You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Next »
Side by Side Test Cases:
Verify the SRX inclusion into a new guest vlan network
- Deploy First VM in the account.
- Check the DB Server and the Management Server Logs: Figure out the Guest VLAN assigned to the new account.
- Check the SRX: show interfaces - find the vlan under the private interface section.
- Destroy First VM
- Restore First VM
- Check the DB Server: Check that the Guest VLAN is still assigned to the same account.
- Check the SRX: show interfaces - find the vlan under the private interface section.
- Destroy First VM
- Expunge First VM
- Check the DB Server: Check that the Guest VLAN is still assigned to the same account.
- Check the SRX: show interfaces - find the vlan under the private interface section.
- Wait till the virtual network gets expunged after "network.gc.interval".
- Check the DB Server: Check that the Guest VLAN is no longer assigned to the same account.
- Check the SRX: show interfaces - find the vlan missing under the private interface section.
- Deploy a Second VM in the account.
- Check the DB Server and the Management Server Logs: Figure out the new Guest VLAN assigned to the account.
- Check the SRX: show interfaces - find the new vlan under the private interface section.
Port Forwarding Rule
- Creation of Port Forwarding Rule for only one port.
- Verification Steps:
- Check the validity of the rule (ssh 22 ,wget 80)
- Check the public port to private port mapping on the SRX
- Check the security-nat list output on the SRX
- Check the firewall_rules table on the CS DB Server.
- Check the user_ip_address table on the CS DB Server.
- Deletion of Port Forwarding Rule
- Verification Steps:
- Check the invalidity of the rule (ssh 22 ,wget 80)
- Check the cleanup of public port to private port mapping on the SRX
- Check the security-nat list output on the SRX
- Check the firewall_rules table on the CS DB Server
- Check the user_ip_address table on the CS DB Server
Static NAT Rule
- Creation of Static NAT Rule
- Create Port Range:
- Verification Steps:
- Check the validity of the port range given with a Static NAT rule (ssh 22 ,wget 80)
- Check the security-nat list output on the SRX.
- Check the firewall_rules table on the CS DB Server.
- Check the user_ip_address table on the CS DB Server.
- Deletion of the Port Range:
- Verification Steps:
- Check the invalidity of the port range given with a Static NAT rule (ssh 22 ,wget 80)
- Check the security-nat list output on the SRX
- Check the firewall_rules table on the CS DB Server.
- Check the user_ip_address table on the CS DB Server.
- Deletion of the Static NAT Rule:
- Verification Steps:
- Check the firewall_rules table on the CS DB Server