TEST_TYPE: manual

INPUT: <p>1.Device should be upgraded to latest D7.6 firmware version.<br />
2.Device EWS should be accessible with valid IP address.<br />
3.Dongle should be connected to the device.<br />
4.Router should be configured in WPA2 personal security mode.</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE:

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022

TESTCASE_MODIFICATION_REQUIRED:

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120868

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>5.Device EWS should be accessible and wireless communication in the device should be successful.</p>

RESOURCE_HW:

MDATE: 1683120868, 1683122698

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.129] (FT-24349) {DY 7.6} For WPA3-Personal-Transition (WPA2/WPA3 Personal) Security Mode, the Device shall:
[55.050.129.01] (FT-24349) {DY 7.6} support connection to Access Points (APs)/routers that support either WPA2-Personal Security or WPA3-Personal Security.  \
Note: The Device shall connect using the higher-security method (WPA3-Personal) when available. 
[55.050.129.02] (FT-24349) {DY 7.6} be constrained to AES (CCMP) encryption.
[55.050.129.03] (FT-24349) {DY 7.6} constrain the Protected Management Frame (PMF) option to Optional (Indicating that the Device will use PMF based on the Access Point (AP)/ router configuration. If an AP is capable of PMF, the device will use PMF.  If an AP doesn’t support PMF, the device will not use PMF.)\
Notes: 
For WPA3, PMF is Required.
For WPA2, PMF is Optional.
[55.050.129.04] (FT-24349) {DY 7.6} require an authentication password \
Notes: 
For WPA3, the password shall leverage Simultaneous Authentication of Equals (SAE).
For SAE, Diffie-Hellman Group 19 (256-bit random ECP group (NIST)) is supported.
For WPA2, the password shall leverage Pre-Shared Key (PSK).

SPEC_NUM:

PROCEDURE: <p>1.Open device EWS --Login as admin --Navigate to Properties --Connectivity --Set up --Edit Xerox wireless Network Interface settings.<br />
2.Click on select different network --Join other network --Provide SSID and security mode as WPA3-Personal Transition.<br />
3.Provide valid password and save the settings.<br />
4.Navigate to Connectivity --Set Up page --click on "Make Active" for Xerox Wireless Network Interface.<br />
5.Check the EWS accessibility.</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18897"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129810".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: To check the wireless connectivity in the device when WPA3-Personal-Transition wireless security mode is configured via manual configuration of wireless network in EWS.(Access point is router that supports WPA2-Personal Security)

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION:

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS:

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 198234BC-0FBC-11EC-B406-1548637E987F, 19830C52-0FBC-11EC-B406-1548637E987F, 19844482-0FBC-11EC-B406-1548637E987F, 19866078-0FBC-11EC-B406-1548637E987F, 1987505A-0FBC-11EC-B406-1548637E987F

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 6C6E6F96-7F9F-11EF-8A42-99F16D3DB5FC

APTEST_UPDATE_STATUS:

ATM_REQCOUNT: 5

COMPETENCY:

