TEST_TYPE: manual

INPUT: <p>1.MIB Tool is installed in test PC or a Linux box installed with MIB Directories. <br />
2.Make sure that the Wireless Dongle hardware is inserted in USB Port (either front or rear) of the device. <br />
3.Connect the device in wireless connection and make sure that the Wireless is configured with Security Mode as "WPA/WPA2 Personal" or "WPA/WPA2 Enterprise".</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE: yet_to_be_analyzed

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP_98: High Level check\
Remarks: \
Owner: Karthika

TESTCASE_MODIFICATION_REQUIRED: no

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120868

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>1.The Protected Management Frames (PMF)<br />
&nbsp;should be able to set via SNMP and should take immediate reconfigure without requiring a reboot and the changes made via SNMP should be reflected in CWIS. <br />
2.PMF value should reflect as "Required" in wireless configuration page of the device.</p>

RESOURCE_HW:

MDATE: 1683120868, 1683122698

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_office_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.049] (FT-14212) [D2.6 - *]  CQ634974  The following MIB objects were added
 to support the remote configuration of the wireless feature via SNMP and are defined within the 'xcmCommsOptionTable' portion of FS 55.100 Common Device Profile (MIBs):
• [55.050.049.17] (FT-27034) [D5.3 -*] “Protected Management Frames (PMF)”

SPEC_NUM:

PROCEDURE: <p>1) Through MIB; SET the value for "Protected Management Frames (PMF) by running the following Command: <br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.10.2.1.2.7.80520000 i 4<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.10.2.1.3.7.80520000 o 1.3.6.1.4.1.253.8.63.31.1800<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.10.2.1.4.7.80520000 i 5<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.10.2.1.5.7.80520000 i 1<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.9.2.1.2.7.1 i 4<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.9.2.1.3.7.1 i 80520000<br />
snmpset -v2c -cprivate [ip address]1.3.6.1.4.1.253.8.51.9.2.1.4.7.1 i 6 <br />
2.Open device WEB UI and check the PMF value in wireless configuration page.</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT:

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18836"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129749".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: To Validate the Protected Management Frames (PMF) "Required" value setting made via SNMP Commands  is reflecting in CWIS or not.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION: 1.0045999999999999

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION: 0

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS: 0

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 33328B1F-7825-1014-B7D4-BB3C999D6023, 52280F68-2255-11EA-9D3C-28C590F3785B

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 3A2D720E-E9B7-11ED-9FDF-5B4B469741A0

APTEST_UPDATE_STATUS: no

ATM_REQCOUNT: 2

COMPETENCY:

