TEST_TYPE: manual

INPUT: <p>1.Device should be upgraded to latest D7.6 firmware version.<br />
2.Device EWS should be accessible with valid IP address.<br />
3.Dongle should be connected to the device.<br />
4.Router should be configured in WPA3/WPA2 personal security mode.<br />
5.Wireshark should be installed in test PC.</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE:

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022

TESTCASE_MODIFICATION_REQUIRED:

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120868

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>7.a)There should not be any interrupt in wireless network connection in the device.<br />
b)Any of these following packets should be available in trace with the details-- Protected flag: Data is protected-1<br />
- Disassociate<br />
- Deauthenticate<br />
- Action Frames: Block ACK Request/Response (AddBA); QoS Admission Control; Radio Measurement; Spectrum Management; Fast BSS Transition<br />
- Channel Switch Announcement directed to a client (Unicast)</p>

RESOURCE_HW:

MDATE: 1683120868

APPROVED_SPAR:

TEST_CASE_TYPE: sanity

TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P

SPEC_TAG: [55.050.135] (FT-24349) {DY 7.6} If the selected Networks Security mode is WPA3-Personal-Only or WPA3-Personal-Transition this shall trigger options settings including:
[55.050.135.03] (FT-24349) {DY 7.6} Protected Management Frames (PMF) setting - required &amp; non-editable

SPEC_NUM:

PROCEDURE: <p>1.In LUI,login as admin --click on Device app --click on "Tools" --Network settings --Network connectivity --click on wireless.<br />
2.Click on Pick new network --Manual Set up --provide SSID --choose "WPA3-personal Transition" security mode.<br />
3.Provide valid SSID and password and save the settings.<br />
4.Navigate to Device app -- Tools --Network settings --Network connectivity --change network connection from wired to wireless.<br />
5.Reboot the device manually once device came to ready state after reboot; stop the packet capture in router.<br />
6.Download the packet capture file(Wireshark logs) from router EWS.<br />
7.Check the wireless network connection in the device and also check in downloaded Wireshark logs from the router for any of these following packets:<br />
- Disassociate<br />
- Deauthenticate<br />
- Action Frames: Block ACK Request/Response (Adwa); QoS Admission Control; Radio Measurement; Spectrum Management; Fast BSS Transition<br />
- Channel Switch Announcement directed to a client (Unicast)</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18920".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: To check the PMF functionality in the device when WPA3-Personal Transition wireless security mode is configured via manual configuration of wireless networks in LUI.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION: non_outliers

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS:

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 19A6FDCE-0FBC-11EC-B406-1548637E987F, 19AA576C-0FBC-11EC-B406-1548637E987F

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 9B89465C-7F9F-11EF-8A42-99F16D3DB5FC

APTEST_UPDATE_STATUS:

ATM_REQCOUNT: 2

COMPETENCY: wfast_connectivity

APTEST_TRACKING: yes

AUTOMATION_CANDIDATE: yes

