Test Case

Show / Hide direct link   <MAIN> 4995PA: W8/W10: FFRT : Wireless Security Function Test - PP-80468



Version 1.3
Created on 25/09/2017 12:17:16  by m_komatsu
Summary
Preconditions
Status:   Review Complete
Priority:   Medium
BASIC INFORMATION
Section:S/W Test Require attachment:No
Team:Network Group:Basic Function
Lessons Learned:No Phase:FVT, SVT, SIT
Locations:Inhouse: AWS and Cambridge, Inhouse: AWS, Inhouse: Cambridge, Compal, Flextronics, Quanta, Wistron Owned By:Eiji Ogata/LENOVO
Objective:a
CRITERIA

a

EUT QUANTITY

a

EQUIPMENT

a

Critical Attribute:[0] : WLS - Wireless

CONFIGURATION
REFERENCE PROCEDURE
STATISTIC INFO
Operating System Win81-64bit Win81-32bit Win10-32bit Win10-64bit Total
Test Points
Duration
Workload
# Step actions Win81-64bitWin81-32bitWin10-32bitWin10-64bit
1

EAPTLS

AAAA
2

PEAPCHAP

AAAA
DETAILS
ATTENTION!! Please follow below information.
1. Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead, then arrange to open defect, if needed.

2. Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case).

3. All Test Activity should be performed with AMT Enabled as Default (applicable on vPro enabled systems).

4. Please check Usability / Cosmetic issues (correct sentence/appropriate display/etc.) and open defect, if needed.

WL hotkey and PM keys are different for each products. Refer the supported keys based on the product support and perform the function accordingly.

WL Hotkey : FnF5 or /F8 /F9

PM : S3 : Fn+F4 or Fn+4

UR-3896AP

Known Limitations

1. Profile Properties is Blank when connect to AP w/ Certificate

Approved as Permanent Limitation

Reference Defect: ECR186573

2. ECR187346 COM:W8.1:No Wifi Properties when connected to cisco security - UR-4110AP

Reason:

When connect to access point which needs security such as certificate, the properties of wireless LAN profile is blank.

This issue only happens when connect access point which needs certification or Cisco security. This is a matter not showing "Properties" field only and the connection/accessing works fine. So, we can deem that user impact is low.

We reported to Microsoft this problem (MS BUG#481719 (for ECR186582/ECR186573),but they closed the issue by "won't fix" (See remark/comments) Also we reported to Microsoft this problem MS BUG#494537(for ECR187346), and MS says this is a same thing with MS BUG#481719.

Restriction
Information

1. Windows 8 does not have CCKM support.

Reference Defects:

ECR139900;ECR139709;ECR139924, W8:FFRT:Cannot connect when encryption is WEP using Intel-CCKM option

2. WPA Security type on Network properties is not available in Win8.1 OS.

Handled as Help Center Info

Reference Defects: ECR187661, ECR187662, ECR185878

3. EAP-SIM, EAP-AKA, EAP-AKA authentications are missing in control panel

This is by design unless the device has a SIM card. In Win8.1, EAP filters all three SIM based authentication methods: EAP-SIM, EAP-AKA, EAP-AKA' if the device doesn't have a sim device.

Reference Defects: ECR181398, ECR187276, ECR182785

4. Cisco security is not available in Jackson Peak 2 inbox driver

This is as designed. Inbox driver does not have cisco security support.

Reference Defects: ECR187476

Results at a glance

Details
Intel
Realtek
Broadcom
Win8
Win8
Win8
Certificate Download and Client Configuration
All WL Security Profiles Basic Connectivity
Wireless Profile Switching Combination
Warm Boot Tests for all WL Security Profiles
Cold Boot Tests for all WL Security Profiles
Power Management Tests for all WL Security Profiles

Basic Verification

LEAP Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
LEAP
LEAPWEP
CISCO ACS
Windows Username & Password
WEP
A
A
A
Saved Username & Password
WEP
A
A
A
AutoPrompt Username & Password
WEP
A
A
A
ManualPrompt Username & Password
WEP
A
A
A
LEAPAES
CISCO ACS
Windows Username & Password
AES
A
A
A
Saved Username & Password
AES
A
A
A
AutoPrompt Username & Password
AES
A
A
A
ManualPrompt Username & Password
AES
A
A
A

EAP-FAST Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
EAP-FAST
EAPFASTCKIP
CISCO ACS
Windows Username & Password
CKIP
A
A
A
Saved Username & Password
CKIP
A
A
A
AutoPrompt Username & Password
CKIP
A
A
A
ManualPrompt Username & Password
CKIP
A
A
A
EAPFASTTKIP
CISCO ACS
Windows Username & Password
TKIP
A
A
A
Saved Username & Password
TKIP
A
A
A
AutoPrompt Username & Password
TKIP
A
A
A
ManualPrompt Username & Password
TKIP
A
A
A

WPA-PSK Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
WPA - PSK
WPAPSKASCII
No
Pre-Shared Key
TKIP
A
A
A

WPA2-PSK Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
WPA2 - PSK
WPA2PSKHex
No
Pre-Shared Key
AES
A
A
A

PEAP-GTC Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
PEAP-GTC
PEAP-GTCWEP
CISCO ACS/ RSA Secure ID
Saved Username & Password
WEP
A
A
A
Temp Prompt Username & Password
WEP
A
A
A
Hardware Token
WEP
A
A
A

PEAP-CHAP Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
PEAP-CHAP
WP2APEAPCHAPAES
Win2003
Windows Username & Password
AES
A
A
A
Saved Username & Password
AES
A
A
A
Temp Prompt Username & Password
AES
A
A
A

EAP-TTLS Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
EAP-TTLS
WPAEAPTTLSTKIP
Funk Odyssey
Windows Username & Password
TKIP
A
A
A
Saved Username & Password
TKIP
A
A
A
Temp Prompt Username & Password
TKIP
A
A
A

EAP-TLS Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
EAPTLS
EAPTLSCKIP
Win2003
Certificate
CKIP
A
A
A

Network Reliability Test

Perform the below test for all the above Wireless Security Authentications

Test Item
Check Item / Criteria
Configuration
Result
Win 8 32
Win 8 64
Connect /Disconnect Tests

  1. Launch Network and Internet > Network and Sharing Center.
  2. Click "Set up a new connection or network" > create manually Wireless Profile. Connect the Wireless Profile. Verify Authentication is successful and Network Connection is established.
  3. Disconnect the Profile. Connect the same profile again.
  4. Verify Authentication is successful and Network Connection is established.
  5. Repeat this operation in Step 1-2 for five times.

  6. Launch Network charms bar by clicking Network icon in taskbar from Desktop.
  7. Choose and connect the desired Wireless Profile and enter correct credentials.
  8. Verify Authentication is successful and Network Connection is established.
  9. Disconnect the Profile. Connect the same profile again.
  10. Verify Authentication is successful and Network Connection is established.
  11. Repeat this operation in Step 1-2 for five times.

  • Authentication and NW connectivity shall be successfull after every Disconnect / Connect operation
  • No Error Message occurs

Standalone

SSO (Single Sign ON)

Install and configure WL adapter.

Connect system to a Windows Domain

Create a WPA2-AES-PEAP-MSCHAPV2 profile

Enable Single sign ON

restart the system

At logon screen enter domain username and password

Confirm the profile connects successfully

  • Successful connectivity with SSO.
Standalone
Profile Switching Verification
  1. Launch Network and Internet > Network and Sharing Center.
  2. Attachment "ATTI0P4P.jpg"can be seen at the bottom of the page.
  3. Click "Set up a new connection or network" > create manually Wireless Profile. Connect the Wireless Profile. Verify Authentication is successful and Network Connection is established.
  4. Switch to another profile in the profile list
  5. Check profile switch for all the available profiles

  6. Launch Network charms bar by clicking Network icon in taskbar from Desktop.
  7. Choose and connect the desired Wireless Profile and enter correct credentials.
  8. Verify Authentication is successful and Network Connection is established.
  9. Switch to another profile in the profile list
  10. Check profile switch for all the available profiles
  • Authentication and NW connectivity shall be successfull after every Profile Switch operation
  • No Error Message occurs

Standalone

Warm Boot Tests

  1. After Successful authentication and Network Connection is established, Restart the System
  2. Login as Domain User and Check Wireless Connection is restored to the same Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. Network Connectivity shall be established after each Restart
  5. Network connection be restored to Previously used Profile unless AP is powered off

  • Authentication shall be successful after each Restart
  • No Error Message after Restart

Standalone

Cold Boot Tests
  1. After Successful authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria

  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • No Error Message occurs

Standalone

Power Management Tests
  1. After Successful authentication and Network Connection is established,Close the Lid (Fn+F4) to suspend the system
  2. Open the Lid after 3 Minutes
  3. Ensure Authentication is successful and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for ten times and verify the criteria
  5. Press Fn+F12 and hibernate the system
  6. Resume after 3 Minutes
  7. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  8. Repeat Steps 5-7 for ten times and verify the criteria

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs

Standalone

Power Management Test with Logoff/Login
  1. Create/apply the mentioned wireless security profile
  2. Press Fn+F4 to suspend the system
  3. After 1 minute , resume the system . Make sure Network Connectivity is restored
  4. Logoff/Login the system and make sure Network Connectivity is restored
  5. Now again Press Fn+F4 to suspend the system
  6. After 1 minute , resume the system . Make sure Network Connectivity is restored

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs

Standalone

OTHER DETAILS

EUT Quantity : a 1. "Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead."

2. "Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case)" (All Test Activity should be performed with AMT Enabled) 1. To run on US and JP version

2. To support both Admin and User mode

3. To provide facility to log off as one user and login as another use (customer scenario)

Check 32 bit / 64 bit as applicable.

TEMS Reviewer Log:
Review Logs
Created last 2017-09-26 09:39:42 by Eiji Ogata. Review Comments(Review Complete): review comppleted.
Keywords:   None
Requirements :   None
Attached files :
CCKM_W8.jpg - CCKM_W8.jpg (355625 bytes, ) 07/03/2015
Update History:
This document is not yet modified.
Version Update History:
2017-09-25 12:17:16, Version 1.3, m_komatsu, Only Security - EAPTLS and PEAPCHAP

Other versions
Version 1.2


Version 1.2
Created on 04/10/2012 11:46:42  by PSI_PA_NW_Japan
Last modified on  25/09/2017 12:15:50  by m_komatsu
Summary
Preconditions
Status:   Review Complete
Priority:  
BASIC INFORMATION
Section:S/W Test Require attachment:No
Team:Network Group:Basic Function
Lessons Learned:No Phase:FVT, SVT, SIT
Locations:Inhouse: AWS and Cambridge, Inhouse: AWS, Inhouse: Cambridge, Compal, Flextronics, Quanta, Wistron Owned By:Eiji Ogata/LENOVO
Objective:a
CRITERIA

a

EUT QUANTITY

a

EQUIPMENT

a

Critical Attribute:[0] : WLS - Wireless

CONFIGURATION
REFERENCE PROCEDURE
STATISTIC INFO
Operating System Win81-64bit Win81-32bit Win10-32bit Win10-64bit Total
Test Points
Duration
Workload
# Step actions Win81-64bitWin81-32bitWin10-32bitWin10-64bit
1

EAPTLS

AAAA
2

PEAPCHAP

AAAA
DETAILS
ATTENTION!! Please follow below information.
1. Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead, then arrange to open defect, if needed.

2. Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case).

3. All Test Activity should be performed with AMT Enabled as Default (applicable on vPro enabled systems).

4. Please check Usability / Cosmetic issues (correct sentence/appropriate display/etc.) and open defect, if needed.

WL hotkey and PM keys are different for each products. Refer the supported keys based on the product support and perform the function accordingly.

WL Hotkey : FnF5 or /F8 /F9

PM : S3 : Fn+F4 or Fn+4

UR-3896AP

Known Limitations

1. Profile Properties is Blank when connect to AP w/ Certificate

Approved as Permanent Limitation

Reference Defect: ECR186573

2. ECR187346 COM:W8.1:No Wifi Properties when connected to cisco security - UR-4110AP

Reason:

When connect to access point which needs security such as certificate, the properties of wireless LAN profile is blank.

This issue only happens when connect access point which needs certification or Cisco security. This is a matter not showing "Properties" field only and the connection/accessing works fine. So, we can deem that user impact is low.

We reported to Microsoft this problem (MS BUG#481719 (for ECR186582/ECR186573),but they closed the issue by "won't fix" (See remark/comments) Also we reported to Microsoft this problem MS BUG#494537(for ECR187346), and MS says this is a same thing with MS BUG#481719.

