| Test Case Name
| Steps
| Expected Result
| Priority | Status
| Comments
|
---|
1
| Deploy First VM in account | 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create first VM in new network 3. Check DB for guest VLAN assigned to network 4. Check SRX: show interfaces for guest VLAN in private interface | 3. DB and UI should show guest VLAN assigned to network. 4. SRX: show interfaces should show guest VLAN in private interface | P1 | PASS | |
2
| Destroy Restore First VM | 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create first VM in new network 3. Destroy first VM 4. Restore first VM 5. Check DB for same guest VLAN assigned to network 6. Check SRX: show interfaces for same guest VLAN in private interface | 5. DB and UI should show guest VLAN assigned to network. 6. SRX: show interfaces should show guest VLAN in private interface | P1 | PASS | |
3
| Destroy Expunge First VM virtual network gets expunged after "network.gc.interval" and "network.gc.wait"
| 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Destroy first VM 4. After first VM expunged, Check DB for guest VLAN no longer assigned to network 5. Check SRX: show interfaces for guest VLAN no longer in private interface
| 4. After first VM expunged, DB and UI for guest VLAN no longer assigned to network 5. SRX: show interfaces for guest VLAN no longer in private interface | P! | PASS | |
4
| Deploy Second VM in account | 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create first and second VMs in new network 5. Check DB for same guest VLAN assigned to network 6. Check SRX: show interfaces for same guest VLAN in private interface
| 5. DB and UI show same guest VLAN assigned to network 6. SRX: show interfaces show same guest VLAN in private interface | P! | PASS | |
5
| Create port forwarding rule
| 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Create Port Forwarding Rule for only one port. 4. Verify: a. Check validity of rule (ssh 22, wget 80) b. Check show security-nat on the SRX c. Check the firewall_rules table on the CS DB Server. d. Check the user_ip_address table on the CS DB Server
| a. ssh 22, wget 80 should work b. SRX: show security-nat on the SRX should show rule-set for destination-address with Port Forwarding IP c. DB: firewall_rules table show active Port forwarding rule d. DB and UI: user_ip_address table should show Port Forwarding IP allocated
| P! | PASS | |
6
| Delete port forwarding rule | 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Create Port Forwarding Rule for only one port. 4. Delete Port Forwarding Rule . Verify: a. Check rule not exist (ssh 22, wget 80) b. Check cleanup of public port to private port mapping on the SRX c. Check show security-nat on the SRX d. Check the firewall_rules table on the CS DB Server. e. Check the user_ip_address table on the CS DB Server
| a. ssh 22, wget 80 no longer work b. SRX: cleanup of public port to private port mapping c. SRX: show security-nat no longer show rule-set for destination-address with Port Forwarding IP d. DB: firewall_rules table no longer show Port forwarding rule e. DB: user_ip_address table should show Port Forwarding IP allocated | P! | PASS | |
7
| Create Port Range Static NAT rule
| 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Create Static NAT Rule for only one port. 4. Verify: a. Check validity of rule (ssh 22, wget 80) b. Check show security-nat on the SRX c. Check the firewall_rules table on the CS DB Server. d. Check the user_ip_address table on the CS DB Server
| a. ssh 22, wget 80 should work b. SRX: show security-nat on the SRX should not show rule-set for destination-address with Static NAT IP c. DB: firewall_rules table show active Static NAT rule: d. DB and UI: user_ip_address table should show Static NAT IP allocated with one_to_one_nat field = 1
| P! | PASS | |
8
| Delete Port Range Static NAT rule
| 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Create Static NAT Rule for only one port. 4. Delete Static NAT Rule . Verify: a. Check rule not exist (ssh 22, wget 80) b. Check cleanup of public port to private port mapping on the SRX c. Check show security-nat on the SRX d. Check the firewall_rules table on the CS DB Server. e. Check the user_ip_address table on the CS DB Server
| a. ssh 22, wget 80 should work b. SRX: show security-nat on the SRX should not show rule-set for destination-address with Static NAT IP c. DB: firewall_rules table no longer show active Static NAT rule: d. DB and UI: user_ip_address table should show Static NAT IP allocated with one_to_one_nat field = 0
| P! | PASS | |
9 | Delete Static NAT rule
| 1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone. 2. create VM in new network 3. Create Static NAT Rule for only one port. 4. Delete Static NAT Rule for only one port. 5. Check the firewall_rules table on the CS DB Server. | 5. DB: firewall_rules table no longer show active Static NAT rule: | P! | PASS | |
| | | | | | |
| | | | | | |
| | | | | | |