TEST_TYPE: manual

INPUT: <p>1.Device should be upgraded to latest D7.6 firmware version.<br />
2.Device EWS should be accessible with valid IP address.<br />
3.Dongle should be connected to the device.<br />
4.Router should be configured in WPA3/WPA2 personal security mode.<br />
5.Wireshark should be installed in the device.</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE:

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022

TESTCASE_MODIFICATION_REQUIRED:

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120868

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>5.Device EWS should be accessible successfully.<br />
6.In wireless authentication packet details,<br />
authentication algorithm should be SAE and Group ID should be: 256-bit random ECP group.</p>

RESOURCE_HW:

MDATE: 1683120868, 1683122698

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.129] (FT-24349) {DY 7.6} For WPA3-Personal-Transition (WPA2/WPA3 Personal) Security Mode, the Device shall:
[55.050.129.01] (FT-24349) {DY 7.6} support connection to Access Points (APs)/routers that support either WPA2-Personal Security or WPA3-Personal Security.  \
Note: The Device shall connect using the higher-security method (WPA3-Personal) when available. 
[55.050.129.02] (FT-24349) {DY 7.6} be constrained to AES (CCMP) encryption.
[55.050.129.03] (FT-24349) {DY 7.6} constrain the Protected Management Frame (PMF) option to Optional (Indicating that the Device will use PMF based on the Access Point (AP)/ router configuration. If an AP is capable of PMF, the device will use PMF.  If an AP doesn’t support PMF, the device will not use PMF.)\
Notes: 
For WPA3, PMF is Required.
For WPA2, PMF is Optional.
[55.050.129.04] (FT-24349) {DY 7.6} require an authentication password \
Notes: 
For WPA3, the password shall leverage Simultaneous Authentication of Equals (SAE).
For SAE, Diffie-Hellman Group 19 (256-bit random ECP group (NIST)) is supported.
For WPA2, the password shall leverage Pre-Shared Key (PSK).

SPEC_NUM:

PROCEDURE: <p>1.In LUI,login as admin --click on Device app --click on "Tools" --Network settings --Network connectivity --click on wireless.<br />
2.Click on Pick new network --Manual Set up --provide SSID --choose "WPA3-personal Transition".<br />
3.Provide valid SSID and password and save the settings.<br />
4.Navigate to Device app -- Tools --Network settings --Network connectivity --change network connection from wired to wireless.<br />
5.Check the EWS accessibility.<br />
6.Check for the wireshark traces to confirm that the authentication algorithm is SAE and Diffie-Hellman Group 19 is supported.</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT: corvo, kiska, canyon, mystic, carroll, melody

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18896"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129809".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: To check the wireless connectivity in the device when WPA3-Personal-Transition wireless security mode is configured via manual configuration of wireless network in LUI.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION:

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS:

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 198234BC-0FBC-11EC-B406-1548637E987F, 19830C52-0FBC-11EC-B406-1548637E987F, 19844482-0FBC-11EC-B406-1548637E987F, 19866078-0FBC-11EC-B406-1548637E987F, 1987505A-0FBC-11EC-B406-1548637E987F

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 3A5B9198-E9B7-11ED-9FDF-5B4B469741A0

APTEST_UPDATE_STATUS:

ATM_REQCOUNT: 5

COMPETENCY:

