Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

Test ID

Test Case Name

Steps To Be Performed to Test

Verification Steps

Priority

Status

1

Create VPC(name,zoneId,cidr,vpcOfferingId).

1. Create VPC Offering by specifying all supported Services(Vpn,dhcpdns,UserData, SourceNat,Static NAT and PF,LB,NetworkAcl).
2. Create a VPC using the above VPC offering by passing name,zoneId,cidr,vpcOfferingId

. VPC should get  created with "Enabled" state.
The VR should start when VPC is created.
SourceNatIP address should be allocated to the VR

P0

.Pass

2

With in the same account , any 2 VPCs should have non-overlapping CIDRs.

As account1,
1. Create VPC with cidr=10.1.1.1/16.
2. Create another VPC with cidr=10.2.1.1/16.

1.Creation of both the VPCs should succeed.

P0

Pass

3

As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID for himself.

1. As User account , Create VPC(name,zoneId,cidr,vpcOfferingId,networkDomain) without passing Account/domain ID.
2. As this user account, create a network as part of this VPC.
3. Deploy Vms as part of this network.

User should be able to deploy Vms as part of the VPC that he has created.

P0

Pass

4

list VPCS as admin User to view all the Vpcs owned by admin user

1. Create a VPC - vpc1 for admin user.
2. Create a VPC - vpc2 for regular user - user1.
3. As admin User list VPC with out passing any parameter.
4. As admin User list VPC by passing accountId/DomainId of user1.
5. As admin User list VPC by passing listAll=true

1. For step3 , list VPC should return  only vpc1.
2. For step4 , list VPC should return   vpc2.
3. For step5 , list VPC should return   vpc1 and vpc2.

P0

Pass

5

Create VPC with networkDomain.Add network without networkDomain to this VPC.

1. Create VPC by providing networkDomain.
2. Add network without networkDomain to this VPC.
3. Deploy Vm in this network.

VM should have the Network domain name from VPC.

P0

Pass

6

Start the User VM using one isolated network in a VPC

1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
4. Create a PF
5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2.
6. Create egress network ACL for network1 and network2 to access google.com

Steps:
1. Stop a user VM that is running.
2. Start this user VM..

1. Vm should be started successfully.
2.Make sure that we are able to access google.com from this user Vm.

P0

Fail(CLOUDSTACK-106)

7

Reboot the User VM using one isolated network in a VPC

1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
4. Create a PF
5. Create ingress network ACL for allowing all the above rules from a public ip range on network1 and network2.
6. Create egress network ACL for network1 and network2 to access google.com

Steps:
Reboot user VM.

1. Vm should be rebooted successfully.
2.Static NAT rules on this VM works as expected.

P0

Fail(CLOUDSTACK-106) outbound traffic is blocked

8

Acquire Public IP Address to VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
Steps:
1. Acquire a public IP Address to the VPC

1. Successfully acquire public IP Address to the VPC

P0

Pass

9

Associate Acquired Public IP Address to a network of the VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Acquire a public IP Address to the VPC.
3. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
Steps:
1.Associate the public IP Address to network1 by creating a PF/LB/Static Nat rule.

1. As part of network rule creation ,Association of the public IP Address  to the network should succeed.

P0

Fail

10

Disassociate Public IP Address from the VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Acquire a public IP Address to the VPC.
Steps:
1. Disassociate the Public IP Address.

1. Successful disassociation of the Public IP Address from the VPC.

P0

Pass

 

 

 

 

 

 

 

 

 

 

 

11

Delete an Ingress and Egress rule rule for a network

PreReq:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
Steps:
1.For network1 , Create a Ingress rule (protocol TCP, cidr -cidr1 ) for port 22
2.For network1 , Create a Egress rule (protocol TCP, cidr -cidr2 ) for port 22
3. Delete the Ingress rule created in step1.
4. Delete theEgress rule created in step2.

Creation of Ingress and Egress rules should succeed.
In the VR, we should see these rules being removed.

P1

Pass

12

Create an Ingress and Egress rule rule for a network

PreReq:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2.
Steps:
1.For network1 , Create a Ingress rule (protocol TCP, cidr -cidr1 ) for port 22
2.For network1 , Create a Egress rule (protocol TCP, cidr -cidr2 ) for port 22

Creation of Ingress and Egress rules should succeed.In the VR, we should see there rules being programmed successfully.

P1

Pass

13

Release Ip address that has a static Nat rule assigned to it.

1.Create a VPC with cidr - 10.1.1.1/16
2. Add 2 networks to this VPC.
3. Deploy few vms in these networks.
Steps:
1. Acquire an ipaddress for the VPC.
1. Create a Static Nat rule for one of the Vms in the network.
3. Released this ipadress on which the static Nat rule was created.

Ipaddress should get released successfully. The Static NAT rule should not be present in the VR anymore.

P1

Pass

14

Create Static NAT Rules for a single virtual network of a VPC using a released Public IP Address from other virtual network when the Virtual Router is in Running State

PreReq -
1. Log in as the Admin User of ROOT domain
2. Use a VPC Offering to create a VPC that supports all services on VPC Virtual Router. Provide VPC CIDR as 10.1.1.1/16.
3. Acquire 1 Public IP Address for the VPC.
4. Add guest networks 1 (10.1.1.1/24) and 2 (10.1.2.1/24) to this VPC using network offering that supports VPC Virtual Router alone as the service provider for a valid subset of services that are part of the VPC.
5. Deploy a VM on each guest network.
6. Create a Static Nat Rule for vm in network1 on the the Public IP Address.
Steps:
1. Delete Static NAT rule.
2. Create a Static Nat Rule for vm in network2 on the same Public IP

1.Static Nat rule should get created successfully.
2. Successfully ssh into the Guest VM using each Static NAT Rule.

P1

Pass

15

Create Static NAT Rule for a single virtual network of a VPC using a new Public IP Address available with the VPC when the Virtual Router is in Running State

PreReq -
1. Log in as the Admin User of ROOT domain
2. Use a VPC Offering to create a VPC that supports all services on VPC Virtual Router. Provide VPC CIDR as 10.1.1.1/16.
3. Acquire a Public IP Address for the VPC.
4. Add guest network1(10.1.1.1/24) to this VPC using network offering that supports VPC Virtual Router alone as the service provider for a valid subset of services that are part of the VPC.
5. Deploy a VM in the guest network.
Steps:
1. Log in as the Admin User of ROOT domain.
2. Use the Acquired Public IP Address on the VPC to create a Static NAT Rule on TCP/ port 22 to a VM present on the guest network.

1.Successfully ssh into the Guest VM using the Static NAT Rule.

P0

Pass

16

List only VMs suitable for the Virtual Network on VPC for Static NAT Rule

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. Make sure vm1 and vm3 are deployed on one host in the cluster while vm2 and vm4 are deployed on the other host in the cluster. This can be done using host's tags and service offerings with host tags.
4. Create a Static NAT rule in network1.
Steps:
1. List the VMs on network1 for selection for the Static NAT Rule.

1. Successfully list the VMs for Static NAT Rule creation.

P0

Pass

17

List Static NAT Rules belonging to a VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. Make sure vm1 and vm3 are deployed on one host in the cluster while vm2 and vm4 are deployed on the other host in the cluster. This can be done using host's tags and service offerings with host tags.
4. Create a Static NAT rule for vms in network1.
5. Create a Static NAT rule for vms in network2.
Steps:
1. List all the Static NAT Rules belonging to a VPC.

1. Successfully List the Static NAT Rules belonging to the VPC.

P0

Pass

18

List Load Balancing Rules belonging to a VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. Make sure vm1 and vm3 are deployed on one host in the cluster while vm2 and vm4 are deployed on the other host in the cluster. This can be done using host's tags and service offerings with host tags.
4. Create a LB rule on TCP/ port 80 for vms in network1.
5. Create a LB rule on TCP/ port 80 for vms in network2.
Steps:
1. List all the Load Balancing Rules belonging to a VPC

1. Successfully List the Load Balancing Rules belonging to the VPC.

P0

Pass

19

List Port Forwarding Rules belonging to a VPC

Pre-Req:
1. Create a VPC with cidr - 10.1.1.1/16
2. Add network1(10.1.1.1/24) and network2(10.1.2.1/24) to this VPC.
3. Deploy vm1 and vm2 in network1 and vm3 and vm4 in network2. Make sure vm1 and vm3 are deployed on one host in the cluster while vm2 and vm4 are deployed on the other host in the cluster. This can be done using host's tags and service offerings with host tags.
4. Create a PF rule for vms in network1.
5. Create a PF rule for vms in network2.
Steps:
1. List all the Port Forwarding Rules belonging to a VPC

1. Successfully List the Port Forwarding Rules belonging to the VPC.

P0

Pass