Restriction
Information

1. Windows 8 does not have CCKM support.

Reference Defects:

ECR139900;ECR139709;ECR139924, W8:FFRT:Cannot connect when encryption is WEP using Intel-CCKM option

2. WPA Security type on Network properties is not available in Win8.1 OS.

Handled as Help Center Info

Reference Defects: ECR187661, ECR187662, ECR185878

3. EAP-SIM, EAP-AKA, EAP-AKA authentications are missing in control panel

This is by design unless the device has a SIM card. In Win8.1, EAP filters all three SIM based authentication methods: EAP-SIM, EAP-AKA, EAP-AKA' if the device doesn't have a sim device.

Reference Defects: ECR181398, ECR187276, ECR182785

4. Cisco security is not available in Jackson Peak 2 inbox driver

This is as designed. Inbox driver does not have cisco security support.

Reference Defects: ECR187476

Results at a glance

Details
Intel
Realtek
Broadcom
Win8
Win8
Win8
Certificate Download and Client Configuration
All WL Security Profiles Basic Connectivity
Wireless Profile Switching Combination
Warm Boot Tests for all WL Security Profiles
Cold Boot Tests for all WL Security Profiles
Power Management Tests for all WL Security Profiles

Basic Verification

LEAP Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
LEAP
LEAPWEP
CISCO ACS
Windows Username & Password
WEP
A
A
A
Saved Username & Password
WEP
A
A
A
AutoPrompt Username & Password
WEP
A
A
A
ManualPrompt Username & Password
WEP
A
A
A
LEAPAES
CISCO ACS
Windows Username & Password
AES
A
A
A
Saved Username & Password
AES
A
A
A
AutoPrompt Username & Password
AES
A
A
A
ManualPrompt Username & Password
AES
A
A
A

EAP-FAST Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
EAP-FAST
EAPFASTCKIP
CISCO ACS
Windows Username & Password
CKIP
A
A
A
Saved Username & Password
CKIP
A
A
A
AutoPrompt Username & Password
CKIP
A
A
A
ManualPrompt Username & Password
CKIP
A
A
A
EAPFASTTKIP
CISCO ACS
Windows Username & Password
TKIP
A
A
A
Saved Username & Password
TKIP
A
A
A
AutoPrompt Username & Password
TKIP
A
A
A
ManualPrompt Username & Password
TKIP
A
A
A

WPA-PSK Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
WPA - PSK
WPAPSKASCII
No
Pre-Shared Key
TKIP
A
A
A

WPA2-PSK Verification

Authentication
SSID
Authentication

Server

User Credential
Encryption
Intel
Realtek
Broadcom
WPA2 - PSK
WPA2PSKHex
No
Pre-Shared Key
AES
A
A
A

PEAP-GTC Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
PEAP-GTC
PEAP-GTCWEP
CISCO ACS/ RSA Secure ID
Saved Username & Password
WEP
A
A
A
Temp Prompt Username & Password
WEP
A
A
A
Hardware Token
WEP
A
A
A

PEAP-CHAP Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
PEAP-CHAP
WP2APEAPCHAPAES
Win2003
Windows Username & Password
AES
A
A
A
Saved Username & Password
AES
A
A
A
Temp Prompt Username & Password
AES
A
A
A

EAP-TTLS Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
EAP-TTLS
WPAEAPTTLSTKIP
Funk Odyssey
Windows Username & Password
TKIP
A
A
A
Saved Username & Password
TKIP
A
A
A
Temp Prompt Username & Password
TKIP
A
A
A

EAP-TLS Verification

Authentication
SSID
Authentication Server
User Credential
Encryption
Intel
Realtek
Broadcom
EAPTLS
EAPTLSCKIP
Win2003
Certificate
CKIP
A
A
A

Network Reliability Test

Perform the below test for all the above Wireless Security Authentications

Test Item
Check Item / Criteria
Configuration
Result
Win 8 32
Win 8 64
Connect /Disconnect Tests

  1. Launch Network and Internet > Network and Sharing Center.
  2. Click "Set up a new connection or network" > create manually Wireless Profile. Connect the Wireless Profile. Verify Authentication is successful and Network Connection is established.
  3. Disconnect the Profile. Connect the same profile again.
  4. Verify Authentication is successful and Network Connection is established.
  5. Repeat this operation in Step 1-2 for five times.

  6. Launch Network charms bar by clicking Network icon in taskbar from Desktop.
  7. Choose and connect the desired Wireless Profile and enter correct credentials.
  8. Verify Authentication is successful and Network Connection is established.
  9. Disconnect the Profile. Connect the same profile again.
  10. Verify Authentication is successful and Network Connection is established.
  11. Repeat this operation in Step 1-2 for five times.

