another user account which does not have user certificates


  • Connection should not be established
  • When manually connect the profile it will give a error message that user credentials required to connect to the network..


Standalone


A


A


A

Network Reliability Test
Test Item
Check Item / Criteria
Configuration
Result
Win XP
Vista 32
Vista 64
Warm Boot Tests
  1. After Successfull authentication and Network Connection is established, Restart the System
  2. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. Network Connectivity shall be established after each Restart
  5. Network connection be restored to Previously used Profile unless AP is powered off

  • Authentication shall be successfull after each Restart
  • No Error Message after Restart


Standalone


A


A


A
Connect /Disconnect Tests
  1. Launch Access Connection. Connect the Wireless Profile > EAP-TLS. Verify Authentication is successfull and Network Connection is established.
  2. Disconnect the Profile. Connect the same profile again.
  3. Verify Authentication is successfull and Network Connection is established.
  4. Repeat this operation in Step 1-2 for five times.


  • Authentication and NW connectivity shall be successfull after every Disconnect / Connect operation
  • No Error Message occurs


Standalone


A


A


A
Cold Boot Tests
  1. After Successfull authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria

  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • No Error Message occurs


Standalone


A


A


A
Power Management Tests
  1. After Successfull authentication and Network Connection is established,Close the Lid (Fn+F4) to suspend the system
  2. Open the Lid after 3 Minutes
  3. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for ten times and verify the criteria
  5. Press Fn+F12 and hibernate the system
  6. Resume after 3 Minutes
  7. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  8. Repeat Steps 5-7 for ten times and verify the criteria

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs


Standalone


A


A


A
Power Management Test with Logoff/Login
  1. Create a EAPTLS profileand apply
  2. Press Fn+F4 to suspend the system
  3. After 1 minute , resume the system . Make sure Network Connectivity is restored
  4. Logoff/Login the system and make sure Network Connectivity is restored
  5. Now again Press Fn+F4 to suspend the system
  6. After 1 minute , resume the system . Make sure Network Connectivity is restored

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs


Standalone


A


A


A

LL-1194 Ping failure/Excessive Roaming with same SSID (IBM Campus Network).

Note :

Facility required : PE TANABATTA Network @ B5

Contact Takeda-san/Araki-san and fix the time slot to use the TANABATTA Network. [16 Cisco APs configured]

Need to test this during SIT or major driver change time. Facility availability need to be confirmed for a few days before you visit PE Lab.

Excessive Roaming Verification Test

Test Item
Check Item / Criteria
Configuration
Result
Win XP
Vista 32
Vista 64
  1. Cofigure the client to connect to TANABATTA Network available with PE with EAP TLS using Access Connections.
  2. EAP-TLS authentication details will be provided by PE Team at the time of testing.
  3. Confirm the successful authentication/connection.
  4. Run continuous ping to the server.
  5. Test must be run for 8 hours or more.
  6. Count the total number of ping run, total number of failure, total number of success
  7. Ping failure rate = Failed number of ping / Total number of ping
  8. If the failure rate is 0.5% or more, then it is a problem which needs to be reported to driver development.
  • Succssful Authentication / Connection
  • Failure rate of less than 0.5% for the ping test
  • Successful test run for 8 hours or more.


Standalone


A


A


A
Following ATS script can be used for the above test

Attachment "AC_PRO_SWITCH_SEQ_RAND_TEST(3002PA)NW01.VBS"can be seen at the bottom of the page.


Test result screen shot will be like this


Attachment "ExcessiveRoaming-Test result.jpg"can be seen at the bottom of the page.


From the above test result log file, ping failure rate can be calculated.

IPv6 function verification test

Note
Make sure the IPv6 setup is configured and ready for test(refer attached StepsettingupIPv6.doc for any clarification)
Refer Page 9 and Page 13 in attached document to configure XP client system. For Vista client, please refer same pages but ignore first 3 points since IPv6 is already isntalled in Vista by default

Test Item
Check Item / Criteria
Configuration
Result
Win XP
Vista 32
Vista 64
  1. Configure two client system as mentioned in below document(Page9 and Page 13) to connect to IPv6 setup available in Yamato PA
  2. Ping from client 1 to client2 using IPv4 address(ex Format: 10.10.1.1)
  3. Ping client-1 to DNS server using local link address(Ex format:FE80::203:FFFF:FEE1:2A73 )
  4. Ping client -1 to CLient-2 using IPv6 Global address(Ex format:2001:DB8:0:1:203:FFFF:FEE1:2A73)
  5. Run continuous ping from client-1 to client-2 using IPv6 Global addresss
  6. Confirm the successful reply/connection.
  7. Perform step 5 and confirm the successfull ping after PM
  8. Disable IPv4 alone in client systems and confirm file transfer between clients are successfull.

Setup Guide



Attachment "StepSettingUpIPV6.doc"can be seen at the bottom of the page.
  • Succssful ping
  • Successfull file transfer between client-1 and client-2


Standalone


A


A


A
Power Management Tests
  1. After Successfull authentication and Network Connection is established,Close the Lid (Fn+F4) to suspend the system
  2. Open the Lid after 3 Minutes
  3. Ensure network Connectivity is restored and try ping command to check if server/client systems can be reached.
  4. Repeat Steps 1-3 for ten times and verify the criteria
  5. Press Fn+F12 and hibernate the system
  6. Resume after 3 Minutes
  7. Ensure network Connectivity is restored and try ping command to check if server/client systems can be reached.
  8. Repeat Steps 5-7 for ten times and verify the criteria

  • Reconnect to server/client shall be successfull after each PM
  • No Error Message occurs


Standalone


A


A


A

OTHER DETAILS
EUT Quantity : Two systems 1. "Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead."
2. "Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case)"
(All Test Activity should be performed with AMT Enabled)
Details
Atheros
Intel
Certificate Download and Client Configuration
EAPTLS-WEP/CKIP/WPATKIP/WPAAES/WPA2AES
Warm Boot Tests
Cold Boot Tests
Power Management Tests

TEMS Reviewer Log:01/29/2007 01:36:45 PM by Kazuo 1 Matsumoto/Japan/Lenovo/IDE (Review Comment: OK
Review Logs
Keywords:   None
Requirements :   None
Attached files :
StepSettingUpIPV6.doc - StepSettingUpIPV6.doc (399360 bytes, ) 07/03/2015
ExcessiveRoaming-Test result.jpg - ExcessiveRoaming-Test result.jpg (131469 bytes, ) 07/03/2015
AC_PRO_SWITCH_SEQ_RAND_TEST(3002PA)NW01.VBS - AC_PRO_SWITCH_SEQ_RAND_TEST(3002PA)NW01.VBS (69608 bytes, ) 07/03/2015

Update History:
This document is not yet modified.