Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

 

Test Case Name                     

Steps                                                                               

Expected Result                                          

Priority

Status         

Comments  

1

Deploy First VM in account

    

 

 

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first VM in new network
3. Check DB for guest VLAN assigned to network
4. Check SRX: show interfaces for guest VLAN in private interface

3. DB and UI should show guest VLAN assigned to network.
4. SRX: show interfaces should show guest VLAN in private interface

P1

PASS  

 

2

Destroy Restore First VM

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first VM in new network
3. Destroy first VM
4. Restore first VM

 

 

 


5. Check DB for same guest VLAN assigned to network
6. Check SRX: show interfaces for same guest VLAN in private interface

5. DB and UI should show guest VLAN assigned to network.
6. SRX: show interfaces should show guest VLAN in private interface

P1

PASS  

 

3

Destroy Expunge First VM
virtual network gets expunged after "network.gc.interval" and "network.gc.wait"

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Destroy first VM
4. After first VM

 

 

 

expunged, Check DB for guest VLAN  no longer assigned to network
5. Check SRX: show interfaces for guest VLAN no longer in private interface

4. After first VM expunged, DB and UI for guest VLAN  no longer assigned to network
5. SRX: show interfaces for guest VLAN no longer in private interface

P!

PASS  

 

4

Deploy Second VM in account

 

 

 

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first and second VMs in new network
5. Check DB for same guest VLAN assigned to network
6. Check SRX: show interfaces for same guest VLAN in private interface

5. DB and UI show same guest VLAN assigned to network
6.  SRX: show interfaces show same guest VLAN in private interface

P!

PASS  

 

5

Create port forwarding rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Port Forwarding Rule for only one port.
4. Verify:
a.  Check validity of rule (ssh 22, wget 80)
b.  Check show security-nat on the SRX
c. Check the firewall_rules table on the CS DB Server.
d. Check the user_ip_address table on the CS DB Server

a.  ssh 22, wget 80 should work
b.  SRX: show security-nat on the SRX
     should show rule-set  for destination-address  with   Port Forwarding IP
c. DB:  firewall_rules table show active Port forwarding rule
d. DB and UI:  user_ip_address table should show
   Port Forwarding IP allocated

P!

PASS

 

6

Delete port forwarding rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Port Forwarding Rule for only one port.
4. Delete Port Forwarding Rule .  Verify:
a.  Check  rule not exist (ssh 22, wget 80)
b. Check cleanup of public port to private port mapping on the SRX
c.  Check show security-nat on the SRX
d. Check the firewall_rules table on the CS DB Server.
e. Check the user_ip_address table on the CS DB Server

a.  ssh 22, wget 80  no longer work
b. SRX: cleanup of public port to private port mapping 
c. SRX:  show security-nat no longer show rule-set  for destination-address  with   Port Forwarding IP
d. DB: firewall_rules table  no longer show Port forwarding rule
e. DB:   user_ip_address table  should show
   Port Forwarding IP allocated

P!

PASS

 

7

Create Port Range Static NAT rule  

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Verify:
a.  Check validity of rule (ssh 22, wget 80)
b.  Check show security-nat on the SRX
c. Check the firewall_rules table on the CS DB Server.
d. Check the user_ip_address table on the CS DB Server

a.  ssh 22, wget 80 should work
b.  SRX: show security-nat on the SRX
     should not show rule-set  for destination-address  with  
Static NAT IP 
c. DB: 

8

 

 

 

 

 

 

firewall_rules table show active Static NAT rule:
 
d. DB and UI:  user_ip_address table should show
   Static NAT IP allocated with one_to_one_nat field = 1

P!

PASS

 

8

Delete Port Range Static NAT rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Delete Static NAT Rule .  Verify:
a.  Check  rule not exist (ssh 22, wget 80)
b. Check cleanup of public port to private port mapping on the SRX
c.  Check show security-nat on the SRX
d. Check the firewall_rules table on the CS DB Server.
e. Check the user_ip_address table on the CS DB Server

a.  ssh 22, wget 80 should work
b.  SRX: show security-nat on the SRX
     should not show rule-set  for destination-address  with  
Static NAT IP 
c. DB:  firewall_rules table no longer show active Static NAT rule:
 
d. DB and UI:  user_ip_address table should show
   Static NAT IP allocated with one_to_one_nat field = 0

P!

PASS

 

9

Delete  Static NAT rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Delete Static NAT Rule for only one port.
5. Check the firewall_rules table on the CS DB Server.

5. DB:  firewall_rules table no longer show active Static NAT rule:

P!

PASS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Side by Side Test Cases:

...