  • Authentication and NW connectivity shall be successfull after every Disconnect / Connect operation
  • No Error Message occurs

Standalone

SSO (Single Sign ON)

Install and configure WL adapter.

Connect system to a Windows Domain

Create a WPA2-AES-PEAP-MSCHAPV2 profile

Enable Single sign ON

restart the system

At logon screen enter domain username and password

Confirm the profile connects successfully

  • Successful connectivity with SSO.
Standalone
Profile Switching Verification
  1. Launch Network and Internet > Network and Sharing Center.
  2. Attachment "ATTI0P4P.jpg"can be seen at the bottom of the page.
  3. Click "Set up a new connection or network" > create manually Wireless Profile. Connect the Wireless Profile. Verify Authentication is successful and Network Connection is established.
  4. Switch to another profile in the profile list
  5. Check profile switch for all the available profiles

  6. Launch Network charms bar by clicking Network icon in taskbar from Desktop.
  7. Choose and connect the desired Wireless Profile and enter correct credentials.
  8. Verify Authentication is successful and Network Connection is established.
  9. Switch to another profile in the profile list
  10. Check profile switch for all the available profiles
  • Authentication and NW connectivity shall be successfull after every Profile Switch operation
  • No Error Message occurs

Standalone

Warm Boot Tests

  1. After Successful authentication and Network Connection is established, Restart the System
  2. Login as Domain User and Check Wireless Connection is restored to the same Profile used before restarting the system
  3. Repeat the steps 1-2 for 10 Times and verify the criteria.
  4. Network Connectivity shall be established after each Restart
  5. Network connection be restored to Previously used Profile unless AP is powered off

  • Authentication shall be successful after each Restart
  • No Error Message after Restart

Standalone

Cold Boot Tests
  1. After Successful authentication and Network Connection is established, Shutdown the System
  2. Power On the system again
  3. Login as Domain User and Check Wireless Connection is restored to the same 802.1x Profile used before restarting the system
  4. Repeat the steps 1-3 for 10 Times and verify the criteria

  • Authentication shall be successfull after Cold Boot
  • Network Connectivity shall be established after each Restart
  • No Error Message occurs

Standalone

Power Management Tests
  1. After Successful authentication and Network Connection is established,Close the Lid (Fn+F4) to suspend the system
  2. Open the Lid after 3 Minutes
  3. Ensure Authentication is successful and Network Connectivity is restored to the previously connected AP /Network.
  4. Repeat Steps 1-3 for ten times and verify the criteria
  5. Press Fn+F12 and hibernate the system
  6. Resume after 3 Minutes
  7. Ensure Authentication is successfull and Network Connectivity is restored to the previously connected AP /Network.
  8. Repeat Steps 5-7 for ten times and verify the criteria

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • Network Connection shall not be available until the Windows Login is completed.
  • No Error Message occurs

Standalone

Power Management Test with Logoff/Login
  1. Create/apply the mentioned wireless security profile
  2. Press Fn+F4 to suspend the system
  3. After 1 minute , resume the system . Make sure Network Connectivity is restored
  4. Logoff/Login the system and make sure Network Connectivity is restored
  5. Now again Press Fn+F4 to suspend the system
  6. After 1 minute , resume the system . Make sure Network Connectivity is restored

  • Authentication shall be successfull after each PM
  • Network Connectivity shall be established after each PM
  • No Error Message occurs

Standalone

OTHER DETAILS

EUT Quantity : a 1. "Please check Error and Warning message in Event Viewer before you start the test case and after you complete the test case, and report it to your team lead."

2. "Perform All Test in Battery Mode (Some of the test items need to perform in AC Mode, follow each Test Case)" (All Test Activity should be performed with AMT Enabled) 1. To run on US and JP version

2. To support both Admin and User mode

3. To provide facility to log off as one user and login as another use (customer scenario)

Check 32 bit / 64 bit as applicable.

TEMS Reviewer Log:
Review Logs
Created last 2016-06-13 13:38:32 by Eiji Ogata. Review Comments(Review Complete): review completed
Keywords:   None
Requirements :   None
Version Update History:
Modified last: 2016-03-09 18:24:45.869, by Yoshihiro Amenomiya