TEST_TYPE: manual

INPUT: <p>1.Device should be upgraded to latest D7.6 firmware version.<br />
2.Device EWS should be accessible with valid IP address.<br />
3.Dongle should be connected to the device.<br />
4.Router should be configured in WPA3 Enterprise security mode.<br />
5.Radius server Root certificate should be installed in the device.<br />
6.CA-signed certificate from the radius server should be installed in the device.<br />
7.Wireshark should be installed in test PC.</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE:

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022

TESTCASE_MODIFICATION_REQUIRED:

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120869

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>10.a)There should not be any interrupt in wireless network connection in the device.<br />
b)Any of these following packets should be available in trace with the details-- Protected flag: Data is protected-1<br />
- Disassociate<br />
- Deauthenticate<br />
- Action Frames: Block ACK Request/Response (AddBA); QoS Admission Control; Radio Measurement; Spectrum Management; Fast BSS Transition<br />
- Channel Switch Announcement directed to a client (Unicast)</p>

RESOURCE_HW:

MDATE: 1683120869, 1683122698

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.132] (FT-24349) {DY 7.6} For WPA3-Enterprise-Only Security Mode, the Device shall:
[55.050.132.03] (FT-24349) {DY 7.6} constrain the Protected Management Frame (PMF) option to Required (indicating that the Device requires PMF support).

SPEC_NUM:

PROCEDURE: <p>1.Open device EWS --Login as admin --Navigate to Properties --Connectivity --Set up --Edit Xerox wireless Network Interface settings.<br />
2.Click on Scan for available networks --choose the WPA3 Enterprise security mode configured router's SSID and click on Select and Configure.<br />
3.Authentication method should be chosen as "EAP-TTLS/ PAP".<br />
4.Under server validation radius server Root certificate should be chosen.<br />
5.Under Device Certificate (TLS),choose the CA-signed certificate from the certificates list in the device.<br />
6.Provide valid username and save the setting.<br />
7.Navigate to Connectivity --Set Up page --click on "Make Active" for Xerox Wireless Network Interface.<br />
8.Reboot the device manually once device came to ready state after reboot; stop the packet capture in router.<br />
9.Download the packet capture file(Wireshark logs) from router Web page.<br />
10.Check the wireless network connection in the device and also check in downloaded Wireshark logs from the router for any of these following packets:<br />
- Disassociate<br />
- Deauthenticate<br />
- Action Frames: Block ACK Request/Response (Adwa); QoS Admission Control; Radio Measurement; Spectrum Management; Fast BSS Transition<br />
- Channel Switch Announcement directed to a client (Unicast)</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/19012"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129925".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: To check the PMF functionality in the device when WPA3-Enterprise only wireless security mode with EAP-TTLS/ PAP authentication is configured via auto scan of wireless networks in EWS.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION:

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS:

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 198A0228-0FBC-11EC-B406-1548637E987F, 19918EDA-0FBC-11EC-B406-1548637E987F

DEVICE_CATEGORY: mfp

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 69CDF9A0-7F9F-11EF-8A42-99F16D3DB5FC

APTEST_UPDATE_STATUS:

ATM_REQCOUNT: 2

COMPETENCY:

