You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

 

Test Case Name                     

Steps                                                                               

Expected Result                                          

Priority

Status         

Comments  

1

Deploy First VM in account

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first VM in new network
3. Check DB for guest VLAN assigned to network
4. Check SRX: show interfaces for guest VLAN in private interface

3. DB and UI should show guest VLAN assigned to network.
4. SRX: show interfaces should show guest VLAN in private interface

P1

PASS

 

2

Destroy Restore First VM

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first VM in new network
3. Destroy first VM
4. Restore first VM
5. Check DB for same guest VLAN assigned to network
6. Check SRX: show interfaces for same guest VLAN in private interface

5. DB and UI should show guest VLAN assigned to network.
6. SRX: show interfaces should show guest VLAN in private interface

P1

PASS

 

3

Destroy Expunge First VM
virtual network gets expunged after "network.gc.interval" and "network.gc.wait"

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Destroy first VM
4. After first VM expunged, Check DB for guest VLAN  no longer assigned to network
5. Check SRX: show interfaces for guest VLAN no longer in private interface

4. After first VM expunged, DB and UI for guest VLAN  no longer assigned to network
5. SRX: show interfaces for guest VLAN no longer in private interface

P!

PASS

 

4

Deploy Second VM in account

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create first and second VMs in new network
5. Check DB for same guest VLAN assigned to network
6. Check SRX: show interfaces for same guest VLAN in private interface

5. DB and UI show same guest VLAN assigned to network
6.  SRX: show interfaces show same guest VLAN in private interface

P!

PASS

 

5

Create port forwarding rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Port Forwarding Rule for only one port.
4. Verify:
a.  Check validity of rule (ssh 22, wget 80)
b.  Check show security-nat on the SRX
c. Check the firewall_rules table on the CS DB Server.
d. Check the user_ip_address table on the CS DB Server

a.  ssh 22, wget 80 should work
b.  SRX: show security-nat on the SRX
c. SRX:  firewall_rules table on the CS DB Server.
d. DB and UI: the user_ip_address table on the

P!

PASS

 

6

Delete port forwarding rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Port Forwarding Rule for only one port.
4. Delete Port Forwarding Rule .  Verify:
a.  Check  rule not exist (ssh 22, wget 80)
b. Check cleanup of public port to private port mapping on the SRX
c.  Check show security-nat on the SRX
d. Check the firewall_rules table on the CS DB Server.
e. Check the user_ip_address table on the CS DB Server

.

P!

PASS

 

7

Create Port Range Static NAT rule  

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Verify:
a.  Check validity of rule (ssh 22, wget 80)
b.  Check show security-nat on the SRX
c. Check the firewall_rules table on the CS DB Server.
d. Check the user_ip_address table on the CS DB Server

 

P!

PASS

 

8

Delete Port Range Static NAT rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Delete Static NAT Rule .  Verify:
a.  Check  rule not exist (ssh 22, wget 80)
b. Check cleanup of public port to private port mapping on the SRX
c.  Check show security-nat on the SRX
d. Check the firewall_rules table on the CS DB Server.
e. Check the user_ip_address table on the CS DB Server

 

P!

 

 

9

Delete  Static NAT rule

1. create network offering firewall with SRX, load balancer with F5. Source NAT per zone.
2. create VM in new network
3. Create Static NAT Rule for only one port.
4. Delete Static NAT Rule for only one port.
5. Check the firewall_rules table on the CS DB Server.

 

P!

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Side by Side Test Cases:

Verify the SRX inclusion into a new guest vlan network
  1. Deploy First VM in the account.
    1. Check the DB Server and the Management Server Logs: Figure out the Guest VLAN assigned to the new account.
    2. Check the SRX: show interfaces - find the vlan under the private interface section.
  2. Destroy First VM
  3. Restore First VM
    1. Check the DB Server: Check that the Guest VLAN is still assigned to the same account.
    2. Check the SRX: show interfaces - find the vlan under the private interface section.
  4. Destroy First VM
  5. Expunge First VM
    1. Check the DB Server: Check that the Guest VLAN is still assigned to the same account.
    2. Check the SRX: show interfaces - find the vlan under the private interface section.
  6. Wait till the virtual network gets expunged after "network.gc.interval".
    1. Check the DB Server: Check that the Guest VLAN is no longer assigned to the same account.
    2. Check the SRX: show interfaces - find the vlan missing under the private interface section.
  7. Deploy a Second VM in the account.
    1. Check the DB Server and the Management Server Logs: Figure out the new Guest VLAN assigned to the account.
    2. Check the SRX: show interfaces - find the new vlan under the private interface section.
Port Forwarding Rule
  1. Creation of Port Forwarding Rule for only one port.
    1. Verification Steps:
      1. Check the validity of the rule (ssh 22 ,wget 80)
      2. Check the public port to private port mapping on the SRX
      3. Check the security-nat list output on the SRX
      4. Check the firewall_rules table on the CS DB Server.
      5. Check the user_ip_address table on the CS DB Server.
  2. Deletion of Port Forwarding Rule
    1. Verification Steps:
      1. Check the invalidity of the rule (ssh 22 ,wget 80)
      2. Check the cleanup of public port to private port mapping on the SRX
      3. Check the security-nat list output on the SRX
      4. Check the firewall_rules table on the CS DB Server
      5. Check the user_ip_address table on the CS DB Server
Static NAT Rule
  1. Creation of Static NAT Rule
  2. Create Port Range:
    1. Verification Steps:
      1. Check the validity of the port range given with a Static NAT rule (ssh 22 ,wget 80)
      2. Check the security-nat list output on the SRX.
      3. Check the firewall_rules table on the CS DB Server.
      4. Check the user_ip_address table on the CS DB Server.
  3. Deletion of the Port Range:
    1. Verification Steps:
      1. Check the invalidity of the port range given with a Static NAT rule (ssh 22 ,wget 80)
      2. Check the security-nat list output on the SRX
      3. Check the firewall_rules table on the CS DB Server.
      4. Check the user_ip_address table on the CS DB Server.
  4. Deletion of the Static NAT Rule:
    1. Verification Steps:
      1. Check the firewall_rules table on the CS DB Server
  • No labels