ATM_ID: 0822AC1E-AF8A-11E8-B051-501DF1BA2977 ID: Pongo-Warhol/Basic_Connectivity/36212 TESTCASE_HEADLINE: The state for each of the TCP Listening Ports defined in this specification shall be closed and have to check whether any unwanted TCP/IP ports are shown in port scanning tool through Nmap Port scanner tool. GROUP: FEATURE: SUB_FEATURE: INPUT: This test case needs to be run in a wireless environment Enable and Disable TCP/IP and UDP Ports Manually on MFD's from WEB User Interface and LUI: 1.Make sure the device has no jobs currently executing before this test case is executed. 2.Nmap Scanner should be available on Linux Machine and its should be open properly from a client PC. PROCEDURE: 1.Login as super user. 2.Run this command nmap -sT 13.61.23.200 -p 1-65535 --> For TCP to start the TCP Listening Port scanning test with Nmap Port scanner tool. OUTPUT: nmap port scanner tool should not display this below TCP/IP ports as open: TCP:80 for HTTP , IPP, WSD Services, WebDAV. TCP:515 for LPD. TCP:21 for FTP. TCP:25 for SMTP. TCP:445 for SMB. 2.If any other unwanted ports or services shall be reflected in the report do a through analysis for port vulnerabilities. If required share this report to system security expert for complete analysis. PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC_VERSION: SPEC_TAG: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1535986801 MDATE: 1535986801 MUSER: w4y5hbch AUTHOR: w4y5hbch ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: TC_WEIGHTAGE: