TEST_TYPE: manual

INPUT: <p>1.Device should be upgraded to latest D7.6 firmware version.<br />
2.Device EWS should be accessible with valid IP address.<br />
3.Dongle should be connected to the device.<br />
4.Router should be configured in WPA3 Enterprise security mode.<br />
5.Radius server Root certificate should be installed in the device.<br />
6.Wireshark should be installed in test PC.</p>

FILES:

AUTOMATION_GROUP:

AUTOMATABLE:

ACTION_TO_BE_DONE:

CONSTRAINTS_DAR: IMP-98 by Karthika dated on 25-12-2022

TESTCASE_MODIFICATION_REQUIRED:

MFF:

SPEC: FS 55.050 Wireless Connectivity

TESTCASE_FAMILY:

HISTORY:

REASON_FOR_AUTOMATABLE:

CDATE: 1683120868

TESTCASE_APPROVALS:

TESTCASE_STATE:

OUTPUT: <p>7.802.1X authentication should not be successful in the device and EWS should not be accessible with wireless IP address.<br />
8."Radius" packets should not be listed in Wireshark traces.</p>

RESOURCE_HW:

MDATE: 1683120868, 1683122698

APPROVED_SPAR:

TEST_CASE_TYPE:

TC_WORK_LOCATION_CAT: work_from_home_with_office_support_tc

AUTHOR: q3SJKS2P

GROUP:

MUSER: q3SJKS2P, q3SJKS2P

SPEC_TAG: [55.050.132] (FT-24349) {DY 7.6} For WPA3-Enterprise-Only Security Mode, the Device shall:
[55.050.132.01] (FT-24349) {DY 7.6} support the following Authentication mechanisms:
[55.050.132.01.01] (FT-24349) {DY 7.6} PEAPv0/MSCHAPv2 
[55.050.132.01.02] (FT-24349) {DY 7.6} EAP-TLS 
[55.050.132.01.03] (FT-24349) {DY 7.6} EAP-TTLS/ PAP  
[55.050.132.01.04] (FT-24349) {DY 7.6} EAP-TTLS/ MSCHAPv2\
Note: This is the non-EAP MSCHAPv2 variant.  (i.e. MSCHAPv2, not EAP-MSCHAPv2)
[55.050.132.01.05] (FT-24349) {DY 7.6} EAP-TTLS/ EAP-TLS
[55.050.132.02] (FT-24349) {DY 7.6} be constrained to AES (CCMP) encryption.
[55.050.132.03] (FT-24349) {DY 7.6} constrain the Protected Management Frame (PMF) option to Required (indicating that the Device requires PMF support).
[55.050.132.04] (FT-24349) {DY 7.6} require server certificate validation.

SPEC_NUM:

PROCEDURE: <p>1.Open device EWS --Login as admin --Navigate to Properties --Connectivity --Set up --Edit Xerox wireless Network Interface settings.<br />
2.Click on select different network --Join other network --Provide SSID and security mode as  WPA3-Enterprise-Only.<br />
3.Choose authentication method as "PEAPv0/MSCHAPv2".<br />
4.Under server validation radius server Root certificate should be chosen.<br />
5.Provide valid username and invalid password and save the setting.<br />
6.Navigate to Connectivity --Set Up page --click on "Make Active" for Xerox Wireless Network Interface.<br />
7.Check wireless communication in the device and check for EWS accessibility.<br />
8.Reboot or Refresh the device and capture the Wireshark traces and check for the "Radius" packets in traces.</p>

DEVELOPMENT_COMPLETE_TIME:

ATM_LOCKED: 0

PRECONDITION_TO_BE_DONE:

PO_SIGNOFF_DATE:

APPROVE_SPAR:

RELEASE:

TESTCASE_PRODUCT: canyon, carroll, corvo, kiska, mystic, melody

FILENAME:

ATM_MCOMMENTS: Copied from "WFAST_Discovery_Regression_Connectivity/Testcases/FS_55.050_Wireless_Connectivity/18975"., Renamed from "WFAST_Discovery_Regression_Connectivity/Sanity/FS_55.050_Wireless_Connectivity_Sanity/129888".

RESOURCE_MEDIA:

COMMONALITY_DETAILS:

PRIORITY:

COMMON_FUNCTIONALITY:

APPROVED_QE:

TESTCASE_HEADLINE: Check the wireless communication in the device with "PEAPv0/MSCHAPv2 " authentication for WPA3 Enterprise only security mode with invalid password 
--manual configuration of wireless network.

TESTCASE_VERSION:

FEATURE:

APPROVE_SE:

SPEC_VERSION:

TESTCASE_PLATFORM:

FILEDESC:

PROCESS:

TC_WEIGHTAGE:

COMPLEXITY_OUTPUT_VALIDATION:

SKILL_SET:

TESTCASE_SOURCE:

APPROVE_QE:

COMPLEXITY_PRECONDITIONS:

TESTCASE_STEPS_ARE_RELATED_TO:

APPROVED_SE:

PLANNEDTIMESTAFF:

ATM_OWNER:

LOE:

ASSOCIATED_TESTCASES:

TRAINING:

ATM_REQLINK: 198A0228-0FBC-11EC-B406-1548637E987F, 1990B4C4-0FBC-11EC-B406-1548637E987F, 19918EDA-0FBC-11EC-B406-1548637E987F, 1992A6D0-0FBC-11EC-B406-1548637E987F

DEVICE_CATEGORY: common

SUB_FEATURE:

RESOURCE_CONSUMEABLES:

AUTOMATION_TC_VALIDATION:

QA_TEAM:

ATM_ID: 9B2B714E-7F9F-11EF-8A42-99F16D3DB5FC

APTEST_UPDATE_STATUS:

ATM_REQCOUNT: 4

COMPETENCY:

