TEST_TYPE: manual

INPUT: <p></p>
<ol><li value="1">Wireless Network (Open  and  Secured) is configured. <br />
</li><li value="2">SA has proper credential to access the wireless network. <br />
</li><li value="3">MFD has support for wireless adapter. <br />
</li><li value="4">Wireless adapter is installed and functional. <br />
</li><li value="5">Security certificates is installed in the device. <br />
</li><li value="6">Protect the wireless network with secure password.</li></ol>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE: yet_to_be_analyzed

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP_98: High Level check\
Remarks: \
Owner: Karthika

TESTCASE_MODIFICATION_REQUIRED: no

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120866

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>Default Encryption algorithm should be Auto.</p>

RESOURCE_HW:

MDATE: 1683120866, 1683122696

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_office_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.080.03] (FT-13227) {DY 3.5} If the Security Mode is WPA/WPA2 Personal or WPA2 Personal,
[55.050.080.03.01] (FT-13227) {DY 3.5} the default Encryption Algorithm shall be Auto.

SPEC_NUM:

PROCEDURE: <p></p>
<ol><li value="1">This Scenario should be checked for all four methods. <br />
</li><li value="2">Initiate the WCW in all the methods. <br />
</li><li value="3">Navigate till to "Continue wireless Install "option. <br />
</li><li value="4">Select the manual configuration. <br />
</li><li value="5">Now LUI will display the manual setup screen with available network along with its security mode selection field. <br />
</li><li value="6">Tap the security mode field and check the following authentication method are available for selection: <br />
*None <br />
*WEP64 <br />
*WEP128 <br />
*WPA/WPA2 Personal <br />
*Mixed Mode(AES/TKIP) <br />
*WPA/WPA2 Enterprise <br />
* Mixed Mode Enterprise(AES/TKIP) <br />
</li><li value="7">Select WPA/ WPA2 Personal/ WPA2 personal security mode. <br />
</li><li value="8">Verify the encryption algorithm for WPA/ WPA2 Personal/ WPA2 personal security mode.</li></ol>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT:

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18481"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129394".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: Validate the Encryption Algorithm WPA/ WPA2 Personal/ WPA2 personal for Manual setup.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION: 0

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS: 0

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 3316511A-7825-1014-A9EE-9A86E573D3B7, 3318BE7E-7825-1014-B2A8-DEEC1F0687CF, 331B5765-7825-1014-83DA-B0D5BD9DE9A6, 31DD0FFB-7825-1014-A510-EC646DC0E8E7, 31DFAD98-7825-1014-B5F0-96CB2146D56D

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 39128B34-E9B7-11ED-9FDF-5B4B469741A0

APTEST_UPDATE_STATUS: no

ATM_REQCOUNT: 5

COMPETENCY:

