CLI Commands PDF
CLI Commands PDF
1 18/2/2019
1.1.1.1.1.1.2.13. Test: Test Name : 802.1x_2.18_RADIUS_Assigned_Rate_Limit-
Ingress .................................................................................................................. 90
1.1.1.1.1.1.2.14. Test: Test Name : 802.1x_1.21_Config-CLI_Boundary_Values 94
1.1.1.1.1.1.2.15. Test: Test Name : 802.1x_2.82_Cached_Re-
Authentication_Persistant_Configuration ............................................................. 97
1.1.1.1.1.1.2.16. Test: Test Name : 802.1x_2.76_RADIUS_Unique_Session_ID 99
1.1.1.1.1.1.2.17. Test: Test Name :
802.1x_2.46_Port_Based_Mode_Values_Held_Over_Reboot ......................... 103
1.1.1.1.1.1.2.18. Test: Test Name : 802.1x_2.55_NAS_Attributes_MS-RAS-
Vendor_Attribute ................................................................................................ 105
1.1.1.1.1.1.2.19. Test: Test Name : 802.1x_2.61_RADIUS_Access-
Accept_with_Reply-Message ............................................................................. 109
1.1.1.1.1.1.2.20. Test: Test Name :
802.1x_2.62_RADIUS_Message_Authenticator_in_packet .............................. 111
1.1.1.1.1.1.2.21. Test: Test Name : 802.1x_2.63_RADIUS_Proxy_Server ....... 115
1.1.1.1.1.1.2.22. Test: Test Name : 802.1x_2.64_RADIUS_Server__Redundancy
............................................................................................................................ 118
1.1.1.1.1.1.2.23. Test: Test Name :
802.1x_2.69_Authenticator_Port_Hoping_With_NO_Link_Down ..................... 120
1.1.1.1.1.1.2.24. Test: Test Name : 802.1x_2.65_RADIUS_Server_Interoperability
............................................................................................................................ 123
1.1.1.1.1.1.2.25. Test: Test Name : 802.1x_2.70_RADIUS_AVPs_in_Access-
Request_during_supplicant_auth ....................................................................... 126
1.1.1.1.1.1.2.26. Test: Test Name : 802.1x_6.4 Phone_PC_Hoping_Move ...... 129
1.1.1.1.1.1.2.27. Test: Test Name : 802.1x_2.14_RADIUS_Assigned_CoS ..... 132
1.1.1.1.1.1.2.28. Test: Test Name : 802.1x_2.15_RADIUS_Assigned_Egress-
VLAN-Name ....................................................................................................... 134
1.1.1.1.1.1.2.29. Test: Test Name : 802.1x_2.16_RADIUS_Assigned_Egress-
VLANID .............................................................................................................. 139
1.1.1.1.1.1.2.30. Test: Test Name : 802.1x_2.81_Cached_Re-
Authentication_Basic_Functionality ................................................................... 142
1.1.1.1.1.1.2.31. Test: Test Name :
802.1x_Cached_Reauth_F_09_Reachable_Radius_Cached_Reauth_Period . 147
1.1.1.1.1.1.2.32. Test: Test Name :
802.1x_Cached_Reauth_F_11_Reachable_Radius_Different_Credentials...... 150
1.1.1.1.1.1.2.33. Test: Test Name :
802.1x_Cached_Reauth_F_16_UnReachable_Radius_Different_User_Credential
s .......................................................................................................................... 153
1.1.1.1.1.1.2.34. Test: Test Name : RFC_4675_on_2510_B_01.
VLAN_ID_tagged ............................................................................................... 156
1.1.1.1.1.1.2.35. Test: Test Name : RFC_4675_on_2510_B_02. VLAN
_Name_tagged ................................................................................................... 161
1.1.1.1.1.1.2.36. Test: Test Name : RFC_4675_on_2510_B_03.
VLAN_ID_untagged ........................................................................................... 166
1.1.1.1.1.1.2.37. Test: Test Name : RFC_4675_on_2510_B_04.
VLAN_Name_untagged ..................................................................................... 171
1.1.1.1.1.1.2.38. Test: Test Name :
Session_Timeout_CoA_F_08_PC_Behind_IP_Phone ...................................... 176
1.1.1.1.1.1.2.39. Test: Test Name : Port_Bounce_Host_PC_Behind_IP_Phone
............................................................................................................................ 180
1.1.1.1.1.1.2.40. Test: Test Name :
Special_488_02_PortSpeedVSA_with_Different_Port_Speed .......................... 183
1.1.1.1.1.1.2.41. Test: Test Name : Radius-Filter-
ID_F_04_ipv6_Functionality_8021x ................................................................... 186
2 18/2/2019
1.1.1.1.1.1.2.42. Test: Test Name : Radius-Filter-
ID_F_01_ipv4_Functionality_802.1x .................................................................. 190
1.1.1.1.1.1.2.43. Test: Test Name : Radius-Filter-
ID_I_02_Interop_Radius_Assigned_ACL .......................................................... 194
1.1.1.1.1.1.2.44. Test: Test Name :
Radius_F_53._RFC_4675_On_User_Priority_Table ......................................... 199
1.1.1.1.1.1.2.45. Test: Test Name : 802.1x_RADIUS Assigned VLAN .............. 204
1.1.1.1.1.1.2.46. Test: Test Name : Disconnect_Message_PC_Behind_IP_Phone
............................................................................................................................ 207
1.1.1.1.1.1.2.47. Test: Test Name : 802.1x_01_CLI_Help_Text_Verification.... 210
1.1.1.1.1.1.2.48. Test: Test Name : 802.1x_02_SNMP_Read .......................... 224
1.1.1.1.1.1.2.49. Test: Test Name : 802.1x_03_REST_Read ........................... 227
1.1.1.1.1.1.2.50. Test: Test Name : 802.1x_04_REST_Write............................ 229
1.1.1.1.1.1.2.51. Test: Test Name : 802.1x_EAP_Retries_Timeout .................. 231
1.1.1.1.1.1.2.52. Test: Test Name :
802.1x_Quiet_Discovery_Authentication_Attempts ........................................... 235
1.1.1.1.1.1.2.53. Test: Test Name : 802.1x_4.01_HA_-_Redundancy_Switchover
............................................................................................................................ 239
1.1.1.1.1.1.2.54. Test: Test Name : 802.1x_Force_Authorized_Reauthentication
............................................................................................................................ 242
1.1.1.1.1.1.3. Subject\Production\SW Development\Feature Test Plans - Dev
Handoff\802.1x\IFD_Analysis ................................................................................ 246
1.1.1.1.1.1.3.1. Test: Test Name : 802.1x_Trunk_Port ...................................... 246
1.1.1.1.1.1.3.2. Test: Test Name :
Radius_F_35._Attributes_Dynamic_Xauthmode ............................................... 248
1.1.1.1.1.1.3.3. Test: Test Name :
802.1x_Subsequent_Users_Radius_Assigned_Attributes ................................ 254
1.1.1.1.1.1.3.4. Test: Test Name : 802.1x_Idle_Session_Timeout .................... 257
1.1.1.1.1.1.3.5. Test: Test Name : 802.1x_EAP-ID-Compliance ....................... 260
1.1.1.1.1.1.3.6. Test: Test Name : 802.1x_Machine_User_Auth_Mac_Auth..... 265
1.1.1.1.1.1.3.7. Test: Test Name : 802.1x_Deauthentication_of_Guest_Clients 267
1.1.1.1.1.1.4. Subject\Production\SW Development\Feature Test Plans - Dev
Handoff\802.1x\Interop Testing ............................................................................. 271
1.1.1.1.1.1.4.1. Test: Test Name : 802.1x_3.02_Loopback_BPDU_protection . 271
1.1.1.1.1.1.4.2. Test: Test Name :
802.1x_2.47_RADIUS_Accounting_Enable_Disable ......................................... 273
1.1.1.1.1.1.4.3. Test: Test Name :
802.1x_2.48_RADIUS_Accounting_Interim_Update_Record............................ 277
1.1.1.1.1.1.4.4. Test: Test Name :
802.1x_2.49_RADIUS_Accounting_Requests_Retransmitted .......................... 282
1.1.1.1.1.1.4.5. Test: Test Name :
802.1x_2.50_RADIUS_Accounting_Start_Stop_Record ................................... 284
1.1.1.1.1.1.4.6. Test: Test Name :
802.1x_2.51_RADIUS_Accouting_Unique_Session_ID .................................... 291
1.1.1.1.1.1.4.7. Test: Test Name : Radius_Tracking_I_01_Radius_Server_Groups
............................................................................................................................ 296
RADIUS tracking feature already provides periodic information on whether radius server is
reachable or not, we can use this information on which radius server among the ones configured
is to be contacted. If radius-tracking says none of the servers are reachable, we can completely
bypass the retry mechanism and apply the back-up authentication method if configured. This
saves the client times to get access on the network. .................................................................. 296
1.1.1.1.1.1.4.8. Test: Test Name : Critical_VLAN_F_22_PC_Critical_Role ...... 300
1.1.1.1.1.1.4.9. Test: Test Name : 802.1x_Preauth_Role.................................. 304
1.1.1.1.1.1.4.10. Test: Test Name : 802.1x_Reject_Role .................................. 308
3 18/2/2019
1.1.1.1.1.1.4.11. Test: Test Name : 802.1x_cdp_lldp_bypass ........................... 311
1.1.1.1.1.1.4.12. Test: Test Name :
802.1x_Port_Security_Mac_Lockdown_Lockout ............................................... 316
1.1.1.1.1.1.4.13. Test: Test Name : 802.1x_Radius_Over_IPSec ..................... 321
1.1.1.1.1.1.4.14. Test: Test Name : 802.1x_Non_Default_VRF ........................ 324
1.1.1.1.1.1.4.15. Test: Test Name : 802.1x_DSNOOP ...................................... 327
1.1.1.1.1.1.5. Subject\Production\SW Development\Feature Test Plans - Dev
Handoff\802.1x\Supportability ................................................................................ 331
1.1.1.1.1.1.5.1. Test: Test Name : 802.1x_S_01._CopySupportFiles ............... 331
1.1.1.1.1.1.5.2. Test: Test Name : 802.1x_S_02._DiagDump ........................... 335
1.1.1.1.1.1.5.3. Test: Test Name : 802.1x_S_03._EventLogs ........................... 339
1.1.1.1.1.1.5.4. Test: Test Name : 802.1x_S_04._ShowTech ........................... 342
1.1.1.1.1.1.5.5. Test: Test Name : 802.1x_S_05._Checkpoint .......................... 344
1.1.1.1.1.1.5.6. Test: Test Name : 802.1x_S_06_Config_Migration_CLI .......... 348
1.1.1.1.1.1.5.7. Test: Test Name : 802.1x_S_07_Config_Migration_JSON ...... 351
1.1.1.1.1.1.5.8. Test: Test Name : 802.1x_S_08_Core_Dump .......................... 354
1.1.1.1.1.1.5.9. Test: Test Name : 802.1x_S_09_Memory_leak ....................... 357
1.1.1.1.1.1.5.10. Test: Test Name : 802.1x_S_10_Debug_Logs ....................... 360
4 18/2/2019
1.1.1.1.1.1.1. Subject\Production\SW Development\Feature Test
Plans - Dev Handoff\802.1x\CFD_Analysis
Test List :
OBJECTIVE:
Test 802.1X interoperability with spanning tree.
Requirements:
Equipments
1. DUT
2. Radius Server (IAS or Freeradius)
3. Supplicant which can be other switch or software installed on operating systems (OpenX,
Windows default supplicant), wpa_supplicant in linux.
4. Ixia Port
Setup:
The Supplicant device is connected to the DUT. Radius server and Ixia port should be connected
and configured with the DUT.
HOST--------DUT-----RADIUS
|
Ixia Port
Description:
The test would configure the DUT with appropriate commands required to enable 802.1x port
based functionality and verify interoperability when spanning tree is enabled.
5 18/2/2019
Attachments:
HPN#108818 - Enabling 802.1x on a port causes the switch CPU to significantly elevate when
frames hit a STP blocked port..msg
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
90780
6 18/2/2019
Steps :
Step Name Description Expected Result
Erase DUT previous configurations, DUT# show running-config
Step 1 please don't connect any devices to
DUT yet.
should display default config.
7 18/2/2019
Step Name Description Expected Result
interface all client-status
* show aaa authentication port-
access interface all client-status
Objective:
Verify that 802.1x (Port Based Network Access) and MAC Address based network Access works simultaneously on the
same port. Verify also that the client is authenticated and the mac-address still appear in the mac-address table, also
check that After 802.1x has been enabled and disabled if 802.1x config values are changed, such as client-limit and auth-
vid, the 802 .1x will not reload the new config values when re-enabled.
Requirements:
- Device Under Test
- Radius Server (IAS or Freeradius)
- Supplicants which can be other switches or software installed on operating systems (OpenX, Windows default
supplicant), wpa_supplicant in linux.
-DHCP Server (optional)
Topology:
8 18/2/2019
Supplicant--------------DUT----------------Radius Server
Test Setups:
1. Enable 802.1x Port Based
2. Disable 802.1x Port Based
3. Configure 802.1x specific settings
4. Enable 802.1x Port Based again
5. Verify that 802.1x loaded new settings
6. Verify the mac-address still appear in the mac-address table
Description:
This test will refer to the topology depicted in the attachment file.
When port access is configured on the switches,'show port-access authenticator <port#> client' output shows that the
client is authenticated and the mac-address still appear in the mac-address table. After 802.1x has been enabled and
disabled if 802.1x config values are changed, such as client-limit and auth-vid, the 802 .1x should reload the new settings
values when re-enabled.
Attachments:
122837_Topology.jpg
References:
Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl): www.procurve.com <http://www.procurve.com>
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
102283
9 18/2/2019
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 122837
Test: BP Filter: HPE
Test: GUID: ALMTP157C158616
10 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 - Topology Connect topology depicted in 1. Erase should be successful
the attachment file and DUT should have Default
1. Erase switch configuration config
and reboot. - (config)# erase startup-
2. Check all the ports are up config
use "show interface brie" and 2. Connection should be
"show running config" successful and both the ports
commands. should be up
- (config)# show running-
config
Step 2- Radius Server Configure the commands Switch should accept the
listed below. configuration and should be
Configuration displayed with the commands
Example: listed below.
- (config)# show radius
(config)# radius-server host
<ip address> key <key>
11 18/2/2019
Step Name Description Expected Result
Check actual configuration.
- (config)# show port-access
authenticator <PORT-LIST>
LIST, a VLAN-ID,
Verify that DUT can display MAC Verify the mac-address still appear in
Step 10 - Display Mac- addresses learned once again on a the mac-address table
Address learned authenticated port, a PORT-LIST, a
VLAN-ID,
Save the configuration and reboot No crashes must be occur, verify the
Step 11 - Reboot DUT the DUT. Repeat steps 5 and 6. actual running configuration, the
Example: mac-address client appears in the
(config)# write memory mac-address table once is
(config)# boot system primary authenticated again.
12 18/2/2019
1.1.1.1.1.1.1.3. Test: Test Name : 802.1x_CLCA_134114_MAC-
auth_with_mixed_mode
Test: Test ID :158617
Test: Subject : CFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description : Defect:
134114 - Switch seems to successfully authenticating an 802.1x client and shows that the client has been placed into the
correct VLAN but is not allowing any ingress traffic from that authenticated client
Objective:
This test case verifies the correct authentication using 802.1x and mac-auth methods on the same port while the mixed-
mode authentication is enabled. The client once authenticated should be placed into the correct VLAN and it should be
able to reach the DUT.
Requirements:
- Radius server / DHCP server
- Host/PC/Switch as supplicant
- DUT
Test Setup:
This test case will refer to the topology attached to Step 1. Have a Radius server configured for 802.1X and MacAuth
clients. Connect a client to the switch.
Topology:
Supplicant-----Hub---------DUT----------------Radius Server
and Ixia
Description:
Using 802.1x and mac-auth methods on the same port while the mixed-mode authentication is enabled, the client once
authenticated should be placed into the correct VLAN and it should be able to reach the DUT. All traffic from that client
authenticated should be allowed through DUT.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
102333
13 18/2/2019
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xCLCA/802dot1x_CLCA_MacAuthWithMixed
Mode.tcl
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : CFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 134114
Test: BP Filter: HPE
Test: GUID: ALMTP157C158617
14 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 Connect the TEST setup as
described in the
134114_TOPOLOGY.jpg
diagram
15 18/2/2019
Step Name Description Expected Result
Clients should be able to displayed.
communicate to other nodes in the
vlan 10.
16 18/2/2019
Step Name Description Expected Result
Objective:
This test case will verify the client will be moved to GVRP VLAN assigned from RADIUS server when having port-access
configured and after the port is disabled.
Requirements:
17 18/2/2019
- DUT
- Switch
- Radius Server
- 802.1X Client
Topology:
Supplicant--------------DUT----------------Radius Server
|
MVRP Switch
Test Setup:
Have DUT and Switch connected with GVRP enabled. Configure Radius server users to assign to GVRP VLAN.
Description:
When allowing Radius assigned GVRP VLANS, the client after authenticated will be moved to the VLAN learned via
GVRP. Despite the client being removed and connected back, the client should always be moved to the Radius GVRP
VLAN assigned.
Attachments:
106214_RADIUS_GVRP_VLANS.doc
106214_Topology.jpg
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
102840
18 18/2/2019
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 106214
Test: BP Filter: HPE
Test: GUID: ALMTP157C158619
19 18/2/2019
Steps :
Step Name Description Expected Result
Setup Connect the topology The switch should accept the
attached configuration and the same
106214_Topology.jpg should be displayed with the
show commands.
config)# radius-server host
23.0.0.218 key go4gold18
DUT(config)# aaa authentication
port-access dot1x authenticator
auth-method eap-radius
Configure DUT switch to allow port- The port will be authenticated. The
Test with Mvrp-vlans access on Mvrp vlans: client should be able to ping across
VLAN 400.
Authenticate a port so that the Verify that the DUT now advertises
Radius Server moves the port to an the vlan through MVRP to the all
existing MVRP VLAN. (VLAN 400) other connected switches.
20 18/2/2019
Step Name Description Expected Result
DUT(config)# Mvrp without any problems. We
DUT(config)# interface <ports> no
turn off all the ports in the
shut
MVRPSWITCH1(config)# erase- switches to avoid any
startup config unnoticed spanning tree loop.
wait for reboot, disable all interfaces
MVRPSWITCH(config)# MVRP
MVRPSWITCH(config)# vlan 400
MVRPSWITCH(config)# interface
<port> enable
8200 K.15.16.0012m 802.1X connection to port using PEAP can erase existing ACL for other MAC address
Objective:
This testcase verifies that when multiple clients connect to a port with uses same authentication method but different
EAPmethods, and first client is configured with a radius applied ACL and second client is not, the second client does not
get authenticated and the Radius ACL of the first client remains intact
Requirements:
Test Setup:
Attachments
Topology
21 18/2/2019
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
136695
22 18/2/2019
Steps :
Step Name Description Expected Result
Make the topology as shown in the
Topology attachment
Configure the DUT port connected to Switch should take the configuration
DUT_802.1x the hub to use 802.1x for client without any errors
authentication;
Verify the config using
config)# radius-server host
23.0.0.218 key go4gold18
DUT(config)# aaa authentication
port-access dot1x authenticator show running-config
auth-method eap-radius show config
Enable Spanning Tree and configure Switch should take the configuration
enable SPT, BPDU protection BPDU protection and admin-edge- without any errors
and admin-edge-port port
Verify using show spanning-tree
spanning tree enable
spanning-tree A2 admin-edge-port
spanning-tree A2 bpdu-protection
no spanning-tree bpdu-throttle
Configure the client 01 with eap-MD5 After the initiaization, client 01 should
Client01_Supplicant_EAP- get authenticated and the Radius
MD5 ACL should get applied
show running-config
show config
Configure the second client as The second client without radius ACL
Client02_Supplicant_PEAP 802.1x client using username as should not get authenticated and the
'steve' and password as 'procurve', ACL for the first client should remain
No radius ACL should be configured intact.
for this client.
23 18/2/2019
Step Name Description Expected Result
show running-config
show config
Repeat steps 4, 6 and 7, with clients The second client without radius ACL
Repeat using differnet ans switch configured to use below should not get authenticated and the
combinations of EAP combination
EAP-MD5 and EAP-TLS
ACL for the first client should remain
intact.
methods EAP-TLS and PEAP
show running-config
show config
2610 - R.11.107 -AP connected through 2610 switch are not 802.1x authenticated
Objective:
This testcase verifies that when an AP is connected to a port configured for 802.1x port based access with no unauth vlan
configured, authentication happens successfuly
Requirements:
24 18/2/2019
Switch,Radius server,Client(Access Point)
Test Setup:
Radius---------DUT----------AP
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
138148
25 18/2/2019
Steps :
Step Name Description Expected Result
Enable 802.1x port based Verify the config using;
Step 1_DUT Config authentication on port connected to Show run
AP
config)# radius-server host
23.0.0.218 key go4gold18
DUT(config)# aaa authentication
port-access dot1x authenticator auth-
method eap-radius
Disable and enable the link If the credentials are correct the AP
Step 3_Initiate Authentication connected to AP shoud be successfully authenticated;
from AP Verify using;
26 18/2/2019
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description : Objective:
This test case verifies the Radius accounting start packets are sometimes delayed after successful 802.1x authentication
Topology:
Radius server
|
DUT---------Dhcp Server
|
Supplicant
Test Case Description:
Validate the Radius Accounting packets get triggered correctly to the Supplicant after successful authentication.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
150027
27 18/2/2019
Test: GUID: ALMTP157C158633
Steps :
Step Name Description Expected Result
Connect Switch to the Client Client should be coonected to the
Step 1 switch
28 18/2/2019
Requirements:
One 2 member stack DUT which supports 802.1x/mac-auth
Radius server
Setup:
IP Phone<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS
Test ID: 152510
29 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the
topology shown.
Set up the radius server for Use the command show aaa
Step 3 - Setup the radius authenticating using mac-address authentication port-access
server for mac-auth credential.
Add mac-address of IP Phone to
interface all client-status to verify
the client
user database for successfully
authenticating using mac-auth. is successfully authenticated using
the mac-auth
30 18/2/2019
Step Name Description Expected Result
Reboot the switch using boot system Verify the IP Phone is successfully
Step 5 comand. authenticated using dot1x
show port-access authenticator
<port> clients detail
31 18/2/2019
Requirements:
One DUT which supports 802.1x/mac-auth
Radius server
Setup: Topology
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152511
32 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the Verify LACP trunks are up.
topology show and configure LACP show lacp
trunk between DUT and Cisco. Cisco
#sh lacp neighbor
Cisco
=====
interface Port-channel 5
description lagginterface
switchport access vlan x
interface range GigabitEthernet 0/15
- 16
description lagg-test
switchport
switchport access vlan X
channel-group 5 mode active
channel-protocol lacp
33 18/2/2019
Step Name Description Expected Result
34 18/2/2019
Test: Type : MANUAL
Test: Description : Objective: To Verify any port level parameters changes in 802.1x shouldnt affect mac
authentication and any port changes in Mac Authentication should deauth only Mac Clients, shouldnt affect 802.1x Clients
with user role attributes
Topology:
DUT----Hub-----Two Clients - 1 for 802.1x and 1 for Mac Authentication
|
Radius Server
Description:
Any configuration change done at port level that causes de-authentication of all the clients is causing MAC address to be
dropped from MAC table. This is causing VOIP phones and other devices to be deauthenticated
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
155166
35 18/2/2019
Steps :
Step Name Description Expected Result
Load the switch with image with the Verify the image is loaded
Step 1 CR 244438 fixed successfully using "show version"
Authenticate two clients using 802.1x Verify the Clients are authenticated
Step 4 and Mac Authentication successfully
Authenticate 802.1x Client with user Verify the Clients are authenticated
Step 5 role dot1x-auth-role and Mac Client successfully
using mac-auth-role
36 18/2/2019
Step Name Description Expected Result
Configure user-role parameters for
Step 7 Mac Auth user role one by one
onfigure user-role parameters for 1.Verify the 802.1x and Mac Client is
Step 8 dot1x Auth user role one by one never deauthenticated in any of the
configuration change
Step 9
37 18/2/2019
Test: Subject : CFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description : Objective: To Verify any port level parameters changes in 802.1x shouldnt affect mac
authentication and any port changes in Mac Authentication should deauth only Mac Clients, shouldnt affect 802.1x
Clients.
Topology:
DUT----Hub-----Two Clients - 1 for 802.1x and 1 for Mac
|
Radius Server
Description:
Any configuration change done at port level that causes de-authentication of all the clients is causing MAC address to be
dropped from MAC table. This is causing VOIP phones and other devices to be deauthenticated
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
155167
38 18/2/2019
Steps :
Step Name Description Expected Result
Load the switch with image with the Verify the image is loaded
Step 1 CR 244438 fixed successfully using "show version"
Authenticate two clients using 802.1x Verify the Clients are authenticated
Step 5 and Mac Authentication successfully
39 18/2/2019
Step Name Description Expected Result
1.Verify the 802.1x and Mac
Client is never
deauthenticated in
any of the configuration
change
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
155168
40 18/2/2019
Test: Automated : Not Feasible
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : CFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 245547
Test: BP Filter: HPE
Test: GUID: ALMTP157C158638
41 18/2/2019
Steps :
Step Name Description Expected Result
Load the switch with image with the Verify the image is loaded
Step 1 CR 244438 fixed successfully using "show version"
42 18/2/2019
Step Name Description Expected Result
powering on the off Mac Authentication success . Verify
the Mac Auth DUR is able correctly
Setup:
Supplicant<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
43 18/2/2019
Test: Automated : Not Feasible
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : CFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 245042
Test: BP Filter: HPE
Test: GUID: ALMTP157C166382
44 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the
topology shown.
Register certificate used for EAP-TLS Clients and servers should use
Step 3 authentication with more than 1500 configured certificate.
bytes and ensure the same is used
while authenticating clients.
45 18/2/2019
1.1.1.1.1.1.1.14. Test: Test Name :
802.1x_CLCA_211376_EAPOL_Logoff
Test: Test ID :166388
Test: Subject : CFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 22/1/2019
Test: Type : MANUAL
Test: Description : Objective:
Verify that 802.1x authentication is successful with jumbo / without jumbo enabled
Setup:
Supplicant<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
46 18/2/2019
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 211376
Test: BP Filter: HPE
Test: GUID: ALMTP157C166388
47 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 - Topology Setup Connect the devices according the Topology is setup .
topology shown.
48 18/2/2019
1.1.1.1.1.1.1.15. Test: Test Name :
802.1x_CLCA_243452_EAP_TLS_Fragmentation
Test: Test ID :169194
Test: Subject : CFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 7/2/2019
Test: Type : MANUAL
Test: Description : Objective:
Verify that 802.1x authentication is successful with jumbo / without jumbo enabled with EAP-TLS Fragmentation
Setup:
Supplicant<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
49 18/2/2019
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 243452
Test: BP Filter: HPE
Test: GUID: ALMTP157C169194
50 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the
topology shown.
Register certificate used for EAP-TLS Clients and servers should use
Step 3 authentication with more than 5000 configured certificate.
bytes and ensure the same is used
while authenticating clients.
51 18/2/2019
52 18/2/2019
1.1.1.1.1.1.2. Subject\Production\SW Development\Feature Test
Plans - Dev Handoff\802.1x\Functionality_Testing
Test List :
Requirements
Different pcs with different OS and supplicant software, pnone
DUT
RADIUS Server.
Test Setups
The setup for this tes is straight forward. The only complexity is the number of pc hosts being
attached to the DUT.
PCHosts<====>DUT<----->RADIUS server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69195
53 18/2/2019
Test: Automated : Not Feasible
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158545
54 18/2/2019
Steps :
Step Name Description Expected Result
Configure 802.1x 1. Configure DUT for 802.1x Switch should accept
port authentication. configuration and it should be
displayed by the appropriate
show commands
Reboot phone 9. Reboot the phone while pc Depending on the phone and
is connected and check
behavior the way they are connected
to the port the pc might be
disconnected from the port.
However, if the pc is not
connected through the phone
it should not be affected by
55 18/2/2019
Step Name Description Expected Result
the phone being
disconnected.
Reboot PC 10. Reboot the pc while Phone should not be affected
phone is connected and at all by pc rebooting
check behavior.
Overview
Different 802.1x supplicants with different host OS need to be tested to ensure that the DUT
works correctly with all of them. The test should cover as large a variety of Xsupplicant software
as well as the different OSes this supplicant softwares run on. This test does not need to cover
the functions of the RADIUS sever (vlan assignement, and other AVPs). It only covers the
interaction of the supplicant software with the authenticator (DUT).
Requirements
Different pcs with different OS and supplicant software
DUT
RADIUS Server.
Test Setups
The setup for this tes is straight forward. The only complexity is the number of pc hosts being
attached to the DUT.
PCHosts<====>DUT<----->RADIUS server
56 18/2/2019
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69196
57 18/2/2019
Steps :
Step Name Description Expected Result
Call Call
<1.1.802.1x_Basic_Port_Based>
Port-Based Mode Verify ports are configured for All Xsupplicants should
port-based (no client-limit). Start authenticate succesfully if
testing 802.1x supplicants of they are configured correctly
different vendors. ( Include and have the correct
combination of different credentials
supplicants authenticating on
the same ports at different times
and connecting at the same
time)
Requirements:
Equipments
1. DUT
2. Radius Server (IAS or Freeradius)
3. Supplicants which can be other switches or software installed on operating systems (OpenX,
Windows default supplicant), wpa_supplicant in linux.
Setup:
58 18/2/2019
The Supplicant device is connected to the DUT. Radius server should be connected and
configured with the DUT.
HOSTS--------DUT-----RADIUS
Description:
The test would configure the DUT with appropriate commands required to enable 802.1x port
based functionality.
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines
http://www.faqs.org/rfcs/rfc3580.html
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69198
59 18/2/2019
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 232760
Test: BP Filter: HPE
Test: GUID: ALMTP157C158548
60 18/2/2019
Steps :
Step Name Description Expected Result
Erase switch configuration using the
SETUP 1 - 802.1x Port- erase startup-config command and The switch should accept the
configuration and the same should
Based Configuration reboot. Once the DUT has rebooted
configure the commands listed below. be displayed with the command listed
You might have to modify port below in the show commands
numbers and command parameter
values to meet the requirements of the
platform and the network infrastructure
(IP address, radius key) used for
testing. * show aaa authentication port-
The following example refers to the access dot1x authenticator
test topology depicted in the attached interface all port-statistics
file * show aaa authentication port-
802_1X_BASIC_TESTTOPOLOGY.jpg access dot1x authenticator
interface all client-status
Example * show aaa authentication port-
Configured RADIUS authentication access interface all client-status
DUT(config)# vlan 23 untagged 48
DUT(config)# vlan 23 ip address
23.0.0.201/24
DUT(config)# radius-server key
somesecret
DUT(config)# radius-server host
23.0.0.216
DUT(config)# aaa authentication
port-access dot1x authenticator
auth-method eap-radius
aaa authentication port-access
auth-mode device-mode
61 18/2/2019
Test: Description : OBJECTIVE:
Requirement:
Equipments
1. DUT
2. Radius Server (IAS or Freeradius)
3. Supplicants which can be other switches or software installed on operating systems (OpenX,
Windows default supplicant).
Setup:
The Supplicant device is connected to the DUT. Radius server should be connected and
configured with the DUT.
HOSTS--------DUT-----RADIUS
Description:
The test would configure the DUT with appropriate commands required to enable 802.1x user
mode functionality. The test case works on K.13, K.14 and K.15 but fails on Lager.
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines
http://www.faqs.org/rfcs/rfc3580.html
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69199
62 18/2/2019
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158549
63 18/2/2019
Steps :
Step Name Description Expected Result
switch should accept the
User mode Configuration Erase switch configuration using the configuration and should be
erase startup-config command and displayed with the commands listed
reboot. Once the DUT has rebooted below.
configure the commands listed
below. You might have to modify port show running-config
numbers and command parameter show config
values to meet the requirements of * show aaa authentication port-
the platform and the network access dot1x authenticator
infrastructure (IP address, radius interface all port-statistics
key) used for testing. * show aaa authentication port-
access dot1x authenticator
Example interface all client-status
* show aaa authentication port-
(config)# radius-server host access interface all client-status
23.0.0.218 key go4gold18
Verify Functionality Configure the RADIUS server The client should authenticate
with the appropriate correctly if the right
username/password for a credentials are used and the
simple access accept (no port should become
vlan assigned attributes), and authenticated.
authetnicate a client pc using
any 802.1x supplicant
64 18/2/2019
Step Name Description Expected Result
software
Requirements:
A single DUT (Device Under Test) should suffice to cover the simpler cases of this test.
Setup:
This test requires only the DUT
Description:
802.1x authenticator configuration should be presistent accross reboots if they have been saved
to the startup-config (write mem). The test should test for scenarios where ports have been
configured and the configuration has been saved to memory. After that, if anything causes the
device under test to reboot, the configuration on the ports should be the same as the one which
was saved to flash.
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69204
65 18/2/2019
Test: Automated : Yes
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xBasicFunctionality/802dot1xAuthValHeldOve
rReboot.tcl
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158554
66 18/2/2019
Steps :
Step Name Description Expected Result
Enable 802.1x authenticator The values should be the same as before the reboot.
Reboot after on port 1, . Use CLI to Show commands
configuration change following
parameters:
### Show information related to 802.1X ports
#### Syntax
switch# configure terminal `show aaa authentication port-access dot1x authenticator
switch(config)# interface interface <interface-name | all> port-statistics`
1/1/1 | Token | Help
switch(config-if)# aaa string
authentication port-access |
dot1x authenticator |---------------------|------------------------------------------------------
switch(config-if-dot1x-auth)# -----------------------------------------|
enable | show | Show running system
switch(config-if-dot1x- information |
auth)#cached-reauth | aaa | Authentication, Authorization and
switch(config-if-dot1x- Accounting |
auth)#cached-reauth-period | authentication | Show AAA authentication
30 information |
switch(config-if-dot1x- | port-access | Show Port Access
auth)#max-retries 3 information. |
switch(config-if-dot1x- | dot1x | Show 802.1X
auth)#quiet-period 30 information. |
switch(config-if-dot1x- | authenticator | Show 802.1X authenticator
auth)#reauth information. |
switch(config-if-dot1x- | interface | Show 802.1X information for
auth)#reauth-period 50 interface. |
switch(config-if-dot1x- | port-statistics | Show 802.1X statistics for
auth)#discovery-period 50 interface. |
switch(config-if-dot1x-
auth)#eapol-timeout 40
switch(config-if-dot1x-
auth)#max-eapol-requests 5
switch(config-if-dot1x-
auth)#authorized
switch(config-if-dot1x-
auth)#exit
67 18/2/2019
Test: Type : MANUAL
Test: Description :
Objective:
Test verifies authenticator session statistics are collected and displayed correctly
Requirements:
Statistics for 802.1x authenticator ports should be collected, displayed and managed (cleared)
correctly.
Setup::
HOST --------DUT-------RADIUS
Description:
Once a host is authenticated the statistics information should be dsiplayed as expected on the
switch
Attachments:
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines
http://www.faqs.org/rfcs/rfc3580.html
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69205
68 18/2/2019
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158555
69 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Verify 802.1x -Use a host with a 802.1x The 802.1x authenticator statistics are
supplicant and displayed. This can be verified by the
Statistics authenticate command
succcessfully using valid
credentials show port-access authenticator statistics
Check values after -Save configuration There should be no session statistics records
-Disconnect the pc once the switch reboots.
reboot -Reboot the switch
(reload)
-Once the switch reboots
ok look at the port-access
authenticator session
counters and statistics
70 18/2/2019
Step Name Description Expected Result
access dot1x authenticator Authenticator session statistics are displayed
interface <interface-name |
all> port-statistics`
for ports that have had or are having an open
-Log off and uplug the PC session, regardless of the port control mode
-Look at the session-counters. value during the session. All fields in output
Example command: should update correctly.
show aaa authentication port-
access dot1x authenticator
interface <interface-name |
all> port-statistics`
-Look at the statistics as well
Requirements:
1. Host PC with supplicants
2. DUT
3. Radius Servers
Setup:
HOST --------DUT-------RADIUS
Description:
The test verifies that the required EAP-Messages are exchanged between the switch and the
supplicant. The four generic EAP-Message types are EAP-Request, EAP-Response, EAP-
Success,EAP-Failure
Attachments:
REFERENCES:
71 18/2/2019
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines
http://www.faqs.org/rfcs/rfc3580.html
www.procurve.com
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69206
72 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Validate EAP-Messages 1. Connect a supplicant to the 1. Before the supplicant is
port configured as trigerred for authentication
authenticator. Start a network EAP-Request identity
analyzer on the supplicant messages will be send from
machine and observe the the switch to the supplicant.
packets. This message is trigerred at
random intervals.
3. If the authentication is
unsuccessful EAP-
Negotiation will conclude by
EAP-Failure message
Test EAP-Response Identity Authenticate the client Once the client is trigerred for
successfully with valid authentication, EAP-
packets credentials and observe it Response packets should be
with a network Analyzer send from the supplicant to
the DUT.
73 18/2/2019
Step Name Description Expected Result
Test EAP-Failure packets Authenticate the client with EAP-Negotiation should be
unsuccessfull and should be
invalid credentials and concluded by a EAP-Failure
observe the packets with a message
network analyzer
Requirements:
1. Supplicant
2. DUT
3. Radius Server
Setup
Supplicant-------------DUT-------------Radius Server
Description:
Once the supplicant authenticates on a port configured as authenticator , client status will be
authenticated. Once reauthentication is trigerred from the authenticator and invalid credentials
supplied, the supplicant is forced to authenticate , but the client status should be rejected and the
port should be blocked.
Attachments:
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines
http://www.faqs.org/rfcs/rfc3580.html
74 18/2/2019
Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69207
75 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Authenticate with valid Connect a pc with an 802.1x The authentication should
supplicant to one of the ports succeed and the client status
credentials configured as authenticator should become
and authenticate using the "Authenticated" and the port
correct credentials should be open.
Example
show port-access
authenticator clients 3
Force the authenticator port to The client status of the port should
Test Invalid Credentials on reauthenticate using the following now be Rejected-no vlan
Reauthentication command
HP-Switch(config)# interface 1/1/1 The port should be blocked by AAA.
HP-Switch(config-if)#aaa (Verify by the command log -r)
authentication port-access
reauthenticate The client should not have access to
but this time when prompted enter the any devices on the switch
the incorrect credentials on the
supplicant.
76 18/2/2019
Step Name Description Expected Result
Requirements:
-Supplicant pc or procurve switch as supplicant
-DUT Switch which supports 802.1x authentication
-RADIUS Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host/Supplicant<-------->DUT<---------->Radius Server
The example commands in this test refer to the topology diagram depicted in the file
802_1X_BASIC_TESTTOPOLOGY.jpg. However only the supplicant client connected to port 2,
and the RADIUS server need to be connected to execute this test.
77 18/2/2019
Description:
After a supplicant is successfully authenticated, and when the reauthenticate for the authenticator
port is triggered, the supplicant should be logged off and forced to re-authenticate again.
.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69228
78 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Start the ethernet sniffer software on The authenticator should send a
Reauthenticate on the the supplicant pc connected to port 2 reauthentication request to the
authenticator of the DUT (port configured as
authenticator), and start a capture.
supplicant should remove the
supplicant from the authorized clients
.
Trigger reauthentication for port 2 of The reauthentication request can be
the DUT seen in the sniffer capture.
This will be a "request-identity"
Example: packet
79 18/2/2019
1.1.1.1.1.1.2.10. Test: Test Name :
802.1x_2.12_Authenticator_Supported_EAP_Types
Test: Test ID :158582
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that all possible eap type works with the switch configured as authenticator.
Requirements:
Supplicant PC or ProCurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Test Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
The functionality of various eap protocols will be tested and verified. EAP-MD5, PEAP, EAP-TLS.
*EAP-TLS is not an option which can be selected in the supplicant software. EAP-TLS stands for:
EAP-Transport Layer Security, which is defined by rfc 5216. For the purposes of this test we can
use certificates to implement EAP-TLS. That should suffice for our test, even though EAP-TLS
can be implemented using other methods. The supplicants will have to be configured to use
certificates to authenticate to the RADIUS server. The instructions on how to setup the RADIUS
sever to accept certificates and how to distribute the certificates to the supplicants is beyond the
scope of this instructions. It is suggested that a Microsoft windows domain be set up and used to
distribute the security certificates to clients/users. The certificate facilities provided by a Microsoft
Windows domain make them easy to use by those who do not have a full understanding of how
security certificate works (private/public).
References:
ProCurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
http://h40060.www4.hp.com/procurve/uk/en/pdfs/application-notes/AN-S3_ProCurve-802.1X-
Vista-XP-final-081108.pdf
http://open1x.sourceforge.net/
http://support.microsoft.com/kb/313664
80 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69232
81 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
The supplicant should authenticate
Test EAP-MD5 Authenticate a supplicant
succesfully.
which is configured for EAP-
MD5. This can be verified by the following
commands
The supplicant can be a show aaa authentication port-
access dot1x authenticator
windows or Linux PC with
interface <interface-name | all>
supplicant software client-status [mac <mac-address>
configured or a procurve
switch which has the
supplicant configured.
Example:
82 18/2/2019
Step Name Description Expected Result
2. Windows native supplicant
can also be used for EAP-
TLS. Simply configure the
suppilcant to use
certificates.(see note below)
83 18/2/2019
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that supplicant devices can authenticate succesfully on different ports configured
as authenticator
Requirements:
Supplicant PC or procurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
This test verifies that supplicant devices once authenticated succesfully, can be removed from the
connected port and made to authenticate on another port configured as authenticator. The test
case is failing on Lager.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
http://h40060.www4.hp.com/procurve/uk/en/pdfs/application-notes/AN-S3_ProCurve-802.1X-
Vista-XP-final-081108.pdf
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69233
84 18/2/2019
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158583
85 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Supplicant Authentication Configure and authenticate The supplicant device should be
the supplicant on the authenticated and this can be verified
authenticator port. The by the following commands. The
supplicant can be provurve Auth-clients value in the command
will display the status information.
switch supplicant or Windows
/Linux PC which supports
supplicant software.
86 18/2/2019
which a successful authentication has occurred.
Requirements:
Supplicant PC or procurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
This test case will verify that the DUT is able to override a Rate Limit configuration for a port in
which a successful authentication has occurred. The DUT will apply the Rate Limit settings for the
port as configured in the freeRadius user's file, based on the HP-bandwidth-max-egress attribute.
References:
http://open1x.sourceforge.net/
http://support.microsoft.com/kb/313664
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69237
87 18/2/2019
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158584
88 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Supplicant speed-duplex Supplicant speed-duplex The port-setting should be
configuration saved. This can be verified by
configuration the command
Configure the supplicant port
for 1000 Mbps link. The
supplicant can be a procurve This can be verified by the
switch which is configured as command
supplicant or a Windows or
linux PC which has the show interfaces brief
necessary supplicant
software Status and Counters - Port
Status
Example:
| Intrusion MDI Flow Bcast
(config)# interface 4 Port Type | Alert Enabled
(config)# speed-duplex auto- Status Mode Mode Ctrl Limit
1000 ------ --------- + --------- ------- ---
--- ---------- ----- ----- ------
1 100/1000T | No Yes Down
1000FDx MDIX off 0
2 100/1000T | No Yes Down
1000FDx MDIX off 0
3 100/1000T | No Yes Down
1000FDx Auto off 0
4 100/1000T | No Yes Down
1000FDx Auto off 0
5 100/1000T | No Yes Down
1000FDx Auto off 0
6 100/1000T | No Yes Down
1000FDx Auto off 0
7 100/1000T | No Yes Down
1000FDx Auto off 0
8 100/1000T | No Yes Down
1000FDx Auto off 0
9 100/1000T | No Yes Down
1000FDx Auto off 0
10 100/1000T | No Yes Down
1000FDx Auto off 0
11 100/1000T | No Yes Down
1000FDx Auto off 0
12 100/1000T | No Yes Down
1000FDx Auto off 0
13 100/1000T | No Yes Down
1000FDx Auto off 0
14 100/1000T | No Yes Down
1000FDx Auto off 0
15 100/1000T | No Yes Down
1000FDx Auto off 0
89 18/2/2019
Step Name Description Expected Result
16 100/1000T | No Yes Down
1000FDx Auto off 0
17 100/1000T | No Yes Down
1000FDx Auto off 0
18 100/1000T | No Yes Down
1000FDx Auto off 0
90 18/2/2019
Requirements:
Supplicant PC or procurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
This test case will verify that the DUT is able to override a Rate Limit configuration for a port in
which a successful authentication has occurred. The DUT will apply the Rate Limit settings for the
port as configured in the configured RADIUS user account, based on the HP-bandwidth-max-
ingress attribute.
References:
http://open1x.sourceforge.net/
http://support.microsoft.com/kb/313664
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69238
91 18/2/2019
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 211800
Test: BP Filter: HPE
Test: GUID: ALMTP157C158585
92 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Supplicant speed-duplex Configure the supplicant port The port-setting should be
for 1000 Mbps link. The saved. This can be verified by
configuration supplicant can be a procurve the command
switch which is configured as
supplicant or a Windows or
linux PC which has the This can be verified by the
necessary supplicant command
software
show interfaces brief
Example:
Status and Counters - Port
(config)# interface 4 Status
(config)# speed-duplex auto-
1000 | Intrusion MDI Flow Bcast
Port Type | Alert Enabled
Status Mode Mode Ctrl Limit
------ --------- + --------- ------- ---
--- ---------- ----- ----- ------
1 100/1000T | No Yes Down
1000FDx MDIX off 0
2 100/1000T | No Yes Down
1000FDx MDIX off 0
3 100/1000T | No Yes Down
1000FDx Auto off 0
4 100/1000T | No Yes Down
1000FDx Auto off 0
5 100/1000T | No Yes Down
1000FDx Auto off 0
6 100/1000T | No Yes Down
1000FDx Auto off 0
7 100/1000T | No Yes Down
1000FDx Auto off 0
8 100/1000T | No Yes Down
1000FDx Auto off 0
9 100/1000T | No Yes Down
1000FDx Auto off 0
10 100/1000T | No Yes Down
1000FDx Auto off 0
11 100/1000T | No Yes Down
1000FDx Auto off 0
12 100/1000T | No Yes Down
1000FDx Auto off 0
13 100/1000T | No Yes Down
1000FDx Auto off 0
14 100/1000T | No Yes Down
1000FDx Auto off 0
15 100/1000T | No Yes Down
1000FDx Auto off 0
93 18/2/2019
Step Name Description Expected Result
16 100/1000T | No Yes Down
1000FDx Auto off 0
17 100/1000T | No Yes Down
1000FDx Auto off 0
18 100/1000T | No Yes Down
1000FDx Auto off
Requirements:
DUT - Device Under Test is a switch which supports the cached-rauth configuration for port-access authentication.
Setup:
Singe DUT - This test only tests configuration, not functionality
Description:
Test is inteded to verify you can configure all the parameters of cached re-autnetication for 802.1x port-access via the
CLI.
94 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69241
95 18/2/2019
Steps :
Step Name Description Expected Result
Use the CLI to verify that you can * show aaa authentication port-
Configure 802.1x port-access configure the 802.1x port-access access dot1x authenticator
authentication authentication to use cached-
reauthentication, for all possible
interface all port-statistics
* show aaa authentication port-
authentication methods. Also test access dot1x authenticator
that using the "?" displays the interface all client-status
cached-reauth option were * show aaa authentication port-
appropriate and the necessary access interface all client-status
parameters.
Then leave the 802.1x port-access
authentication as eap-radius cached-
reauth
Exmaple:
96 18/2/2019
Step Name Description Expected Result
- [Configure discovery
period on a port](#configure-
discovery-period-on-a-port)
- [Configure EAPOL
timeout on a port](#configure-
eapol-timeout-on-a-port)
- [Configure maximum
EAPOL requests on a
port](#configure-maximum-eapol-
requests-on-a-port)
Requirements:
DUT - Device Under Test is a switch which supports the cached-rauth configuration for port-access authentication.
SNMP workstationg - PC with snmp software which wil be used to set/read OIDs on the DUT
Setup:
Topology:
Supplicant--------------DUT----------------Radius Server.
Description:
Test is inteded to verify you can configure all the parameters of cached re-autnetication for 802.1x port-access via the
CLI. The following commands must be tested:
DUT(config)# aaa authentication port-access eap-radius ?
DUT(config)# aaa authentication port-access eap-radius cached-reauth
97 18/2/2019
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69243
98 18/2/2019
Steps :
Step Name Description Expected Result
Call <802.1x 1.01
Call Basic_User_Mode>
Example.
DUT(config)# boot system primary
System will be rebooted from primary
image. Do you want to continue
[y/n]? y
Do you want to save current
configuration [y/n/^C]?y
TFTP transfer Transfer config off switch via The configuration should be
tftp transferred to and from the
Erase startup config and tftp server successfully. After
reboot downloading the configuration
Reload config from tftp to from the server the dut should
switch startup config. reboot and the configuration
should be the same which
was originally uploaded to the
tftp server.
99 18/2/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that the session-id used by the RADIUS process in the Device Under Test (DUT)
is unique even after the device is rebooted.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
The example commands refer to the topology diagram in the file
802_1X_BASIC_TESTTOPOLOGY.jpg. However, only one supplicant and a radius servers need
to be connected to the DUT (Device Under Test).
Description:
The test verifies that the radius session id's for the user changes after DUT reboot. The DUT
configured Access-request packet to the radius server with a unique session ID. After DUT reboot
, the access-request packets are send with a different session ID.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
www.microsoft.com
www.freeradius.org
Requirements:
The requirements for this test case are:
<list as bulleted items using a "-" for each bullet of the equipment needed, software versions
required, traffic tools, etc.>
Setup:
<Describe the topologies and equipment needed to perform this test case. This includes, but is
not limited to:
· Topology diagram (include as an attachment in the first step)
· Infrastructure setup: clients, servers, Ixia, etc.
· 3rd party devices>
Description:
The session ID sent to RADIUS server should be safe against the switch reboot (it should be
unique even after reboot).
Freeradius
radius -Xyz
look for Acct-Unique-session-ID = "##"
Aegis
Acct-session-ID : ##
Attachments:
100 18/2/2019
<Describe the attachments found with this test case. List them appropriately in Setup or
Description, and under this heading>
. Topology Diagram - Step 1 Attachment
. Wiring detail - Attachment Tab
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69246
101 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Leave the DUT in port-based mode (no
STEP 1 - Port-Base and client-limit), connect more than one client
The session-ids used for
each one of the hosts
unique session-id to a single port (use L1-HUB on port 1 in
our example), and after successfully (clients) connected to the
authenticating one of the clients, same port should be unique.
reauthenticate the same client several
times. Verify that the session-ids used
each time are unique. You can use a
traffic analyzer on the RADIUS server to
look at the RADIUS requests.
Acct-Session-Id = "009900000001"
STEP 2 - Use-Mode and Configure the switch for Use- The session-ids used for
Mode authentication (client-limit),
unique session-id connect more than one client to each one of the hosts
a single port (use L1-HUB on (clients) connected to the
port 1 in our example), and verify
that the session-ids for each same port should be unique.
client are unique. You can use a
traffic analyzer on the RADIUS
server to look at the RADIUS
requests.
STEP 3 - Reboot and unique Configure the switch for Use- The session-ids used for
Mode authentication (client-limit), each one of the hosts
session-id connect more than one client to (clients) connected to the
a single port (use L1-HUB on same port should be unique,
port 1 in our example), and verify even after the switch has
that the session-ids for each rebooted.
client are unique. Reboot the
switch and when the switch
finishes rebooting reauthenticate
the clients again. Verify that the
session-ids are unique even
across reboots. You can use a
traffic analyzer on the RADIUS
server to look at the RADIUS
requests.
102 18/2/2019
1.1.1.1.1.1.2.17. Test: Test Name :
802.1x_2.46_Port_Based_Mode_Values_Held_Over_Reboot
Test: Test ID :158593
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
Requirements:
Test Setup:
Topology:
Supplicant--------------DUT----------------Radius Server
Description:
The test verifies that the configuration after saving, is persistant after DUT reboot. The test case fails on Lager.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69247
103 18/2/2019
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xBasicFunctionality/802dot1xPtBasedMdValH
ldOvReboot.tcl
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158593
104 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
STEP 1 - DUT reload Reboot the DUT by using the After the DUT reboots the
reload command. (Make sure configuration should remain
you have configure the persistent. This can be
correct default-startup with verified by the command
the default-startup
command). Save the show running-config
configuration when asked to
do so
Example
DUT# reload
System will be rebooted from
secondary image. Do you
want to continue [y/n]? y
Do you want to save current
configuration [y/n/^C]? y
STEP 2 - DUT reboot Reboot the DUT by using the After the DUT reboots the
appropriate boot system
command configuration should remain
persistent. This can be
Example verified by the command
105 18/2/2019
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verify that the DUT provides the MS-RAS-Vendor Attribute for all radius access request and accounting-request
packets.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
The example commands refer to the topology diagram in the file 802_1X_BASIC_TESTTOPOLOGY.jpg. However, only
one supplicant and a radius servers need to be connected to the DUT (Device Under Test).
Description:
This test verify that the DUT provides the MS-RAS-Vendor Attribute for all access request and accounting-request
packets. The NAS/DUT will apply the MS-RAS-Vendor Attribute and assign the attribute to vendor id 14823.The purpose
of the MS-RAS-Vendor Attribute is to provide the RADIUS server with an attribute that can uniquely identify the vendor
type of NAS that supplied the request.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69256
106 18/2/2019
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158602
107 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
MS-RAS -Vendor attribute should only be present in the Access-
STEP 1 - Configure a packet
Request packet with value 14823:
analyzer on the port
Supplicant on which the radius Example:
Authentication server is connected
on the DUT. Access-Request packet from host 10.1.1.51 port 1812, id=66,
length=358
Authenticate the
supplicant. The Framed-MTU = 1480
supplicant can be a NAS-IP-Address = 10.1.1.51
workstation with NAS-Identifier = "ProCurve Switch 3500yl-24G"
User-Name = "steve"
supplicant software Service-Type = Framed-User
installed or switch Framed-Protocol = PPP
with the supplicant NAS-Port = 1
feature. Observe the NAS-Port-Type = Ethernet
NAS-Port-Id = "1"
Access-Request, Called-Station-Id = "00-1c-2e-96-b9-c0"
Access-Challenge Calling-Station-Id = "00-1b-78-ab-9f-90"
and Access-Accept Connect-Info = "CONNECT Ethernet 1000Mbps Full duplex"
Packets generated Tunnel-Type:0 = VLAN
Tunnel-Medium-Type:0 = IEEE-802
from the DUT to the
Tunnel-Private-Group-Id:0 = "1"
server State = 0x2692ca0a2696ceef91030f47ae0401e4
EAP-Message =
0x0204001b0410afa64d7e46f034250da7256fb74f4ba97374657665
Message-Authenticator = 0x06a05d30a6beea6b2c09f85c95fd701b
MS-RAS-Vendor = 14823
HP-Attr-255 = 0x011a0000000b28
HP-Attr-255 = 0x011a0000000b2e
HP-Attr-255 = 0x011a0000000b3d
HP-Attr-255 = 0x0138
HP-Attr-255 = 0x013a
HP-Attr-255 = 0x0140
HP-Attr-255 = 0x0141
HP-Attr-255 = 0x0151
108 18/2/2019
Step Name Description Expected Result
from the DUT to the Acct-Session-Id = "012900000052"
Acct-Status-Type = Start
radius server
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 14823
Acct-Delay-Time = 0
This test verifies that when the reply-message attribute is configured for the user in the radius
server the message is not transmitted to the user in the form of EAP-Notify message.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
The test verifies that after a succesful user authentication, if the reply-message attribute is
included in the access-accept message the message is not transmitted to the user in the form of
EAP-Notify messages.
109 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69259
110 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
SETUP - Configure Configure reply-message The radius server configuration should be
attribute for the user in saved.
user in radius the radius server. The
configuration would vary
based on the flavor of
radius which is used.
Example:
myuser User-Password
=="mypass"
Tunnel-Medium-type=6,
Tunnel-Type =VLAN,
Reply-Message= "hello"
111 18/2/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that the Radius access-request packets contains the Message-authenticator
attribute.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
Radius Access -request from the DUT should contain the Message - Authenticator attribute. In
procurve switches, this field is available by default.
References:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69260
112 18/2/2019
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158606
113 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Step 2 - Supplicant Configure a packet analyzer The Radius Access-Request
on the radius server or mirror packet should contain the
authentication the port on the switch on Message-authenticator
which the radius server is attribute
connected . Authenticate the
supplicant. Observe the
Radius-Access request
packets The supplicant can
be a workstation with the
supplicant software or it can
be a switch with the
supplicant feature.
114 18/2/2019
1.1.1.1.1.1.2.21. Test: Test Name :
802.1x_2.63_RADIUS_Proxy_Server
Test: Test ID :158607
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description : Objective:
This test verifies that the DUT works as expected when a radius proxy is configured
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
The DUT should be able to send and recieve radius packets in a radius proxy environment.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69261
115 18/2/2019
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158607
116 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
SETUP - Configure Radius Configure a radius proxy The radius proxy
server and a valid radius configuration should be saved
proxy server. The proxy succesfully
configuration would vary
based on the flavor of radius
deployed and would be
available in the respective
websites.
117 18/2/2019
1.1.1.1.1.1.2.22. Test: Test Name :
802.1x_2.64_RADIUS_Server__Redundancy
Test: Test ID :158608
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
Tests verifies that when the switch is configured as an 802.1x NAS using RADIUS authentication,
backup RADIUS servers are used if the primary server is not available. It also tests the
functionality of the dead-time parameter.
Requirements:
- DUT: Device Under Test is a switch capable of acting as and 802.1x NA (authenticator) and
RADIUS as the port-access authentication method.
- SERVERS: 3 x RADIUS servers to be used as primary and two backup authentication servers.
Setup:
Supplicant PC <---->DUT <===> 3x RADIUS servers
Description:
When more than one RADIUS server is configured in the DUT, and port-access authentication is
set to use RADIUS, the DUT will attempt to authenticate against each server in the order they
were entered (and are displayed by the show radius command). If a server is not reachable it
will time out, and the DUT will move down to the next server to try and authenticate.
The DUT will make its way down the list of servers until there is not more to try. If the last server
is reached and timeout occurs authentication should fail.
The radius parameter dead-time is the time the DUT will place a RADIUS server in the "dead"
state. During this period of time the server will not try to authenticate using the timed out server
for any authentication requests. After the dead-time has expired the DUT will once again try to
reauthenticate against the server. If the server times out once again, the cycle will repeat.
*NOTE: the timeout values for 802.1x authenticator and radius server timeouts should be
configured such that the radius server times out *before* the authenticator times out.
Attachments:
118 18/2/2019
Requirements:
Basic authenticator tests do not fail, if there are several RADIUS servers configured and first
server in the list is unreachable (timeouts should be set appropriately).
Setup:
Radius-server dead-time 5
· Ensure authentication from Server 2
· Reconnect server 1
· Wait ~ 5 minutes
· Ensure next authentication is from server 1.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69262
119 18/2/2019
Test: GUID: ALMTP157C158608
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Connect two more RADIUS servers The new RADIUS servers should be
Step 2 - Configure Backup to the DUT and make the appropriate displayed in the order you entered
RADIUS Servers configuration changes so the DUT
can reach them.
them with NO encryption key listed.
Example:
In our example we connect two more DUT(config)# show radius
RADIUS servers to ports 46 and 47
of the DUT and assigned them ip
addresses in the same range as the
primary RADIUS server. The new
radius servers will use the global
encryption key
Example:
Physically connect the two servers to
ports 46 and 47
DUT(config)# radius-server host
23.0.0.217
DUT(config)# radius-server host
23.0.0.218
Step 3 - Test first server Configure the correct timeout After the timeout time the port
settings. shoudl become authenticated
backup by the second server in the
Make the primary radius list
server (first in list) become
unavilable.
Try to authenticate.
Step 4 - Test second server Configure the correct timeout After 2 times the timeout time
settings. the port should become
backup authenticated by the third
Make the primary and server server in the list
secondary radius server (first
and second in list) become
unavailable.
Try to authenticate.
120 18/2/2019
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test case verifies that if an authenticated 802.1x supplicant moves to another port without
bringing the link down it is still required to authenticate on the new port.
Requirements:
- DUT. Device Under Test capable of acting as an 802.1x NAS (authenticator)
- RADIUS Server.
- 2 x L1 HUBs: L1 hubs which will be used to connect/disconnect pcs to DUT without bringing link
down.
- 2 x Hosts with 802.1x supplicant software.
Setup:
2 PCs<------------->(2 x L1 HUB) <----->(DUT)<--------->RADIUS SERVER
Description:
When the DUT is configured as an 802.1x NAS (authenticator), and device authenticates on ones
of its ports using 802.1x supplicant, the device should not be allowed to physically move to
another port without having to reauthenticate. This is easily accomplished if the device is directly
connected to the DUT because the loss of link will be detected by the DUT and the client will be
"deauthenticated". However, when the link is not loss, as is the case of a device connected to the
DUT through a HUB, the DUT will not detect a link loss and will not be "aware" that the client is
not longer present on the port. It will only know the client has moved to another port because its
mac address (the device's) will show up in another port. If this is the case (and the DUT is not
configured to allow this), the client should have to reauthenticate again., AND the client should
become "unauthenticated" in the original port.
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69265
121 18/2/2019
Test: Automated : Yes
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xBasicFunctionality/802dot1xAuthenticatorPor
tHopping.tcl
Test: Automation Progress : 4 - Released to Production
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158609
122 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
After configuring user-mode and
STEP 1 - Test User mode Configure user-mode and test
supplying the correct credentials, the
that PC1 can authenticate on
Authentication port 1 of the DUT using
mac address used by PC1 should be
allowed access to the network. I.e. it
supplicant software and the is authenticated through 802.1x.
correct credentials Example:
Requirements:
- 802.1x supplicant pc
- Switch which supports radius and 802.1x
- Multiple RADIUS server from different vendors
123 18/2/2019
Setup:
Setup:
Supplicant PC <---->DUT <===> x RADIUS servers
Description:
Devices under test (DUTs) which support RADIUS as one of the authentication methods for
802.1x port-access should exhibit no dependency on the vendor of the RADIUS server software
used. This should be true as long as such software adheres to the appropriate RFCs. The test
should attempt to execute this test using as many different RADIUS vendors as deemed
appropriate at the time. The same 802.1x supplicant should be used in all tests to eliminate any
issues which arise due to the supplicant/RADIUS server combination, because the goal of the
test is to verify the DUT/RADIUS interaction not the supplicant/RADIUS interaction.
Summary
Overview
Devices Under Test (DUTs) which support RADIUS as one of the authentication methods use by
ports configured to act as 802.1x authenticators should exhibit no dependency on the vendor of
the RADIUS server software used. This should be true as long as such software adheres to the
appropriate RFCs. The test should attempt to execute this test using as many different RADIUS
vendors as deemed appropriate at the time. The same 802.1x supplicant should be used in all
tests to eliminate any issues which arise due to the supplicant/RADIUS server combination,
because the goal of the test is to verify the DUT/RADIUS interaction not the supplicant/RADIUS
interaction.
References:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage
Guidelines, http://www.faqs.org/rfcs/rfc3580.html
Requirements
PC with 802.1x supplicant
DUT which supports 802.1x port-access control and RADIUS authentication
RADIUS server software from different vendors.
Test Setups
PC w/supplicant <----------->DUT<--------------->RADIUS server
124 18/2/2019
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69266
125 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure each one of the different
Step 2 - Test Backup Server vendor RADIUS severs as primary
and backup authentication servers,
and verify that each one of them will
take over as backp if the primary if
the other ones are not available.
For example, we will use three
servers of different vendors:
23.0.0.216 CPPM 2003
23.0.0.221 CiscoISE 2008
23.0.0.211 freeradius
DUT
Requirements:
-Client PC with 802.1x supplicant software
-Device under Test which supports the 802.1x authenticator configuration
-Server: RADIUS and Network Analyzer software
Setup:
PCClient<------>DUT<------>Server(Network Analyzer and RADIUS software)
126 18/2/2019
the test steps. Not all devices on the diagram are needed for the test. Only the following devices
need to be connected to the DUT: The server attached to port 48 which will be used as a
RADIUS sever AND as a network analyzer, and host PC attached to port 2 of DUT.
Description:
RFC 2865 contains a list of AVPs should might be sent by the device under test when
communicating with a RADIUS server during the 802.1x authentication process. This test
particular looks at the avps which should be included in the Access-Request packet. The tester
should verify that all the mandatory AVPs are present.
Attachments:
RFC 2685 - Remote Authentication Dial In User Service (RADIUS)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69267
127 18/2/2019
Test: GUID: ALMTP157C158611
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure switch for port-access
STEP 1 - Test Port-Based authentication through radius using
The following AVPS should
be present in the Access-
EAP eap
Enable the network analyzer on the Request packet from the NAS
RADIUS server so it will capture the (DUT). *consult rfc2865 for
appropriate RADIUS packets expected values. Look for
Authenticate an 802.1x supplicant
connected to port 2 and capture the
missing or incorrect values,
Access-Request RADIUS packets like the MTU being too large
between the switch (NAS) and the (not what the switch is
RADIUS server configured to), etc..
Consult RFC-2865 section
4.1 for a more detail
description of access-request
packets (see attached
document)
Framed-MUT(12): 1480
NAS-IP-Address(4): 1.1.1.1
NAS-Identifier(32):
NAShostname
User-Name(1): procurve
Service-Type(6): Framed-
User(2)
Framed-Protocol(7): PPP(1)
NAS-port(5): 25
NAS-Port-Type(61):
Ethernet(15)
NAS-Port-Id(87): B1
Called-Station-Id(30): 00-17-
a4-c7-4f-00
Calling-Station-Id(31): 00-0e-
7f-08-e9-00
Connect-Info(77_ CONNECT
Ethenet 100Mbps Full duplex
Tunnel-Type(64) Tag=0x00:
VLAN (13)
Tunnel-Medium-Type(65)
Tag=0x00: IEEE-802(6)
Tunnel-Private-Group-Id(81):
300
EAP-Message(79) Last
Segment[1]
Etc...
128 18/2/2019
1.1.1.1.1.1.2.26. Test: Test Name : 802.1x_6.4
Phone_PC_Hoping_Move
Test: Test ID :158613
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description : Objective
This test will verify that 802.1x authentication works correctly when PC connected in tandem to
phone on the same prot is hoping from one phone to another (i.e. pc through phone1 moves to
phone2)
Overview
Different 802.1x supplicants with different host OS need to be tested to ensure that the DUT
works correctly with all of them. The test should cover as large a variety of Xsupplicant software
as well as the different OSes this supplicant softwares run on. This test does not need to cover
the functions of the RADIUS sever (vlan assignement, and other AVPs). It only covers the
interaction of the supplicant software with the authenticator (DUT).
Requirements
Different pcs with different OS and supplicant software, pnone
DUT
RADIUS Server.
Test Setups
The setup for this tes is straight forward. The only complexity is the number of pc hosts being
attached to the DUT.
PCHosts<====>DUT<----->RADIUS server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69269
129 18/2/2019
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158613
130 18/2/2019
Steps :
Step Name Description Expected Result
Configure 802.1x 1. Configure DUT for 802.1x Switch should accept
port authentication on 2 ports configuration and it should be
displayed by the appropriate
show commands
131 18/2/2019
1.1.1.1.1.1.2.27. Test: Test Name :
802.1x_2.14_RADIUS_Assigned_CoS
Test: Test ID :158620
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that after a successfull 8021x authentication , DUT is correctly applying the Radius assigned CoS
settingson to authenticated port.
Requirements:
DUT Switch which supports 802.1x authentication
Supplicant PC or procurve switch as supplicant
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as 802.1x authenticator on
the DUT.
Topology:
Supplicant--------------DUT----------------Radius Server
Description:
The user file in radius server will contain the COS values. Once a user is successfully authenticated the COS values will
be apppied for the port on the DUT.
*The COS in HP switch is an attribute with the following RADIUS definitions.
VENDOR 11
attribute 40
attribute type string
If you are using FREERADIUS you can just include the attached dictionary.hp file in the dictionary files of your freeradius
server.
Use the attached file " AdditionsToRADIUSusersfile.txt " to configure CoS value within the radius users file.
If you are using Microsoft IAS or NPS, please consult the respective manuals on how to add a vendor attribute with the
values listed above.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
104458
132 18/2/2019
Test: Automated : Yes
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xBasicFunctionality/802dot1x_RadiusAssigne
dCoS.tcl
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158620
133 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
1)CoS value is set on the Radius
Step-2 Supplicant 1)Configure the RADIUS
server.
server to send back CoS
authentication values in the access-accept 2)The supplicant is successfully
packets to set the CoS value authenticated and the Radius
to 77777777. assigned CoS value is assigned to
authenticated port correctly by DUT.
Consult the manual of your Verify using the CLI
RADIUS server on how to do show aaa authentication port-
this. access dot1x authenticator
interface all port-statistics
See note below. * show aaa authentication port-
access dot1x authenticator
2)Successfully authenticate interface all client-status
the supplicant on the port * show aaa authentication port-
access interface all client-status
configured as authenticator.
Step 3 Verify CoS Connect a IXIA port to DUT Captuered packet displays
as tagged port to receive the CoS value same as
traffic send from radius assigned CoS value.
authenticated client.
134 18/2/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test case will verify that the DUT is able to override the existing VLAN configuration for a port
in which a successful authentication takes place against a RADIUS server and the server sends
back the Egress-VLAN-Name attribute.
Requirements:
Supplicant PC or procurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
This test case will check the functionality of the Egress-VLAN-Name attribute, without and in
conjunction with the Tunnel-Private-Group-ID attribute. Use of the Egress-VLAN-Name should
provide a means for assigning tagged VLAN ids for traffic leaving the port. In cases where the
ingress and egress VLANs are the same, then the Tunnel-Private-Group ID must be used, as the
Egress-VLAN-Name will ONLY configure the egress VLAN.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
104459
135 18/2/2019
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158621
136 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Step-2 Configure VLAN name Configure VLAN on the DUT Verify VLAN name is
displayed on DUT using CLI
on DUT Example:
show running-config
(config)# VLAN 200 show vlan
137 18/2/2019
Step Name Description Expected Result
show port-access
138 18/2/2019
Step Name Description Expected Result
authenticator
show vlan 200
Step 5 Radius VLAN not Configure the RADIUS server Authentication fails as vlan is
to send back the tagged not present in DUT with
configuered on switch Egress-VLAN-Name to the appropriate error message.
switch which is not present on
DUT show log -r
Requirements:
Supplicant PC or procurve switch as supplicant
DUT Switch which supports 802.1x authentication
Radius Server
Setup:
The host or the switch (configured as supplicant ) should be connected to the port configured as
802.1x authenticator on the DUT.
Host<-------->DUT<-------------->Radius Server
Description:
This test case will provide instructions for testing the Egress-VLANID attribute, without and in
conjunction with the Tunnel-Private-Group-ID attribute. Use of the Egress-VLANID should provide
a means for assigning tagged VLAN ids for traffic leaving the port. In cases where the ingress
139 18/2/2019
and egress VLANs are the same, then the Tunnel-Private-Group ID must be used, as the Egress-
VLAN-ID will ONLY configure the egress VLAN.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
104460
140 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Step-2 Configure VLAN ID Configure vlans on the DUT Vlans should be created and
this should be displayed on
on DUT Example the output of the command
141 18/2/2019
1.1.1.1.1.1.2.30. Test: Test Name : 802.1x_2.81_Cached_Re-
Authentication_Basic_Functionality
Test: Test ID :158623
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
Test verifies the basic functioaliyt of cached-reauthentication method for 802.1x port-base access.
Requirements:
1. DUT
2. Radius Server (IAS or Freeradius)
3. Supplicant PC or procurve switch as supplicant
Setup:
Topology:
Supplicant--------------DUT----------------Radius Server
Description:
Test should verify the basic functionality of the cached-reauth option for 802.1x port-access method. Cached-rauth allows
for ports which are already authenticated to reauthenticate even if the radius server is unavailable. The feature allows
already authenticated supplicants to remain authenticated while blocking new unauthenticated access.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
104467
142 18/2/2019
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 236328
Test: BP Filter: HPE
Test: GUID: ALMTP157C158623
143 18/2/2019
Steps :
Step Name Description Expected Result
Call <802.1x 1.02
Call Basic_User_Mode>
Repeat the test with different cached- 1)The DUT will not be able to
reauth-periods configured.
reach the RADIUS server.
Try to authenticate a new client
during cached-reauthentication Verify using show log -r
period
and after cached-reauthentication
timer expiry
Once the reauthentication
period in the authenticator
ports expires (15 sedonds in
144 18/2/2019
Step Name Description Expected Result
our example), the DUT will try
to reauthenticate the ports but
will not be able to reach
radius server.
Since cached-reauth is
enable the porst will remain
authenticated until the
cached-reuath-period
configured for the
authenticator ports expires
(120 secons in our example)
Once cached-reauth timer is
expired supplicant is in
un-authenticated state.
You can verify this by using
the appropriate show
commands.
Example
* show aaa authentication
port-access dot1x
authenticator interface all
port-statistics
145 18/2/2019
Step Name Description Expected Result
1)Supplicant is authenticated
Step-5 Test cached-reauth 1)Reconnect the radius
successfully again.
server and toggle the ports to
with valid credentials force an authentication.
verify using
* show aaa authentication port-
access dot1x authenticator
Wait for the ports to be interface all port-statistics
* show aaa authentication port-
succesfully authenticated access dot1x authenticator
again. interface all client-status
* show aaa authentication port-
2)Disable the RADIUS server access interface all client-status
and it is unreachable for DUT. 2)DUT tries to reauthenticate the
client once reauth-period expires and
3)After cached-reauth timer puts client into authenticated state
expires reconnect the until cached-reauth timer expires.
radius server.
3)Client is again authenticated as the
Radius server is reachable and
4)Repeat the test with correct credentials are used.
different cached-reauth-
4)Result is identical to the above
periods configured. steps.
146 18/2/2019
Step Name Description Expected Result
1)Supplicant is authenticated
TStep-6 Test cached-reauth 1)Reconnect the radius
successfully again.
server and toggle the ports to
with invalid credentials force an authentication.
verify using
* show aaa authentication port-
access dot1x authenticator
Wait for the ports to be interface all port-statistics
* show aaa authentication port-
succesfully authenticated access dot1x authenticator
again. interface all client-status
* show aaa authentication port-
2)Disable the RADIUS server access interface all client-status
and it is unreachable for DUT. 2)DUT tries to reauthenticate the
client once reauth-period expires and
3)After cached-reauth timer puts client into authenticated state
expires reconnect the until cached-reauth timer expires.
radius server. 3)Client is not authenticated as
incorrect credentials are used
4)Repeat the test with eventhough the Radius server is
different cached-reauth- reachable .
periods configured. 4)Result is identical to the above
steps.
147 18/2/2019
2.Configure cached reauth, reauth period
3. Make the radius server is not reachable
5.Try to authenticate both the clients
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149504
148 18/2/2019
Steps :
Step Name Description Expected Result
Configure dot1x auth on port with
Step1:configure dot1x reauth-period and cached-reauth-
authentication period
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication
port-access dot1x authenticator
switch(config-if-dot1x-auth)# enable
switch(config-if-dot1x-auth)#cached-
reauth
switch(config-if-dot1x-auth)#cached-
reauth-period 300
switch(config-if-dot1x-auth)#reauth
switch(config-if-dot1x-auth)#reauth-
period 50
switch(config-if-dot1x-auth)#exit
Trigger bi-directional traffic b/w dot1x Traffic flow will be successful b/w
Step 3: Initiate traffic/Ping win7 supplicant cleints
from clients
Disconnect the radius server and Client will continue to be in
Step 4: Disable radius-server check the dot1x client authenticated state and cached
reauth will start after the reauth-
period expiry
* show aaa authentication port-
access dot1x authenticator interface
all port-statistics
* show aaa authentication port-
access dot1x authenticator interface
all client-status
* show aaa authentication port-
access interface all client-status
Bringup the radius server and check Client will be authenticated during the
Step 6: Enable radius-server the dot1x client reauth-period since radius is
reachable now
* show aaa authentication port-
access dot1x authenticator
interface all port-statistics
* show aaa authentication port-
access dot1x authenticator
interface all client-status
* show aaa authentication port-
access interface all client-status
149 18/2/2019
1.1.1.1.1.1.2.32. Test: Test Name :
802.1x_Cached_Reauth_F_11_Reachable_Radius_Different_Credenti
als
Test: Test ID :164833
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 9/1/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the functionality of 802.1x cached reauth. When radius server is available during the cached reauth period
Topology:
DUT-----------Radius server
|
|
Hub-----------Win 7 Supplicant
|
|
Ixia Supplicant
Test Case Desciption:
1. Configure 802.1x authentication in the port connected to hub with user mode
2.Configure cached reauth, reauth period
3. Make the radius server is not reachable
5.Try to authenticate both the clients
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149506
150 18/2/2019
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C164833
151 18/2/2019
Steps :
Step Name Description Expected Result
Configure dot1x auth on port with
Step1:configure dot1x reauth-period and cached-reauth-
authentication period
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication
port-access dot1x authenticator
switch(config-if-dot1x-auth)# enable
switch(config-if-dot1x-auth)#cached-
reauth
switch(config-if-dot1x-auth)#cached-
reauth-period 300
switch(config-if-dot1x-auth)#reauth
switch(config-if-dot1x-auth)#reauth-
period 50
switch(config-if-dot1x-auth)#exit
Trigger bi-directional traffic b/w dot1x Traffic flow will be successful b/w
Step 3: Initiate traffic/Ping win7 supplicant cleints
from clients
Disconnect the radius server and Client will continue to be in
Step 4: Disable radius-server check the dot1x client authenticated state and cached
reauth will start after the reauth-
period expiry
* show aaa authentication port-
access dot1x authenticator interface
all port-statistics
* show aaa authentication port-
access dot1x authenticator interface
all client-status
* show aaa authentication port-
access interface all client-status
152 18/2/2019
1.1.1.1.1.1.2.33. Test: Test Name :
802.1x_Cached_Reauth_F_16_UnReachable_Radius_Different_User
_Credentials
Test: Test ID :164834
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 9/1/2019
Test: Type : MANUAL
Test: Description : Objective : To Verify the configuration of cached-reauth for the authentication of 802.1x clients
Topology:
DUT-----------Radius server
|
|
Hub-----------Win 7 Supplicant
|
|
Ixia Supplicant
Test Case Desciption:
1. Configure 802.1x authentication in the port connected to hub with user mode
2.Configure cached reauth, reauth period
3. Make the radius server is not reachable
5.Try to authenticate both the clients
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149509
153 18/2/2019
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C164834
154 18/2/2019
Steps :
Step Name Description Expected Result
Configure dot1x auth on port with
Step1:configure dot1x reauth-period and cached-reauth-
authentication period
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication
port-access dot1x authenticator
switch(config-if-dot1x-auth)# enable
switch(config-if-dot1x-auth)#cached-
reauth
switch(config-if-dot1x-auth)#cached-
reauth-period 300
switch(config-if-dot1x-auth)#reauth
switch(config-if-dot1x-auth)#reauth-
period 50
switch(config-if-dot1x-auth)#exit
Trigger bi-directional traffic b/w dot1x Traffic flow will be successful b/w
Step 3: Initiate traffic/Ping win7 supplicant cleints
from clients
Disconnect the radius server and
Step 4: Disable radius-server check the dot1x client
155 18/2/2019
Step Name Description Expected Result
client-status
Requirements:
A PC or a second switch to act as an 802.1X supplicant
A PC or a traffic generator (IXIA or equivalent) to act a client for MAC authentication
A RADIUS server (Free RADIUS or other)
156 18/2/2019
Note: setup for RADIUS servers other that Free RADIUS is not addressed in this test document.
Setup:
Note: This network setup serves as an example only, and is intended to show one way to accomplish the objectives of the
test,
rather than to limit the test to a particular setup.
Connect 802.1X supplicant and a traffic analyzer (Wireshark or equivalent) to port 1 of the DUT via repeater 1.
Connect mac-auth client and a traffic analyzer (Wireshark or equivalent) to port 2 of the DUT via repeater 2 .
Connect IXIA port 2 to port 4 of the DUT
Connect the RADIUS server to port 20 of the DUT
The 80.21X Supplicant device must be running supplicant software, and be set up to authenticate.
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for 80.21X authentication
"tagged11" Auth-Type :=CHAP, User-Password := "pass",
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802,
Tunnel-Type= VLAN,
Egress-VLANID=0x3100000b ,
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for Mac authentication:
Note: it is assumed that the dictionary files etc. are set up to include entries required for RFC 4675, later versions of Free
RADIUS include these by default.
Description:
RFC 4675 requires that compliant authenticators provide the ability to assign a port an egress VLAN either tagged or
untagged based on the VLAN name or VLAN ID.
This test verifies that the switch ports can be assigned as tagged members of an egress VLAN via RADIUS by specifying
the VLAN ID in the RADIUS users file.
Attachments:
Web authentication tips.doc (tips on how to set up web authentication)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69675
157 18/2/2019
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166740
158 18/2/2019
Steps :
Step Name Description Expected Result
1) DUT starting configuration This test case assumes a starting
The erase startup config
point of a blank configuration.
command should prompt the
Clear the configuration switch to reboot and return
(erase startup config). the configuration to the
default values.
Add VLANs :
(vlan 1 ip address 10.1.100.101/24)
(vlan 11 name tag11) The Show running-config
(vlan 11 untagged 4) output should indicate that
(vlan 12 name tag12) the authentication setup
(vlan 13 name untag13)
reflect the commands that
(vlan 14 name untag14)
(vlan 15 name priority) were run in this step.
(config)# radius-server host
23.0.0.218 key go4gold18
DUT(config)# aaa authentication
port-access dot1x authenticator
auth-method eap-radius
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa
authentication port-access dot1x
authenticator enable
switch(config-if)#
DUT(config)# aaa port-access
dot1x authenticator enable
Enable mac authentication on the
port 2
switch# configure terminal
switch(config)# interface 1/1/2
switch(config-if)#aaa
authentication port-access mac-
auth
switch(config-if-macauth)#enable
159 18/2/2019
Step Name Description Expected Result
nitiate authentication.-
4) Authenticate the On the 802.1X supplicant by entering
The show command outputs
Supplicant / Clients the username= tag11, password=
pass. should indicate that each of
the users was successfully
On the Mac Auth client by sending authenticated.
traffic into the port with a mac
address of 000000000001.
Check that each was authenticated.
(show port-access authenticator)
(show port-access mac-based)
(show port-access web-based)
160 18/2/2019
Step Name Description Expected Result
Start the Wireshark capture on DUT
port 1.
Check that the packets generated by
IXIA exit switch port 1 with tags for
VLAN 11.
Objective:
The purpose of this test is to verify that switch ports can be assigned as tagged members of an
egress VLAN via RADIUS by specifying the VLAN Name in the RADIUS users file.
Requirements:
A PC or a second switch to act as an 802.1X supplicant
A PC or a traffic generator (IXIA or equivalent) to act a client for MAC authentication
A PC with an IE or Firefox browser to act as a Web Auth client.
A RADIUS server (Free RADIUS or other)
Note: setup for RADIUS servers other that Free RADIUS is not addressed in this test document.
Setup:
Note: This network setup serves as an example only, and is intended to show one way to
accomplish the objectives of the test,
rather than to limit the test to a particular setup.
Connect 802.1X supplicant and a traffic analyzer (Wireshark or equivalent) to port 1 of the DUT
via repeater 1.
Connect mac-auth client and a traffic analyzer (Wireshark or equivalent) to port 2 of the DUT via
161 18/2/2019
repeater 2 .
Connect web-auth client and a traffic analyzer (Wireshark or equivalent) to port 3 of the DUT via
repeater 3.
Connect IXIA port 2 to port 4 of the DUT
Connect the RADIUS server to port 20 of the DUT
The 80.21X Supplicant device must be running supplicant software, and be set up to
authenticate.
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
80.21X authentication and for Web authentication:
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
Mac authentication:
Note: it is assumed that the dictionary files etc. are set up to include entries required for RFC
4675, later versions of Free RADIUS include these by default.
Description:
RFC 4675 requires that compliant authenticators provide the ability to assign a port an egress
VLAN either tagged or untagged based on the VLAN name or VLAN ID.
This test verifies that the switch ports can be assigned as tagged members of an egress VLAN
via RADIUS by specifying the VLAN Name in the RADIUS users file.
Attachments:
Web authentication tips.doc (tips on how to set up web authentication)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69676
162 18/2/2019
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166741
163 18/2/2019
Steps :
Step Name Description Expected Result
This test case assumes a starting
1) DUT starting configuration point of a blank configuration.
The erase startup config
Clear the configuration
command should prompt the
(erase startup config). switch to reboot and return
the configuration to the
Add VLANs : default values.
(vlan 1 ip address 10.1.100.101/24)
(vlan 11 name tag11)
(vlan 12 name tag12) The Show running-config
(vlan 12 untagged 4) output should indicate that
(vlan 13 name untag13) the authentication setup
(vlan 14 name untag14)
reflect the commands that
(vlan 15 name priority)
were run in this step.
(config)# radius-server host
23.0.0.218 key go4gold18
DUT(config)# aaa authentication
port-access dot1x authenticator
auth-method eap-radius
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa
authentication port-access dot1x
authenticator enable
switch(config-if)#
DUT(config)# aaa port-access
dot1x authenticator enable
Enable mac authentication on the
port 2
switch# configure terminal
switch(config)# interface 1/1/2
switch(config-if)#aaa
authentication port-access mac-
auth
switch(config-if-macauth)#enable
164 18/2/2019
Step Name Description Expected Result
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802, authentication, and Mac
Tunnel-Type= VLAN,
Egress-VLAN-Name = "1tag12,
authentication.
Initiate authentication.-
4) Authenticate the On the 802.1X supplicant by entering
The show command outputs
should indicate that each of
Supplicant / Clients the username= tag12, password=
pass. the users was successfully
On the Mac Auth client by sending authenticated.
traffic into the port with a mac
address of 000000000002.
Check that each was authenticated.
(show port-access authenticator)
(show port-access mac-based)
(show port-access web-based)
165 18/2/2019
Step Name Description Expected Result
Requirements:
A PC or a second switch to act as an 802.1X supplicant
A PC or a traffic generator (IXIA or equivalent) to act a client for MAC authentication
A PC with an IE or Firefox browser to act as a Web Auth client.
A RADIUS server (Free RADIUS or other)
Note: setup for RADIUS servers other that Free RADIUS is not addressed in this test document.
Setup:
Note: This network setup serves as an example only, and is intended to show one way to
accomplish the objectives of the test,
rather than to limit the test to a particular setup.
Connect 802.1X supplicant and a traffic analyzer (Wireshark or equivalent) to port 1 of the DUT
via repeater 1.
Connect mac-auth client and a traffic analyzer (Wireshark or equivalent) to port 2 of the DUT via
repeater 2 .
Connect web-auth client and a traffic analyzer (Wireshark or equivalent) to port 3 of the DUT via
repeater 3.
Connect IXIA port 2 to port 4 of the DUT
Connect the RADIUS server to port 20 of the DUT
The 80.21X Supplicant device must be running supplicant software, and be set up to
authenticate.
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
80.21X authentication and for Web authentication:
166 18/2/2019
"untag13" Auth-Type :=CHAP, User-Password := "pass",
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-802,
Tunnel-Type= VLAN,
Egress-VLANID=0x3200000d,
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
Mac authentication:
Note: it is assumed that the dictionary files etc. are set up to include entries required for RFC
4675, later versions of Free RADIUS include these by default.
Description:
RFC 4675 requires that compliant authenticators provide the ability to assign a port an egress
VLAN either tagged or untagged based on the VLAN name or VLAN ID.
This test verifies that the switch ports can be assigned as untagged members of an egress VLAN
via RADIUS by specifying the VLAN ID in the RADIUS users file.
Attachments:
Web authentication tips.doc (tips on how to set up web authentication)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69677
167 18/2/2019
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166742
168 18/2/2019
Steps :
Step Name Description Expected Result
1) DUT starting configuration This test case assumes a starting
The erase startup config
point of a blank configuration. command should prompt the
Clear the configuration switch to reboot and return
(erase startup config). the configuration to the
Add VLANs :
default values.
(vlan 1 ip address 10.1.100.101/24)
(vlan 11 name tag11) The Show running-config
(vlan 12 name tag12) output should indicate that
(vlan 13 name untag13)
(vlan 13 untagged 4)
the authentication setup
(vlan 14 name untag14) reflect the commands that
(vlan 15 name priority) were run in this step.
Authentication setup.
169 18/2/2019
Step Name Description Expected Result
The second entry will be used by authentication.
Mac auth users (the mac address of
the client is used as the username
and password)
Be sure to restart the RADIUS
service after making changes to the
users file.
Initiate authentication.-
4) Authenticate the On the 802.1X supplicant by entering
The show command outputs
should indicate that each of
Supplicant / Clients the username= untag13, password=
pass. the users was successfully
On the Mac Auth client by sending authenticated.
traffic into the port with a mac
address of 000000000003.
Check that each was authenticated.
(show port-access authenticator)
(show port-access mac-based)
(show port-access web-based)
170 18/2/2019
Step Name Description Expected Result
as required by the RADIUS applied
attributes. attributes.
Start the Wireshark capture on DUT
port 2.
The MAC authenticated port
Check that the packets generated by should egress frames without
IXIA exit switch port 2 without tags.
tags as required by the
RADIUS
applied attributes.
Requirements:
A PC or a second switch to act as an 802.1X supplicant
A PC or a traffic generator (IXIA or equivalent) to act a client for MAC authentication
A PC with an IE or Firefox browser to act as a Web Auth client.
A RADIUS server (Free RADIUS or other)
Note: setup for RADIUS servers other that Free RADIUS is not addressed in this test document.
3 PCs running Wireshark or equivalent traffic analyzer (one is sufficient but will require rerunning
some test steps multiple times)
3 Multiport repeaters (hubs) (one is sufficient but will require rerunning some test steps multiple
times).
171 18/2/2019
Setup:
Note: This network setup serves as an example only, and is intended to show one way to
accomplish the objectives of the test,
rather than to limit the test to a particular setup.
Connect 802.1X supplicant and a traffic analyzer (Wireshark or equivalent) to port 1 of the DUT
via repeater 1.
Connect mac-auth client and a traffic analyzer (Wireshark or equivalent) to port 2 of the DUT via
repeater 2 .
Connect web-auth client and a traffic analyzer (Wireshark or equivalent) to port 3 of the DUT via
repeater 3.
Connect IXIA port 2 to port 4 of the DUT
Connect the RADIUS server to port 20 of the DUT.
The 80.21X Supplicant device must be running supplicant software, and be set up to
authenticate.
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
80.21X authentication and for Web authentication:
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for
Mac authentication:
Note: it is assumed that the dictionary files etc. are set up to include entries required for RFC
4675, later versions of Free RADIUS include these by default.
Description:
RFC 4675 requires that compliant authenticators provide the ability to assign a port an egress
VLAN either tagged or untagged based on the VLAN name or VLAN ID.
This test verifies that the switch ports can be assigned as untagged members of an egress VLAN
via RADIUS by specifying the VLAN Name in the RADIUS users file.
Attachments:
Web authentication tips.doc (tips on how to set up web authentication)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69678
172 18/2/2019
Test: Automated : Not Feasible
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166743
173 18/2/2019
Steps :
Step Name Description Expected Result
1) DUT starting configuration This test case assumes a starting
The erase startup config
point of a blank configuration. command should prompt the
Clear the configuration switch to reboot and return
(erase startup config). the configuration to the
Add VLANs :
default values.
(vlan 1 ip address 10.1.100.101/24)
(vlan 11 name tag11) The Show running-config
(vlan 12 name tag12) output should indicate that
(vlan 13 name untag13)
(vlan 14 name untag14)
the authentication setup
(vlan 14 untagged 4) reflect the commands that
(vlan 15 name priority) were run in this step.
174 18/2/2019
Step Name Description Expected Result
Add the following entries to the Free
3) RADIUS Server Setup RADIUS users file.
The first entry will be used by
802.1X.
The second entry will be used by
Mac auth users (the mac address of
the client is used as the username
and password)
Be sure to restart the RADIUS The RADIUS server is
service after making changes to the
users file. configured
"untag14" Auth-Type :=CHAP, User- properly to allow 802.1X
Password := "pass",
Tunnel-Type = VLAN, authentication and Mac
Tunnel-Medium-Type = IEEE-802,
Tunnel-Type= VLAN, authentication.
Egress-VLAN-Name = "2untag14,
Initiate authentication.-
4) Authenticate the On the 802.1X supplicant by entering
The show command outputs
should indicate that each of
Supplicant / Clients the username= untag14, password=
pass. the users was successfully
authenticated.
On the Mac Auth client by sending
traffic into the port with a mac
address of 000000000004.
Check that each was authenticated.
* show aaa authentication port-
access interface all client-status
175 18/2/2019
Step Name Description Expected Result
IXIA exit switch port 1 without tags.
The purpose of this test case is to verify functionality of session timeout VSA to force reauthenticate clients in
1. Mac Client - IP Phone
2.802.1x Client - PC
PC Behind IP Phone Scenario
Requirements:
Single DUT
Mac Client
802.1x Client
Radius Server
Topology:
Topology:
Supplicant and Ixia (Phone)------Hub--------DUT----------------Radius Server
Feature Description:
1. The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an
authentication session after it is authenticated
2. SESSION-TIMEOUT being an IETF attribute , it has been used on RADIUS-CoA to trigger reauthentication
after a specified time period
1. Advantages
2. Customers can reauthenticate only suspicious clients by sending Radius CoA with Session Timeout Attribute
without traffic disruption
176 18/2/2019
4. It enables a unified interface in a RADIUS server to trigger reauthentication of clients across multi vendor
access switches
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
153409
177 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 using "show run"
178 18/2/2019
Step Name Description Expected Result
traffic from mac auth 1.show port-access <port>
configured phone clients detailed
Start sending traffic from 802.1x and Verify the traffic is successfully
Step 6 mac auth port to a destination ixia flowing
ports placed in corresponding data
vlans
Vlan <data-vlan-1>
untag <destination-ixia-port1>
Vlan <data-vlan-2>
untag <destination-ixia-port2>
179 18/2/2019
1.1.1.1.1.1.2.39. Test: Test Name :
Port_Bounce_Host_PC_Behind_IP_Phone
Test: Test ID :166812
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 24/1/2019
Test: Type : MANUAL
Test: Description : Objective:
The purpose of this test case is to verify functionality of session timeout VSA to force reauthenticate clients in
1. Mac Client - IP Phone
2.802.1x Client - PC
PC Behind IP Phone Scenario
Requirements:
Single DUT
Mac Client
802.1x Client
Radius Server
Topology:
Topology:
Supplicant and Ixia (Phone)------Hub--------DUT----------------Radius Server
Feature Description:
1. The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an
authentication session after it is authenticated
2. SESSION-TIMEOUT being an IETF attribute , it has been used on RADIUS-CoA to trigger reauthentication
after a specified time period
1. Advantages
2. Customers can reauthenticate only suspicious clients by sending Radius CoA with Session Timeout Attribute
without traffic disruption
4. It enables a unified interface in a RADIUS server to trigger reauthentication of clients across multi vendor
access switches
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
153409
180 18/2/2019
Test: Automated : Dev Funnel
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166812
181 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 using "show run"
Start supplicant in 802.1x configured Verify the clients are placed in user
Step 5 windows port and traffic from mac role using
auth configured phone 1.show port-access <port> clients
detailed
Start sending traffic from 802.1x and Verify the traffic is successfully
Step 6 mac auth port to a destination ixia flowing
ports placed in corresponding data
vlans
Vlan <data-vlan-1>
untag <destination-ixia-port1>
Vlan <data-vlan-2>
untag <destination-ixia-port2>
182 18/2/2019
Step Name Description Expected Result
Run the debug session in switch to Verify the debug logs, When CoA is
Step 8 verify the CoA ACK is sent sent from radius server , switch does
the following for the mac client
1. CoA ACK is received
2.* show aaa authentication port-
access interface all client-status
3. Verify both PC and Phone
deauthenticated because of port
down event and port came online
after 20 seconds
000
Requirements:
Dut: Authenticator
Workstation: Radius server
HUB
Multiple Workstation as Dot1x Supplicant
Topology:
Supplicant and Ixia (Phone)------Hub--------DUT----------------Radius Server
183 18/2/2019
auto-100 100 Mbps, use Auto Negotiation for duplex mode.
auto-1000 1000 Mbps, use Auto Negotiation for duplex mode.
auto-10-100 10 or 100 Mbps, use Auto Negotiation for duplex mode.
auto-10g 10 Gbps, use Auto Negotiation for duplex mode.
184 18/2/2019
Steps :
Step Name Description Expected Result
Step 1: Configure Create a setup as attached.
Verify that radius server is
Configure radius server and enable reachable and configured
Authentication dot1x authentication. correctly
Verify that dot1x
authentication is enabled and
port speed vsa is also
enabled correctly.
(config)# radius-server host
23.0.0.218 key go4gold18 (config)#show radius
DUT(config)# aaa authentication
port-access dot1x authenticator (config)#show port-access
auth-method eap-radius config
Now set the speed which is different Verify that after the authentication,
Step 3: Set new port speed than the current speed. link flaps again and new port speed
Set the Aruba-Port-Speed VSA value is set.
to different speed than the current
speed. If the port speed set by VSA is
HP-Switch(config)# interface 1/1/1 different thatn the current setting, the
HP-Switch(config-if)#aaa switch port resets and comes back
authentication port-access up with the specific speed setting.
reauthenticate
Reauthenticate the client.
185 18/2/2019
Step Name Description Expected Result
supports only 100/1000T, than try to
Speed set port speed to 10/10g)
186 18/2/2019
Test: Description : Objective:
To Verify the behavior of ipv6 ACLs applied to 802.1x authenticated ports through Radius Filter-Id attribute.
Supported Platforms:
All Platforms
Requirements:
DUT
Radius Server
IXIA Port
Supplicant
Topology:
Topology:
Destination ixia
|
Supplicant-------DUT----------------Radius Server
Description:
A RADIUS-assigned ACL is configured on a RADIUS server for assignment to a given port when the server authenticates
a specific client on that port. When the server authenticates a client associated with that ACL, the ACL is assigned to the
port the client is using. The ACL then filters the IP traffic received inbound on that port from the authenticated client. If the
RADIUS server supports both IPv4 and IPv6 ACEs, then the ACL assigned by the server can be used to filter both traffic
types, or filter IPv4 traffic and drop IPv6 traffic. When the client session ends, the ACL is removed from the port. The
switch allows as many RADIUS-assigned ACLs on a port as it allows authenticated clients.
In the RADIUS protocol, the IP ACL for an authenticated user can be passed to the access-control devices in two ways:
1. use the Filter-Id attribute - to give the ID of a pre-defined ACL;
2. use the NAS-Filter-Rule attribute to explicitly define (a set of) filter rules.
A Filter-Id is an alphabetic-string identifier, or name, corresponding to an IP ACL that is pre-configured on the access-
control device.There is no support for Filter-Id attribute in PVOS switches. Now the support of Filter-Id attribute to PVOS
switches is added.
Reference Documents:
http://ent61.sharepoint.hp.com/teams/hpn-lab/essw/_layouts/OSSSearchResults.aspx?k=radius%20filter-
id&cs=This%20Site&u=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Fent61.sharepoint.hp.com%2Fteams%2Fhpn-lab%2Fessw
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
115045
187 18/2/2019
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166917
188 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 Set up the topology as given Topology is set up as given
in details tab.
189 18/2/2019
Step Name Description Expected Result
authenticated and ACL is Verify the Filter-ID attribute is
applied to the port through present
filter-id attribute using
To Verify the behavior of ACLs applied to 802.1x authenticated ports through Radius Filter-Id attribute.
Supported Platforms:
All Platforms
Requirements:
DUT
Radius Server
IXIA Ports
Topology:
Topology:
Destination ixia
190 18/2/2019
|
Supplicant-------DUT----------------Radius Server
Description:
A RADIUS-assigned ACL is configured on a RADIUS server for assignment to a given port when the server authenticates
a specific client on that port. When the server authenticates a client associated with that ACL, the ACL is assigned to the
port the client is using. The ACL then filters the IP traffic received inbound on that port from the authenticated client. If the
RADIUS server supports both IPv4 and IPv6 ACEs, then the ACL assigned by the server can be used to filter both traffic
types, or filter IPv4 traffic and drop IPv6 traffic. When the client session ends, the ACL is removed from the port. The
switch allows as many RADIUS-assigned ACLs on a port as it allows authenticated clients.
In the RADIUS protocol, the IP ACL for an authenticated user can be passed to the access-control devices in two ways:
1. use the Filter-Id attribute - to give the ID of a pre-defined ACL;
2. use the NAS-Filter-Rule attribute to explicitly define (a set of) filter rules.
A Filter-Id is an alphabetic-string identifier, or name, corresponding to an IP ACL that is pre-configured on the access-
control device.There is no support for Filter-Id attribute in PVOS switches. Now the support of Filter-Id attribute to PVOS
switches is added.
Reference Documents:
http://ent61.sharepoint.hp.com/teams/hpn-lab/essw/_layouts/OSSSearchResults.aspx?k=radius%20filter-
id&cs=This%20Site&u=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Fent61.sharepoint.hp.com%2Fteams%2Fhpn-lab%2Fessw
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
115047
191 18/2/2019
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: Automation/Product CR : 228728
Test: BP Filter: HPE
Test: GUID: ALMTP157C166918
192 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 Set up the topology as given Topology is set up as given
in details tab.
ip access-list extended
"101"
permit tcp any any eq 10
deny udp any any eq 10
remark "deny udp any any
eq 10"
exit
193 18/2/2019
Step Name Description Expected Result
Authenticate the client on port1.Verify
Step 7 client is authenticated and ACL is Check the "Radius Accept"
applied to the port through filter-id
attribute using
Packet through wireshark.
* show aaa authentication port- Verify the Filter-ID attribute is
access interface all client-status
present
To Verify the behavior of ipv4/ipv6 ACLs applied to authenticated ports through Radius Filter-Id attribute along with radius
assigned ACLs
Supported Platforms:
All Platforms
Requirements:
DUT
Radius Server
Ixia
Supplicant
Topology:
Destination ixia
|
194 18/2/2019
Supplicant-------DUT----------------Radius Server
Description:
A RADIUS-assigned ACL is configured on a RADIUS server for assignment to a given port when the server authenticates
a specific client on that port. When the server authenticates a client associated with that ACL, the ACL is assigned to the
port the client is using. The ACL then filters the IP traffic received inbound on that port from the authenticated client. If the
RADIUS server supports both IPv4 and IPv6 ACEs, then the ACL assigned by the server can be used to filter both traffic
types, or filter IPv4 traffic and drop IPv6 traffic. When the client session ends, the ACL is removed from the port. The
switch allows as many RADIUS-assigned ACLs on a port as it allows authenticated clients.
In the RADIUS protocol, the IP ACL for an authenticated user can be passed to the access-control devices in two ways:
1. use the Filter-Id attribute - to give the ID of a pre-defined ACL;
2. use the NAS-Filter-Rule attribute to explicitly define (a set of) filter rules.
A Filter-Id is an alphabetic-string identifier, or name, corresponding to an IP ACL that is pre-configured on the access-
control device.There is no support for Filter-Id attribute in PVOS switches. Now the support of Filter-Id attribute to PVOS
switches is added.
Reference Documents:
http://ent61.sharepoint.hp.com/teams/hpn-lab/essw/_layouts/OSSSearchResults.aspx?k=radius%20filter-
id&cs=This%20Site&u=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Fent61.sharepoint.hp.com%2Fteams%2Fhpn-lab%2Fessw
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
114965
195 18/2/2019
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166919
196 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 Set up the topology as given Topology is set up as given
in details tab.
197 18/2/2019
Step Name Description Expected Result
from any to 20.1.1.13 1002 from any to 20.1.1.13 1002
cnt", cnt",
*
Step 7 Authenticate the client1 on
Check the "Radius Accept"
port1.Verify client is authenticated
Packet through wireshark.
and ACLs are applied to the port Verify the Filter-ID attribute is
through filter-id attribute using present
show aaa authentication port-
access interface all client-status
198 18/2/2019
1.1.1.1.1.1.2.44. Test: Test Name :
Radius_F_53._RFC_4675_On_User_Priority_Table
Test: Test ID :166920
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 25/1/2019
Test: Type : MANUAL
Test: Description : Objective:
The purpose of this test is to verify that the switch can remap user priorities of incoming packets as required by RFC 4675
Requirements:
A PC or a second switch to act as an 802.1X supplicant
A PC or a traffic generator (IXIA or equivalent) to act a client for MAC authentication
A RADIUS server (Free RADIUS or other)
3 multiport repeaters (hubs) (one is sufficient but would require running some sections of the test multiple times)
Note: setup for RADIUS servers other that Free RADIUS is not addressed in this test document.
Setup:
Note: This network setup serves as an example only, and is intended to show one way to accomplish the objectives of the
test,
rather than to limit the test to a particular setup.
Connect 802.1X supplicant and a traffic generator (IXIA or equivalent) to port 1 of the DUT via repeater 1.
Connect mac-auth client and a traffic generator (IXIA or equivalent) to port 2 of the DUT via repeater 2 .
Connect a traffic analyzer (Wireshark or equivalent) to port 4 of the DUT
Connect the RADIUS server to port 20 of the DUT.
The 80.21X Supplicant device must be running supplicant software, and be set up to authenticate.
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for 80.21X authentication and
for Web authentication:
The Free RADIUS server "users" file (/etc/freeradius/users) must contain the following entry for Mac authentication:
Note: it is assumed that the RADIUS dictionary files etc. are set up to include entries required for RFC 4675, later versions
of FreeRADIUS include these by default.
Description:
RFC 4675 requires that compliant authenticators provide the ability to assign a port an egress VLAN either tagged or
untagged based on the VLAN name or VLAN ID.
It also requires that device to be able to remap user priorities of incoming packets.
This test verifies that the switch can remap user priorities of incoming packets as required.
This test is written for switches that remap all incoming values to a single priority.
Attachments:
Web authentication tips.doc (tips on how to set up web authentication)
199 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
74344
200 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 - DUT starting This test case assumes a The erase startup config
starting point of a blank command should prompt the
configuration configuration. switch to reboot and return
Clear the configuration the configuration to the
(erase startup config). default values.
Add the following entries to the Free The RADIUS server is configured
Step 3 - RADIUS Server RADIUS users file. properly to allow 802.1X
201 18/2/2019
Step Name Description Expected Result
The first entry will be used by 802.1X authentication, and Mac
Setup user. authentication.
The second entry will be used by
Mac auth users (the mac address of
the client is used as the username
and password)
Be sure to restart the RADIUS
service after making changes to the
users file.
Example configuration
Initiate authentication.-
Step 4 - Authenticate the Bring the link state down and up on
The show command outputs
Supplicant / Clients ports 1,2 (disconnect/reconnect).
On the 802.1X supplicant enter the should indicate that each of
username= priority, password= pass. the users was successfully
On the Mac Auth client by sending authenticated.
traffic into the port with a Mac
address of 000000000005.
Check that each was authenticated.
Verify that each of the clients was The show port-access command
Step 5 - Verify the effects of authenticated and assigned to remap outputs should show 00000000
the authentication to User Priority= 00000000. under Port COS.
Port 1 is 802.1X authenticated
Port 2 is mac-authenticated
The show qos port-priority command
output should show 0 under Radius
Override for each of the 3 ports.
202 18/2/2019
Step Name Description Expected Result
with the Source Mac address of the
Mac authenticated user onto DUT
port 2
(ports 1-4 are tagged on VLAN 15)
Check that the Mac authenticated
port (2) remaps the priority to the
RADIUS assigned value.
Start the IXIA capture on DUT port 4.
Check that the captured packets
contain the correct priority (RADIUS
assigned attribute) value in the tag.
Stop the IXIA traffic on port 2
Step 7 - Rerun the test for Change the RADUS user As above
"000000000005" Auth-Type
:=CHAP, User-Password :=
"00000000005",
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-
802,
User-Priority-Table=
11111111,
203 18/2/2019
Step Name Description Expected Result
Authentication should fail for all 2
Step 8 - Rerun the test for Change the RADUS user
authentication methods when invalid
entries for the 2 users to
invalid values invalid values, and rerun the
user priorities are used.
"000000000005" Auth-Type
:=CHAP, User-Password :=
"00000000005",
Tunnel-Type = VLAN,
Tunnel-Medium-Type = IEEE-
802,
User-Priority-Table=
88888888,
204 18/2/2019
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
http://www.faqs.org/rfcs/rfc3580.html
RFC 4675 - RADIUS Attributes for Virtual LAN and Priority Support
http://www.faqs.org/rfcs/rfc4675.html
SETUP:
Single node setup with single 802.1x client connected to single port.
4. Configure a radius server for authentication and create one user accounts.
5. Create a VLAN on the DUT that the user can be 'moved' into. In most cases it is best to setup a couple of VLANs e.g.
VLAN 100 and VLAN 101 for example with DHCP scopes that would provide different ranges of IP leases. If the right IP
Address range is received on the client then it is clear that the correct VLAN was applied. Leave the port untagged in the
Default VLAN or some other VLAN until a successful authentication occurs.
Topology:
Supplicant--------------DUT----------------Radius Server
205 18/2/2019
Test: Script Library Parameters : 60
Test: Test Sub-Area : System Functional
Test: Automation/Product CR : System
Test: BP Filter: HP
Test: GUID: ALMTP157C166921
Steps :
Step Name Description Expected Result
Authenticate a workstation using the The user is successfully
Step 1 802.1x supplicant, and verify that the authenticated, and the port is 'moved'
correct VLAN is applied to the port, to the desired VLAN.
after a successful authentication
(config)# radius-server host Verify port is moved within 4 sec
23.0.0.218 key go4gold18 * show aaa authentication port-
DUT(config)# aaa authentication access dot1x authenticator
port-access dot1x authenticator interface all client-status
auth-method eap-radius * show aaa authentication port-
access interface all client-status
aaa authentication port-access
auth-mode client-mode
206 18/2/2019
1.1.1.1.1.1.2.46. Test: Test Name :
Disconnect_Message_PC_Behind_IP_Phone
Test: Test ID :166922
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 25/1/2019
Test: Type : MANUAL
Test: Description : Objective:
The purpose of this test case is to verify functionality of session timeout VSA to force reauthenticate clients in
1. Mac Client - IP Phone
2.802.1x Client - PC
PC Behind IP Phone Scenario
Requirements:
Single DUT
Mac Client
802.1x Client
Radius Server
Topology:
Topology:
Supplicant and Ixia (Phone)------Hub--------DUT----------------Radius Server
Feature Description:
1. The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an
authentication session after it is authenticated
2. SESSION-TIMEOUT being an IETF attribute , it has been used on RADIUS-CoA to trigger reauthentication
after a specified time period
1. Advantages
2. Customers can reauthenticate only suspicious clients by sending Radius CoA with Session Timeout Attribute
without traffic disruption
4. It enables a unified interface in a RADIUS server to trigger reauthentication of clients across multi vendor
access switches
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
153409
207 18/2/2019
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C166922
208 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 using "show run"
Start supplicant in 802.1x configured Verify the clients are placed in user
Step 5 windows port and traffic from mac role using
auth configured phone 1.show port-access <port> clients
detailed
Start sending traffic from 802.1x and Verify the traffic is successfully
Step 6 mac auth port to a destination ixia flowing
209 18/2/2019
Step Name Description Expected Result
ports placed in corresponding data
vlans
Vlan <data-vlan-1>
untag <destination-ixia-port1>
Vlan <data-vlan-2>
untag <destination-ixia-port2>
Run the debug session in switch to Verify the debug logs, When DM is
Step 8 verify the DM ACK is sent sent from radius server , switch does
the following for the 802.1x client
1. DM ACK is received
2.* show aaa authentication port-
access interface all client-status
3. Verify only PC is
deauthenticated when port-bounce
is received and Phone remains in
authenticated state
000
210 18/2/2019
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 1 - Low
Test: Test Suited for OSTL? : Y
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 244909
Test: BP Filter: HPE
Test: GUID: ALMTP157C166923
211 18/2/2019
Steps :
Step Name Description Expected Result
Verify the help text and CLI tab option of the below configuration CLIs
Step 1 Enable or disable 802.1X authentication on switch
#### Syntax
`aaa authentication port-access dot1x authenticator (enable | disable)`
#### Help
| Token | Help string |
|----------------|--------------------------------------------------|
| aaa | Authentication, Authorization and Accounting. |
| authentication | Configure the authentication feature. |
| port-access | Configure the port access authentication method. |
| dot1x | Configure the switch for 802.1X feature. |
| authenticator | Configure the switch as an 802.1X authenticator. |
| enable | Enable 802.1X authentication on switch. |
| disable | Disable 802.1X authentication on switch. |
#### Description
Enable or disable 802.1X authenticator feature globally.
Default: *disabled*
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Enable 802.1X authentication on the switch:
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator enable
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# enable
switch(config-dot1x-auth)#
```
Disable 802.1X authentication on the switch:
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator disable
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# disable
switch(config-dot1x-auth)#
```
### Delete global 802.1X authenticator configuration
#### Syntax
`no aaa authentication port-access dot1x authenticator`
#### Help
#### Description
Delete global 802.1X authenticator configuration.
This also disables 802.1X authentication on the switch if enabled.
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Delete global 802.1X authenticator configuration:
```
switch# configure terminal
switch(config)# no aaa authentication port-access dot1x authenticator
212 18/2/2019
Step Name Description Expected Result
switch(config)#
```
### Configure 802.1X authentication method
#### Syntax
`[no] aaa authentication port-access dot1x authenticator auth-method
<chap-radius|eap-radius>`
#### Help
| Token | Help string |
|----------------|----------------------------------------------------------------------------------
|
| auth-method | Configure the type of authentication method on switch.
Default is eap-radius. |
| *chap-radius* | Use CHAP (MD5) capable RADIUS
server. |
| *eap-radius* | Use EAP capable RADIUS
server. |
#### Description
Configure the authentication mechanism used to control access to the
network.
The configured authentication method will be used to authenticate 802.1X
clients.
The no form of the command resets it to default.
Default: *eap-radius*
#### Authority
Admin
#### Parameters
Choose one of the parameters from the following table to configure the
authentication method to use.
| Parameter | Status | Syntax | Description |
|----------------|----------|-------------|--------------------------------------------|
| *chap-radius* | Required | chap-radius | Use CHAP (MD5) capable
RADIUS server |
| *eap-radius* | Required | eap-radius | Use EAP capable RADIUS
server |
#### Examples
Configure 802.1X authentication method as chap-radius:
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator auth-
method chap-radius
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# auth-method chap-radius
switch(config-dot1x-auth)#
```
Reset 802.1X authentication method to default:
```
switch# configure terminal
switch(config)# no aaa authentication port-access dot1x authenticator
auth-method
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# no auth-method
switch(config-dot1x-auth)#
```
### Configure RADIUS server group for 802.1X
#### Syntax
`[no] aaa authentication port-access dot1x authenticator radius server-
213 18/2/2019
Step Name Description Expected Result
group <group-name>`
#### Help
| Token | Help string |
|----------------|--------------------------------------------------------------------------|
| radius | Configure the RADIUS specific
information. |
| server-group | Specify the server group to use.
|
| *group-name* | Enter an ASCII string. |
#### Description
Configure an existing RADIUS server group to be used for 802.1X
authentication.
The no form of the command resets it to default.
Default: *radius*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax |
Description |
|----------------|----------|-------------|---------------------------------------------------------
-------------------------|
| *group-name* | Required | group-name | The name of the RADIUS
server group to associate with 802.1X authentication. |
#### Examples
Configure 802.1X to use RADIUS server group 'employee':
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator radius
server-group employee
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# radius server-group employee
switch(config-dot1x-auth)#
```
Reset 802.1X RADIUS server group configuration to default:
```
switch# configure terminal
switch(config)# no aaa authentication port-access dot1x authenticator
radius server-group
switch(config)#
```
OR
```
switch# configure terminal
switch(config)# aaa authentication port-access dot1x authenticator
switch(config-dot1x-auth)# no radius server-group
switch(config-dot1x-auth)#
```
### Enable 802.1X authentication on a port
#### Syntax
`aaa authentication port-access dot1x authenticator enable`
#### Help
| Token | Help string |
|----------------|-----------------------------------------|
| enable | Enable 802.1X authentication on a port. |
#### Description
Enable 802.1X authentication on a port.
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
214 18/2/2019
Step Name Description Expected Result
Enable 802.1X authentication on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
enable
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# enable
switch(config-if-dot1x-auth)#
```
### Disable 802.1X authentication on a port
#### Syntax
`aaa authentication port-access dot1x authenticator disable`
#### Help
| Token | Help string |
|----------------|------------------------------------------|
| disable | Disable 802.1X authentication on a port. |
#### Description
Disable 802.1X authentication on a port.
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Disable 802.1X authentication on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
disable
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# disable
switch(config-if-dot1x-auth)#
```
### Delete 802.1X authentication configuration on a port
#### Syntax
`no aaa authentication port-access dot1x authenticator`
#### Help
#### Description
Delete 802.1X authentication configuration on a port.
This also disables 802.1X authentication on the port if enabled.
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Delete 802.1X authentication configuration on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
switch(config-if)#
```
### Enable cached re-authentication on a port
215 18/2/2019
Step Name Description Expected Result
#### Syntax
`[no] aaa authentication port-access dot1x authenticator cached-reauth`
#### Help
| Token | Help string |
|----------------|------------------------------------------------|
| cached-reauth | Configure cached re-authentication of clients. |
#### Description
Enable cached re-authentication of clients.
The no form of the command disables cached re-authentication.
Default: *disabled*
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Enable cached re-authentication on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
cached-reauth
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# cached-reauth
switch(config-if-dot1x-auth)#
```
Disable cached re-authentication on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
cached-reauth
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no cached-reauth
switch(config-if-dot1x-auth)#
```
### Configure cached re-authentication period on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator cached-reauth-
period <cached-reauth-period>`
#### Help
| Token | Help
string |
|------------------------|--------------------------------------------------------------------------
------------------------------|
| cached-reauth-period | Time in seconds, during which cached re-
authentication is allowed on the port. Default is 30 seconds. |
| *cached-reauth-period* | Specify the cached-reauth-period in
seconds. |
#### Description
Configure the period of time during which an authenticated client that fails
re-authentication due to RADIUS server being unreachable will continue in
authenticated state.
The no form of the command resets it to default.
Default: *30 seconds*
216 18/2/2019
Step Name Description Expected Result
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax | Description |
|------------------------|----------|-----------|---------------------|
| *cached-reauth-period* | Required | Integer | A value in seconds. |
#### Examples
Configure cached re-auth period on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
cached-reauth-period 300
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# cached-reauth-period 300
switch(config-if-dot1x-auth)#
```
Reset cached re-auth period to default on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
cached-reauth-period
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x
switch(config-if-dot1x)# no authenticator cached-reauth-period
switch(config-if-dot1x)#
```
### Configure maximum authentication attempts on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator max-retries <max-
retries>`
#### Help
| Token | Help
string |
|----------------|----------------------------------------------------------------------------------
----------------------------------|
| max-retries | Configure the number of attempts to authenticate a client
before failing authentication. Default is 2 retries. |
| *max-retries* | Maximum number of
retries. |
#### Description
Configure the number of authentication attempts that must time-out before
authentication fails and the authentication session ends.
The no form of the command resets it to default.
Default: *2*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax |
Description |
|-----------------|----------|-----------|----------------------------------------------------------
-|
| *max-retries* | Required | Integer | A value indicating the number of
authentication attempts. |
217 18/2/2019
Step Name Description Expected Result
#### Examples
Configure maximum authentication attempts on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator max-
retries 5
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# max-retries 5
switch(config-if-dot1x-auth)#
```
Reset the maximum authentication attempts on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
max-retries
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no max-retries
switch(config-if-dot1x-auth)#
```
### Configure quiet period on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator quiet-period
<quiet-period>`
#### Help
| Token | Help
string |
|----------------|----------------------------------------------------------------------------------
-------------------------|
| quiet-period | Configure the period during which the port does not try to
acquire a supplicant. Default is 60 seconds. |
| *quiet-period* | Specify the quite-period in
seconds. |
#### Description
Configure the period during which the port does not try to acquire a
supplicant.
The period begins after the last attempt authorized by the max-requests
parameter fails.
The no form of the command resets it to default.
Default: *60 seconds*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax | Description |
|-----------------|----------|-----------|--------------------------------|
| *quiet-period* | Required | Integer | A value in seconds. |
#### Examples
Configure quiet period on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator quiet-
period 100
218 18/2/2019
Step Name Description Expected Result
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# quiet-period 100
switch(config-if-dot1x-auth)#
```
Reset the quiet period on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
quiet-period
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no quiet-period
switch(config-if-dot1x-auth)#
```
### Enable periodic re-authentication on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator reauth`
#### Help
| Token | Help string |
|----------------|------------------------------------------------|
| reauth | Enable periodic re-authentication on the port. |
#### Description
Enable periodic re-authentication of clients.
The no form of the command disabled periodic re-authentication.
Default: *disabled*
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
Enable periodic re-authentication on the port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
reauth
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# reauth
switch(config-if-dot1x-auth)#
```
Disable periodic re-authentication on the port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
reauth
switch(config-if)#
```
219 18/2/2019
Step Name Description Expected Result
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no reauth
switch(config-if-dot1x-auth)#
```
### Configure re-authentication period on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator reauth-period
<reauth-period>`
#### Help
| Token | Help string |
|-----------------|------------------------------------------------------------------------------|
| reauth-period | Configure the re-authentication timeout in seconds.
Default is 30 seconds. |
| *reauth-period* | Specify reauth-period in
seconds. |
#### Description
Configure the period of time after which clients connected must be
re-authenticated. User needs to enable re-authentication on the interface.
The no form of the command resets it to default.
Default: *30*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax | Description |
|-----------------|----------|-----------|----------------------|
| *reauth-period* | Required | Integer | A value in seconds. |
#### Examples
Configure re-authentication period on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
reauth-period 100
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# reauth-period 100
switch(config-if-dot1x-auth)#
```
Reset re-authentication period on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
reauth-period
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no reauth-period
switch(config-if-dot1x-auth)#
```
### Configure discovery period on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator discovery-period
220 18/2/2019
Step Name Description Expected Result
<discovery-period>`
#### Help
| Token | Help
string |
|---------------------|-----------------------------------------------------------------------------
------------------------------------|
| discovery-period | Configure the EAPOL Request Identity packet re-
transmission period. Default is 30 seconds. |
| *discovery-period* | Specify discovery-period in
seconds. |
#### Description
Configure the period the port waits to retransmit the next EAPOL request
identity frame on an 802.1X enabled port with no authenticated client.
The no form of the command resets it to default.
Default: *30 seconds*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax | Description |
|------------------------|----------|-----------|--------------------------------|
| *discovery-period* | Required | Integer | A value in seconds. |
#### Examples
Configure discovery period on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
discovery-period 120
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# discovery-period 140
switch(config-if-dot1x-auth)#
```
Reset discovery period on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
discovery-period
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no discovery-period
switch(config-if-dot1x-auth)#
```
### Configure EAPOL timeout on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator eapol-timeout
<eapol-timeout>`
#### Help
| Token | Help
string |
|---------------------|-----------------------------------------------------------------------------
------------------------------------|
| eapol-timeout | Configure the time period to wait for client's response
before retransmitting an EAPOL PDU. |
| *eapol-timeout* | Specify eapol-timeout in
221 18/2/2019
Step Name Description Expected Result
seconds. |
#### Description
Configure the period of time the switch waits for a response from a client
before retransmitting an EAPOL PDU.
If the value is 0, the time period is calculated as per RFC 2988.
```
RFC 2988 2.1: Before RTT measurement, set RTO to 3 seconds for initial
retransmission and then double the RTO to provide back off per 5.5.
Limit the maximum RTO to 20 seconds per RFC 3748, 4.3 modified
RTOmax.
```
Default: *0*
#### Authority
Admin.
#### Parameters
| Parameter | Status | Syntax | Description |
|----------------------|----------|-----------|---------------------|
| *eapol-timeout* | Required | Integer | A value in seconds. |
#### Examples
Configure EAPOL timeout on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator eapol-
timeout 120
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# eapol-timeout 140
switch(config-if-dot1x-auth)#
```
Reset EAPOL timeout on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
eapol-timeout
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no eapol-timeout
switch(config-if-dot1x-auth)#
```
### Configure maximum EAPOL requests on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator max-eapol-
requests <max-eapol-requests>`
#### Help
| Token | Help
string
|
|-----------------------|---------------------------------------------------------------------------
-------------------------------------------------|
| max-eapol-requests | Configure the maximum number of EAPOL
requests to send to a supplicant before authentication fails. Default is 5
requests. |
| *max-eapol-requests* | Specify the maximum number of EAPOL
requests. |
222 18/2/2019
Step Name Description Expected Result
#### Description
Configure the number of EAPOL requests to send to a supplicant that must
time-out before authentication fails and the authentication session ends.
The no form of the command resets it to default.
Default: *5*
#### Authority
Admin
#### Parameters
| Parameter | Status | Syntax |
Description |
|-----------------------|----------|-----------|----------------------------------------------------
-------|
| *max-eapol-requests* | Required | Integer | A value indicating the
number of EAPOL requests. |
#### Examples
Configure maximum EAPOL requests on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator max-
eapol-requests 3
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# max-eapol-requests 3
switch(config-if-dot1x-auth)#
```
Reset the maximum EAPOL requests on a port to default:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
max-eapol-requests
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no max-eapol-requests
switch(config-if-dot1x-auth)#
```
### Configure force authorized on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator authorized`
#### Help
| Token | Help
string |
|-----------------|---------------------------------------------------------------------------------
----------------------------------|
| authorized | Enable an authenticated client to stay in the same state if
server reachability fails during re-authentication. |
#### Description
Configure authenticated clients to continue in authenticated state if the
re-authentication of the client fails due to RADIUS server being
unreachable.
#### Authority
Admin
#### Parameters
No parameters.
#### Examples
223 18/2/2019
Step Name Description Expected Result
Enable force authorized on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
authorized
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# authorized
switch(config-if-dot1x-auth)#
```
Disable force authorized on a port:
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# no aaa authentication port-access dot1x authenticator
authorized
switch(config-if)#
```
OR
```
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication port-access dot1x authenticator
switch(config-if-dot1x-auth)# no authorized
switch(config-if-dot1x-auth)#
```
Verify the help text and tab options of clear commands/ diag-dump
Step 3 commands
clear dot1x authenticator statistics
diag-dump dot1x-authenticator basic [local-file] [timeout]
debug port-access dot1x authenticator
224 18/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify readability of 802.1x paramters through SNMP
Requirement:
Switch---------Work station
Reference:
https://code-nos.rose.rdlabs.hpecorp.net:8443/c/halon/+/51552/34/halon-src/hpe-
docs/Functionality_Guide_PortAccess_WIP.md
225 18/2/2019
Steps :
Step Description Expected Result
Name
Connect the DUT to Verify the configuration using "show run"
Step the workstation with switch# show running-config
1 SNMP Packages
installed. Configure
Current configuration:
!
the DUT and SNMP !Version ArubaOS-CX as5712.01.01.000X
Workstation to have session-timeout 0
reachability via user admin group administrators password ciphertext
management AQBapQNxLspI0FrTCUG3+w/RgE2+FEXWsYW+35LzZkb4ZLGlagAAADunzoexRUazV8oF5LWAXQEwRpmXa
interface !
!
!
snmp-server vrf default
snmp-server community public
snmp-server community vrf_default_community
snmpv3 user test1 auth md5 auth-pass ciphertext AQBapVuqYeTJuT8/BoIlC2z4MxtBXG0p1+fa1R7oFTgPrbYH
snmpv3 context vrf_default_context vrf default community vrf_default_community
snmpv3 user test1 context vrf_default_context
ssh server vrf default
226 18/2/2019
1.1.1.1.1.1.2.49. Test: Test Name : 802.1x_03_REST_Read
Test: Test ID :167093
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 28/1/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the readability of 802.1x parameters through REST Curl request
Requirement:
Switch-------Workstation
Reference:
https://code-nos.rose.rdlabs.hpecorp.net:8443/c/halon/+/51552/34/halon-src/hpe-
docs/Functionality_Guide_PortAccess_WIP.md
227 18/2/2019
Steps :
Step Name Description Expected Result
Connect the DUT to the workstation Verify the configuration using "show
Step 1 with CURL Packages installed. run"
Configure the DUT and Workstation
to have reachability via management
interface
228 18/2/2019
1.1.1.1.1.1.2.50. Test: Test Name : 802.1x_04_REST_Write
Test: Test ID :167148
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 28/1/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the configurability of 802.1x parameters through REST Curl request
Requirement:
Switch-------Workstation
Reference:
https://code-nos.rose.rdlabs.hpecorp.net:8443/c/halon/+/51552/34/halon-src/hpe-
docs/Functionality_Guide_PortAccess_WIP.md
229 18/2/2019
Steps :
Step Name Description Expected Result
Connect the DUT to the workstation Verify the configuration using "show
Step 1 with CURL Packages installed. run"
Configure the DUT and Workstation
to have reachability via management
interface
230 18/2/2019
Step Name Description Expected Result
requests-on-a-port)
- [Configure force
authorized on a port](#configure-
force-authorized-on-a-port)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
155516
231 18/2/2019
Test: Platform Independent : Y
Test: Plan Priority : 4 - Urgent
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 9/1/2019
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 177268
Test: BP Filter: HPE
Test: GUID: ALMTP157C167149
232 18/2/2019
Steps :
Step Name Description Expected Result
Verify the DUT is in the default Verify using "show run"
Step 1 configuration
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
DUT(config)# aaa
authentication port-access
dot1x authenticator
auth-method eap-radius
233 18/2/2019
Step Name Description Expected Result
```
switch(config-if)# aaa
authentication port-access
dot1x
authenticator enable
switch(config-if)#aaa
authentication port-access
mac-auth
234 18/2/2019
Step Name Description Expected Result
auth-precedence dot1x mac-auth
Configure EAP Retries and Timeout Verify the configuration using "show
Step 7 using the below CLIs run"
switch# configure terminal
switch(config)# interface 1/1/1
switch(config-if)# aaa authentication
port-access dot1x authenticator
switch(config-if-dot1x-auth)# eapol-
timeout 140
switch(config-if-dot1x-auth)#max-
eapol-requests 5
235 18/2/2019
Supplicant
Quiet-period parameter sets the amount of time that the switch will refrain from attempting to authenticate a client, after a
failed attempt, with the client constantly attempting to access the network.
The purpose of this test is to verify:
a) The Quiet Period feature of the switch correctly performs its intended function.
b) The Quiet Period can be set within the range of values specified in the CLI options
### Configure maximum authentication attempts on a port
#### Syntax
`[no] aaa authentication port-access dot1x authenticator max-retries <max-retries>`
#### Help
| Token | Help string |
|----------------|--------------------------------------------------------------------------------------------------------------------|
| max-retries | Configure the number of attempts to authenticate a client before failing authentication. Default is 2
retries. |
| *max-retries* | Maximum number of retries.
#### Syntax
`[no] aaa authentication port-access dot1x authenticator discovery-period <discovery-period>`
#### Help
| Token | Help string |
|---------------------|-----------------------------------------------------------------------------------------------------------------|
| discovery-period | Configure the EAPOL Request Identity packet re-transmission period. Default is 30
seconds. |
| *discovery-period* | Specify discovery-period in seconds. |
#### Description
Configure the period the port waits to retransmit the next EAPOL request
identity frame on an 802.1X enabled port with no authenticated client.
The no form of the command resets it to default.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
36649
236 18/2/2019
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C167368
237 18/2/2019
Steps :
Step Name Description Expected Result
Step 1 Configuration 1. Configure the DUT as follows:
1. Dut is configured without
errors
(config)# radius-server host
23.0.0.218 key go4gold18 2. Configuration remains
DUT(config)# aaa authentication constant - see Stepnotes
port-access dot1x authenticator
auth-method eap-radius
238 18/2/2019
Step Name Description Expected Result
starting the authentication process
again
Requirements:
DUT Switch which supports 802.1x authentication and supports HA.
PC with supplicant software or Switch supplicant.
Radius Server.
Client PC
Setup:
Topology:
Supplicant--------------DUT----------------Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
104482
239 18/2/2019
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 247188
Test: BP Filter: HPE
Test: GUID: ALMTP157C167823
240 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Step-2 Enable non-stop Enable nonstop forwarding DUT configured for nonstop-
(chassis based) or configure switching or stack is fully
forwarding for stacking (stack based). formed and all members
joined.
redundancy management-
module nonstop-switching verify using
show running-config
show stacking
Step-4 Redundancy switch Ensure the ping from client Standby MM takes over as
Pc is continuously running Acitve MM.
over failover and reaches supplicant.
Verify there is no traffic loss
Do Fail-over using the during failover on client.
command No re-authentication required
for supplicant.
redundancy switchover
No re-authentication required
for supplicant.
241 18/2/2019
1.1.1.1.1.1.2.54. Test: Test Name :
802.1x_Force_Authorized_Reauthentication
Test: Test ID :168523
Test: Subject : Functionality_Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the functionality of force authorized in PC
Topology:
Radius Server 2
|
|
DUT-----------Radius Server 1
|
|
PC
Feature Description:
Existing authentication feature does not differentiate between an authentication failure due to a “radius-reject” and “radius-
not-being-reachable. This feature enhancement is to support a “Critical VLAN” concept, where in when a remote
authentication (mac-auth or 802.1x) starts for a client but the authentication server is not reachable, the client will be
placed in “Critical VLAN” instead of blocking the client.
Critical VLAN can be configured as tagged (voice) or untagged (data) VLAN. It can also be configured within a user-role,
in which case, we call that user-role as “Critical Role”. Therefore, when Critical-Role is configured, any client which fails
authentication due to authentication server not being reachable, will be applied with the Critical-Role.
This feature is configurable per-port and only applies to mac-based and 802.1x authentication.
Platforms being supported are 3810, 5400R, 2930F and 2930M
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149894
242 18/2/2019
Test: Platform Independent : Y
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C168523
243 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 Aruba-Stack-3810M(config)# vlan 1 using "show run"
Aruba-Stack-3810M(vlan-1)# ip
address 20.1.1.1/24
Aruba-Stack-3810M(vlan-1)# exit
244 18/2/2019
Step Name Description Expected Result
switch(config-if)#aaa
authentication port-access auth-
role auth
Start supplicant in 802.1x configured Verify the clients are placed in auth
Step 7 PC role with force authorized state using
* show aaa authentication port-
access dot1x authenticator
interface all port-statistics
* show aaa authentication port-
access dot1x authenticator
interface all client-status
* show aaa authentication port-
access interface all client-status
245 18/2/2019
1.1.1.1.1.1.3. Subject\Production\SW Development\Feature Test
Plans - Dev Handoff\802.1x\IFD_Analysis
Test List :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
246 18/2/2019
Test: Scripted Date : 9/1/2019
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 173699
Test: BP Filter: HPE
Test: GUID: ALMTP157C168389
247 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
248 18/2/2019
Test: Test ID :168404
Test: Subject : IFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 1/2/2019
Test: Type : MANUAL
Test: Description : Objective:
The purpose of this test is to verify that RADIUS assigned VSAs effectively sets the 802.1x mode to either client mode or
port mode, and that the
related show command outputs are correct.
Requirements:
DUT switch that supports Dynamic RADIUS Attributes.
A RADIUS server with user accounts configured with the necessary VSAs.
A hub (multiport repeater) with at least 5 ports.
DUT switch that supports Dynamic Port Access Auth via RADIUS.
4 PCs with 802.1x supplicant software (for 802.1X authentication)
Setup:
Connect a hub (multiport repeater) to port 1 of the DUT, and a RADIUS server to port 20 or the DUT
Connect 4 pcs with 802.1x supplicant software to the hub.
Attachments:
VSA 4clients 1port.jpg (network diagram)
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
74337
249 18/2/2019
Test: Plan Priority : 3 - High
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 192610
Test: BP Filter: HPE
Test: GUID: ALMTP157C168404
250 18/2/2019
Steps :
Step Name Description Expected Result
Note: the setup commands shown The DUT should accept the
Step 1 - Configure and here serve as examples only, the configuration and reflect this in the
connect the network addresses, port numbers, etc.
should be adjusted to conform to the
output of the appropriate show
commands
specific test environment.
Step 2 - Port to User mode Set X to Port-based via CLI The first (vsa) client should
aaa authentication port-access authenticate successfully.
auth-mode device-mode
X auth with VSA that sets X to Client
The show command should
-based indicate that the VSA values
aruba-port-authentication-mode = are in place.
0 (if 1 is used to enable client mode The second (non vsa) client
and 0 is used to enable port-mode)
should successfully X
Run the command:
show aaa authentication port- authenticate.
access interface all client-status
X authenticate a second user without
a VSA.
251 18/2/2019
Step Name Description Expected Result
show aaa authentication port-
access interface all client-status
aruba-port-authentication-
mode = 1 (if 1 is used to
enable client
mode and 0 is used to enable
port-mode)
252 18/2/2019
Step Name Description Expected Result
253 18/2/2019
1.1.1.1.1.1.3.3. Test: Test Name :
802.1x_Subsequent_Users_Radius_Assigned_Attributes
Test: Test ID :168412
Test: Subject : IFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 1/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the 802.1x feature in device-mode with radius applied attributes/user-role
Requirement:
DUT---Hub---Two PCs
|
Radius server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
254 18/2/2019
Test: BP Filter: HPE
Test: GUID: ALMTP157C168412
255 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
256 18/2/2019
1.1.1.1.1.1.3.4. Test: Test Name : 802.1x_Idle_Session_Timeout
Test: Test ID :168433
Test: Subject : IFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 1/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the 802.1x feature with idle and session timeout
Requirement:
DUT---Hub---Two PCs
|
Radius server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
257 18/2/2019
Test: GUID: ALMTP157C168433
258 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
259 18/2/2019
Step Name Description Expected Result
switch(config-pa-role)#session-
timeout 180
switch(config-pa-role)# exit
switch(config)#
Repeat the same steps with idle Verify the clients never logsoff even
Step 6 timout as none there is no traffic from it
260 18/2/2019
Test: Test ID :168448
Test: Subject : IFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 1/2/2019
Test: Type : MANUAL
Test: Description : Objective:
Verify that 802.1x authentication is successful when radius server sends decremental EAP-ID and wrong sequence of
EAP-ID
Setup:
Supplicant<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
261 18/2/2019
Test: BP Filter: HPE
Test: GUID: ALMTP157C168448
262 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the
topology shown. PC should be
EAP-TLS Setup
DUT(config)# aaa
authentication port-access
dot1x authenticator
auth-method eap-radius
aaa authentication
port-access auth-mode
device-mode
```
263 18/2/2019
Step Name Description Expected Result
switch(config-if)# aaa
authentication port-access
dot1x authenticator enable
switch(config-if)#
HP-Switch(config)#
interface 1/1/1
HP-Switch(config-if)# aaa
authentication port-access
client-limit 2
264 18/2/2019
Step Name Description Expected Result
Setup:
Supplicant<==========>DUT<=========>Radius Server
Description:
The Customer uses Windows 7 and Windows 10 PCs using 802.1x with PEAP/MSCHAPv2. The have User and Machine
Auth cofigured and are using Identity Privacy to obscure the username in the Outer PEAP request.
When a PC is booted up, it will first authenticate with Machine Auth, then when the user logs on, it will reAuthenticate with
User Auth. If the PC is logged off or shut down, the reverse happens. The User is logged off and the PC re-attempts
Machine Auth.
On almost all iterations, the first attempted auth will fail. Most of the time, the next auth will succeed and the User will
simply see a slightly longer login time. In Some circumstances though, it will fail 3 times in a row at which point the Client
gives up...Then after 20-30 minutes it will try again an succeed.
THis doesn't just happen with User+ Machine Auth, but also on ports where both Mac Auth and 802.1X are configured.
In the case where MAC Auth occurs first, the 802.1x will regularly fail on the first attempt. and sometimes all 3 attempts as
noted above.
Customer has Machine Auth+User Auth + Mac Auth and All of them fail open. In some cases, where th 802.1x fails all 3
times, the client will be stuck in Mac Auth. This is how the Customer noticed the failure
265 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
266 18/2/2019
Steps :
Step Name Description Expected Result
Topology is setup .
Step 1 - Topology Setup Connect the devices according the
topology shown. PC should be
EAP-TLS Setup
267 18/2/2019
Test: Test ID :173414
Test: Subject : IFD_Analysis
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 8/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the 802.1x feature with idle and session timeout with Guest clients
Requirement:
DUT---Hub---Two PCs
|
Radius server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
268 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
269 18/2/2019
270 18/2/2019
1.1.1.1.1.1.4. Subject\Production\SW Development\Feature Test
Plans - Dev Handoff\802.1x\Interop Testing
Test List :
Overview
A Switch (Device Under Test) can be configured to use 8201.x/WMA* to authenticate clients on its ports,with Loop
protection and BPDU protection enabled.
This test only verifies the correct cuntionality when using 802.1x port-access.
REFERENCES:
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
http://www.faqs.org/rfcs/rfc3580.html
Requirements
PC w/supplicant software
DUT
RADIUS server
Test Setups
Radius Server
|
Switch1----------Switch2
|
Supplicant
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69192
271 18/2/2019
Test: Automated : Yes
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xInteroperability/802dot1xLoopbackBpduProt
ection.tcl
Test: Automation Progress : 3 - Released for AT
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: Automation/Product CR : 227157
Test: BP Filter: HPE
Test: GUID: ALMTP157C158542
272 18/2/2019
Steps :
Step Name Description Expected Result
Enable authenticator ports On switch 1 enable two ports The switch should accept
as 8021.x authentciators. configuratino and the show
commands should show the
correct resutls.
Connect single link 2.) Connect Switch2 to port is blocked due to non-
Switch1 on one port only authenticated client/user
Enable spanning tree 3.) Enable Spanning tree on Spanning Tree should start
no problem.
Switch1
Enable Loop Protection 4.) Enable Loop Protection on Loop Protection should start
ports on Switch1 with no problem
Connect second link 5.) Connect 2nd link between Port on Switch1 is receving
Switch1 and Switch2 BPDUs and one port is
Note: may have to disable blocking
Spanning Tree on Switch2 to
create loop
This test verifies the accounting request packet is generated when accounting is enabled on the
DUT and not generated when disabled.
Requirements:
273 18/2/2019
DUT Switch which supports 802.1x authentication.
PC with supplicant software or Switch supplicant.
Radius Server.
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
The test verifies that accounting records are generated for ports which are enabled for 802.1x
authentication and not generated when accounting is disabled.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
www.microsoft.com
www.freeradius.org
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69248
274 18/2/2019
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158594
275 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure accounting on the switch This configuration should be visible
STEP 1 - Enable accounting with the following commands
Example:
show running-config
DUT(config)# aaa accounting port- show aaa accounting
access start-stop radius show aaa accounting port-access
Acct-Session-Id =
"012900000052"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
276 18/2/2019
Step Name Description Expected Result
show aaa accounting
show aaa accounting port-access
Example:
Interval(min) : 0
Suppress Empty User : No
This test verifies the accounting interim_update_records are generated for the DUT.
Requirements:
277 18/2/2019
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
The test verifies that accounting interim_update_records are generated by the DUT. It also
verifies the functionality when the update interval is assigned via radius attribute.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
www.microsoft.com
www.freeradius.org
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69249
278 18/2/2019
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158595
279 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure accounting on DUT The configuration should be visible
STEP 1 - Configure with the following commands
accounting on DUT Example:
show aaa accounting
DUT(config) # aaa accounting show aaa accounting port-access
port-access start-stop radius show running-config
Accounting should be successfully
Configure accounting on Radius configured on the radius server
server
This would typically depend on the
flavor of radius which is being
deployed. The configuration details
would be available in the respective
websites.
Configure interim update on the DUT. The value should be visible with the
STEP 2 - Configure interim- following command
update Example:
aaa accounting port-access start- show running-config
stop interim 60 group radius show aaa accounting
<radius-server-group>
Accounting-Request packet
from host 10.1.1.51 port
1813, id=94, length=136
Acct-Session-Id =
"01290000005E"
Acct-Status-Type = Start
Service-Type = Framed-User
280 18/2/2019
Step Name Description Expected Result
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
STEP 4 - Interim update After successful supplicant After the expiry, accounting
authentication wait for a request packets for
expires period till the interim-update Interim_Update_Records for
timer expires. the existing session should
be generated. This can be
observed in the Acct-Status-
Type attribute in the
accounting request packet
AVP.
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=137, length=166
Acct-Session-Id =
"01290000005E"
Acct-Status-Type = Interim-
Update
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
Acct-Session-Time = 60
Acct-Input-Octets = 1408
Acct-Output-Octets =
73704958
Acct-Input-Packets = 4
Acct-Output-Packets =
323485
MS-RAS-Vendor = 11
Acct-Delay-Time = 0
281 18/2/2019
Step Name Description Expected Result
This test verifies that accounting request packet is retransmitted when there is no response from
the radius server.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
The test verifies that accounting packets are retransmitted when there is no response from the
radius server. The retransmission halts when the radius server resumes and response is
recieved.
References:
Procurve Manual: Access Security Guide (ProCurve 8200zl, 6200yl, 5400zl, 3500yl)
www.procurve.com
www.microsoft.com
www.freeradius.org
282 18/2/2019
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69250
283 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Enable accounting on the switch This should be visible with the
STEP 1 - Enable accounting following commands
Example:
show running-config
DUT(config) #aaa accounting port- show aaa accounting
access start-stop radius
STEP 2 - Supplicant Stop the radius service on the Once the supplicant is
radius server system. authenticated, the DUT
authentication Configure a packet analyzer transmits radius-accounting
on the radius server or mirror request packets to the server.
the port on the switch on Since the server does not
which the radius server is respond , the DUT should
connected. Authenticate the retransmit accounting request
supplicant. The supplicant packets to the server and this
can be a workstation with the should be observed in the
supplicant software or it can packet analyzer.
be a switch with the
supplicant feature
STEP 3 - Resume Radius Restart the radius service on The switch should now get a
the radius server system accounting response packet
Service from the radius server and
this should be observed in the
packet analyzer. After the
response is received, the
DUT should stop
retransmitting the accounting
packets to the server
284 18/2/2019
Test: Subject : Interop Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 3/1/2019
Test: Type : MANUAL
Test: Description :
Objective:
This test verifies that accounting start-stop records are generated for the associated type of
events.
Requirements:
Test Setup:
Supplicant--------DUT---------Radius Server
Description:
The test verifies that accounting start and stop records are generated for the events which
triggers on the port configured for 802.1x. The events includes cdifferent control modes for the
port, Disconnect/reconnect the supplicant, disable/enable the port. The test also confirms that the
records are generated when a new user is authenticated on the port.
References:
www.procurve.com
www.microsoft.com
www.freeradius.org
Attachments:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69251
285 18/2/2019
Test: Automated Test Name :
scripts/testSuite/networkSecurity/802dot1x/802dot1xBasicFunctionality/802dot1xRadiusAccStart
StopRec.tcl
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158597
286 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure accounting on the DUT The configuration should be visible
Step 2 - Configure accounting with the following commands.
on the DUT Example:
show running-config
DUT(config)# aaa accounting port- show aaa accounting
access start-stop radius
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=94, length=136
Acct-Session-Id =
"012900000052"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
Acct-Delay-Time = 0
287 18/2/2019
Step Name Description Expected Result
the radius server. The
session ID should be the
same as the one observed in
the previous step. The stop
record and session id value
would be associated
respectively with the Acct-
Status-Type and Acct-
Session-ID attribute.
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=95, length=172
Acct-Session-Id =
"012900000052"
Acct-Status-Type = Stop
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
Uer-Name = "steve"
Acct-Terminate-Cause = Port-
Disabled
Acct-Session-Time = 263
Acct-Input-Octets = 1670
Acct-Output-Octets =
359802590
Acct-Input-Packets = 5
Acct-Output-Packets =
1158172
MS-RAS-Vendor = 11
Acct-Delay-Time = 0
Step 5 - Supplicant reconnect Reconnect the supplicant and Accounting request packets
authenticate. for the start record should be
generated with a different
session ID . The start and
session ID values would be
associated respectively with
the Acct-Status-Type and
Acct-Session-ID attributes.
Example:
Accounting-Request packet
288 18/2/2019
Step Name Description Expected Result
from host 10.1.1.51 port
1813, id=94, length=136
Acct-Session-Id =
"012900000053"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=95, length=172
Acct-Session-Id =
"012900000053"
Acct-Status-Type = Stop
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
Uer-Name = "steve"
Acct-Terminate-Cause = Port-
Disabled
Acct-Session-Time = 263
Acct-Input-Octets = 1670
Acct-Output-Octets =
359802590
Acct-Input-Packets = 5
Acct-Output-Packets =
289 18/2/2019
Step Name Description Expected Result
1158172
MS-RAS-Vendor = 11
Example:
rad_recv: Accounting-
Request packet from host
10.1.1.51 port 1813, id=131,
length=173
Acct-Session-Id =
"01290000005C"
Acct-Status-Type = Stop
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve2"
Acct-Terminate-Cause =
290 18/2/2019
Step Name Description Expected Result
Supplicant-Restart
Acct-Session-Time = 70
Acct-Input-Octets = 1600
Acct-Output-Octets =
93538638
Acct-Input-Packets = 7
Acct-Output-Packets =
363199
MS-RAS-Vendor = 11
Accounting-Request packet
from host 10.1.1.51 port
1813, id=132, length=137
Acct-Session-Id =
"01290000005D"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve2"
MS-RAS-Vendor = 11
This test verifies that accounting session ID's are unique after DUT reboot.
Requirements:
291 18/2/2019
DUT Switch which supports 802.1x authentication.
PC with supplicant software or Switch supplicant.
Radius Server.
Test Setup:
Supplicant--------DUT---------Radius Server
The example commands refer to the topology diagram in the file
802_1X_BASIC_TESTTOPOLOGY.jpg. However, only one supplicant and a radius servers need
to be connected to the DUT (Device Under Test).
Description:
The test verifies that the accounting session id's for the user changes after DUT reboot. The DUT
configured for accounting sends accounting request packet to the radius server with a unique
session ID. After DUT reboot , the accounting request packets are send with a different session
ID.
References:
www.procurve.com
www.microsoft.com
www.freeradius.org
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 08/12/2018: Test Case migrated from PVOS Test ID:
69252
292 18/2/2019
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C158598
293 18/2/2019
Steps :
Step Name Description Expected Result
Call Call <802.1x 1.01
Basic_Port_Based>
Configure accounting on the DUT The above configuration can be
STEP 1 - Configure viewed by the following commands
accounting Example: show running-config
show aaa accounting
DUT(config) # aaa accounting
port-access start-stop radius
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=94, length=136
Acct-Session-Id =
"012900000052"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
Acct-Delay-Time = 0
STEP 3 - DUT Reload Save the configuration to the The configuration should be
flash with the command write persistent after reboot. This
memory should be verified by the
following command
Reboot the DUT using reload
294 18/2/2019
Step Name Description Expected Result
command show running-config
Example
DUT(config)# reload
Example:
Accounting-Request packet
from host 10.1.1.51 port
1813, id=94, length=136
Acct-Session-Id =
"012900000053"
Acct-Status-Type = Start
Service-Type = Framed-User
Acct-Authentic = RADIUS
NAS-Port = 1
Calling-Station-Id = "00-1B-
78-AB-9F-90"
NAS-IP-Address = 10.1.1.51
NAS-Identifier = "ProCurve
Switch 3500yl-24G"
User-Name = "steve"
MS-RAS-Vendor = 11
295 18/2/2019
1.1.1.1.1.1.4.7. Test: Test Name :
Radius_Tracking_I_01_Radius_Server_Groups
Test: Test ID :167154
Test: Subject : Interop Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 28/1/2019
Test: Type : MANUAL
Test: Description : Objective:
To Verify the tracking of radius tracker with radius server groups
Topology:
Radius Server 3
|
Supplicant-----DUT---------Radius Server1
|
|
Radius Server 2
Feature Description:
RADIUS Server Dead Time Processed based on RADIUS Tracking
RADIUS tracking feature already provides periodic information on whether radius server is reachable or not, we
can use this information on which radius server among the ones configured is to be contacted. If radius-tracking
says none of the servers are reachable, we can completely bypass the retry mechanism and apply the back-up
authentication method if configured. This saves the client times to get access on the network.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
149919
296 18/2/2019
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 239875
Test: BP Filter: HPE
Test: GUID: ALMTP157C167154
297 18/2/2019
Steps :
Step Name Description Expected Result
Setup the topology as present in
Step 1 details tab
Make all the radius servers service Verify the "show radius" shows all the
Step 6 unavailable radius servers as dead
298 18/2/2019
Step Name Description Expected Result
enable
switch(config-if)#
DUT(config)# aaa port-access dot1x
authenticator enable
configure 802.1x on any other port
Make the second radius server Verify radius service tracking learns
Step 13 available the server as up using "show
radius"
Verify only 802.1x client is
reauthenticated and access request
is triggered to second radius server
299 18/2/2019
Step Name Description Expected Result
* show aaa authentication
port-access dot1x
authenticator
interface all port-statistics
300 18/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the functionality of Critical Role in PC
Topology:
Radius Server 2
|
|
DUT-----------Radius Server 1
|
|
PC (EAP-TLS)
Feature Description:
Existing authentication feature does not differentiate between an authentication failure due to a “radius-reject” and “radius-
not-being-reachable. This feature enhancement is to support a “Critical VLAN” concept, where in when a remote
authentication (mac-auth or 802.1x) starts for a client but the authentication server is not reachable, the client will be
placed in “Critical VLAN” instead of blocking the client.
Critical VLAN can be configured as tagged (voice) or untagged (data) VLAN. It can also be configured within a user-role,
in which case, we call that user-role as “Critical Role”. Therefore, when Critical-Role is configured, any client which fails
authentication due to authentication server not being reachable, will be applied with the Critical-Role.
This feature is configurable per-port and only applies to mac-based and 802.1x authentication.
Platforms being supported are 3810, 5400R, 2930F and 2930M
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149894
301 18/2/2019
Test: BP Filter: HPE
Test: GUID: ALMTP157C167777
302 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 Aruba-Stack-3810M(config)# vlan 1 using "show run"
Aruba-Stack-3810M(vlan-1)# ip
address 20.1.1.1/24
Aruba-Stack-3810M(vlan-1)# exit
303 18/2/2019
Step Name Description Expected Result
Start supplicant in 802.1x configured Verify the clients are placed in critical
Step 7 PC role and reauthenticating every 120
seconds
* show aaa authentication port-
access dot1x authenticator
interface all port-statistics
* show aaa authentication port-
access dot1x authenticator
interface all client-status
* show aaa authentication port-
access interface all client-status
304 18/2/2019
Feature Description:
Existing authentication feature does not differentiate between an authentication failure due to a “radius-reject” and “radius-
not-being-reachable. This feature enhancement is to support a “Critical VLAN” concept, where in when a remote
authentication (mac-auth or 802.1x) starts for a client but the authentication server is not reachable, the client will be
placed in “Critical VLAN” instead of blocking the client.
Critical VLAN can be configured as tagged (voice) or untagged (data) VLAN. It can also be configured within a user-role,
in which case, we call that user-role as “Critical Role”. Therefore, when Critical-Role is configured, any client which fails
authentication due to authentication server not being reachable, will be applied with the Critical-Role.
This feature is configurable per-port and only applies to mac-based and 802.1x authentication.
Platforms being supported are 3810, 5400R, 2930F and 2930M
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149894
305 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 Aruba-Stack-3810M(config)# vlan 1 using "show run"
Aruba-Stack-3810M(vlan-1)# ip
address 20.1.1.1/24
Aruba-Stack-3810M(vlan-1)# exit
306 18/2/2019
Step Name Description Expected Result
Configure PreAuth and Reject user- Verify the configuration changes
Step 5 role with data-vlans on the port using "show run"
configured for 802.1x
switch# configure terminal
switch(config-if)#aaa
authentication port-access
preauth-role preauth
switch# configure terminal
switch(config-if)#aaa
authentication port-access reject-
role reject
307 18/2/2019
Step Name Description Expected Result
308 18/2/2019
4. Configure the vlans as critical voice vlan for ports connected to IP Phone1 and IP Phone 2 respectively, Verify switch
throws warning message
5. Makes both the radius server unreachable
6. Verify that Critical vlans will not be assigned to the port, since they are not voice vlans
7.Make both the vlans as voice vlans
8.Verify that critical vlans will be applied to the IP Phones
9. Verify the vlan switch is advertising for LLDP/CDP packets
10.Verify the vlan ip Ip Phones are advertising.
Feature Description:
Existing authentication feature does not differentiate between an authentication failure due to a “radius-reject” and “radius-
not-being-reachable. This feature enhancement is to support a “Critical VLAN” concept, where in when a remote
authentication (mac-auth or 802.1x) starts for a client but the authentication server is not reachable, the client will be
placed in “Critical VLAN” instead of blocking the client.
Critical VLAN can be configured as tagged (voice) or untagged (data) VLAN. It can also be configured within a user-role,
in which case, we call that user-role as “Critical Role”. Therefore, when Critical-Role is configured, any client which fails
authentication due to authentication server not being reachable, will be applied with the Critical-Role.
This feature is configurable per-port and only applies to mac-based and 802.1x authentication.
Platforms being supported are 3810, 5400R, 2930F and 2930M
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149894
309 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 Aruba-Stack-3810M(config)# vlan 1 using "show run"
Aruba-Stack-3810M(vlan-1)# ip
address 20.1.1.1/24
Aruba-Stack-3810M(vlan-1)# exit
310 18/2/2019
Step Name Description Expected Result
Make both the radius server Verify using "show radius"
Step 6 unreachable before starting the
authentication and radius tracking
should have learnt the servers are
unreachable also
Start supplicant in 802.1x configured Verify the clients are placed in reject
Step 7 PC role using
* show aaa authentication port-
access dot1x authenticator
interface all port-statistics
* show aaa authentication port-
access dot1x authenticator
interface all client-status
* show aaa authentication port-
access interface all client-status
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
311 18/2/2019
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 9/1/2019
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS;Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 213799
Test: BP Filter: HPE
Test: GUID: ALMTP157C167806
312 18/2/2019
Steps :
Step Name Description Expected Result
Build should be installed sucessfully
Step 1 Reserve Switch from POD without any errors.
manager. Install required
build using "Install buid"
option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
DUT(config)# aaa
authentication port-access
dot1x
authenticator auth-method
eap-radius
313 18/2/2019
Step Name Description Expected Result
```
switch(config-if)# aaa
authentication port-access
dot1x
authenticator enable
switch(config-if)#
314 18/2/2019
Step Name Description Expected Result
HP-Switch(config)# interface
1/1/1
HP-Switch(config-if)# aaa
authentication port-access
lldp-bypass
HP-Switch(config-if)# aaa
authentication port-access
cdp-bypass
315 18/2/2019
Step Name Description Expected Result
comes from the phone as first packet
before 802.1x authentication is
triggered
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
316 18/2/2019
Test: Estimated Run Time : 0
Test: Scripted Date : 9/1/2019
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : Leveraged from PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C167817
317 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
DUT(config)# aaa
authentication port-access
dot1x
authenticator auth-method
eap-radius
318 18/2/2019
Step Name Description Expected Result
```
switch(config-if)# aaa
authentication port-access
dot1x
authenticator enable
switch(config-if)#
HP-Switch(config)# interface
1/1/1
319 18/2/2019
Step Name Description Expected Result
HP-Switch(config-if)# aaa
authentication port-access
lldp-bypass
HP-Switch(config-if)# aaa
authentication port-access
cdp-bypass
320 18/2/2019
Step Name Description Expected Result
Configure mac lock out to deny the Verify the client is deauthenticated
Step 6 traffic from 802.1x authenticated immediately
client
Setup:
Supplicant<==========>DUT<=========>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/12/2018: Test Case migrated from PVOS Test ID:
152510
321 18/2/2019
Test: Test Suited for OSTL? : N
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C169196
322 18/2/2019
Steps :
Step Description Expecte
Name Result
Topology
Step 1 - Connect the devices according the topology shown.
Topology
Setup
Register certificate used for EAP-TLS authentication with more than 5000 bytes and ensure the same is used while Clients an
Step 3 authenticating clients. should us
configure
certificate
Authentication shouldn't suceed as radius access request it will be more than 1512 bytes
Step 4
Trigger Authentication of the client again with certificate size more than 5000 bytes Verify the
Step 6 authentica
be succes
with EAP
being frag
since the
certificate
shouldnt b
than 4096
323 18/2/2019
1.1.1.1.1.1.4.14. Test: Test Name : 802.1x_Non_Default_VRF
Test: Test ID :176375
Test: Subject : Interop Testing
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 10/2/2019
Test: Type : MANUAL
Test: Description : Objective :
To Verify the functionality of 802.1x when ports/radius-servers are from different VRF
Topology:
Radius Server 2 (VRF1)
|
|
PC2(Default)---- DUT-----------Radius Server 1 (Default)
|
|
|
PC 1 - VRF1
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
149894
324 18/2/2019
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 2 - Medium
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 238195,238235,240136
Test: BP Filter: HPE
Test: GUID: ALMTP157C176375
325 18/2/2019
Steps :
Step Name Description Expected Result
Configure Vlan with ip-address Verify the configuration changes
Step 1 Aruba-Stack-3810M(config)# vlan 1 using "show run"
Aruba-Stack-3810M(vlan-1)# ip
address 20.1.1.1/24
Aruba-Stack-3810M(vlan-1)# exit
Add the PC ports to different VRFs Verify the configuration using "show
Step 4 PC1 in VRF1 run"
PC2 in Default VRF
326 18/2/2019
Step Name Description Expected Result
switch(config-if)#aaa
authentication port-access auth-
role auth
327 18/2/2019
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 10/01/2019: Test Case migrated from PVOS Test ID:
154465
328 18/2/2019
Steps :
Step Name Description Expected Result
Reserve Switch from POD manager. Build should be installed sucessfully
Step 1 Install required build using "Install without any errors.
buid" option.
Configure IP in the vlan having radius Verify the configuration using "show
Step 2 server connectivity run"
vlan 1
ip address 20.1.1.1/24
exit
329 18/2/2019
Step Name Description Expected Result
snooping trust
330 18/2/2019
1.1.1.1.1.1.5. Subject\Production\SW Development\Feature Test
Plans - Dev Handoff\802.1x\Supportability
Test List :
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Description:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
331 18/2/2019
Test: Automated : Dev Funnel
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 1 - Low
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: BP Filter: HPE
Test: GUID: ALMTP157C168588
332 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
(config-if)#VRF attach
<default_vrf>
(config-if)#ip address
1.1.1.1/24)
333 18/2/2019
Step Name Description Expected Result
switch(config-if)# aaa
authentication port-access
dot1x
authenticator enable
switch(config)# aaa
authentication
port-access dot1x
authenticator
switch(config-dot1x-auth)#
auth-method eao-radius
334 18/2/2019
Step Name Description Expected Result
switch(config)# aaa
authentication
port-access dot1x
authenticator
switch(config-dot1x-auth)#
enable
335 18/2/2019
Test: Type : MANUAL
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Description:
Purpose: Primary goal of diagnostic module is to capture internal diagnostic information about features from related
daemons. Diagnostic infrastructure is responsible for capturing information from one or more daemon for a feature.
Check diag-dump captured all sufficient DB level and daemon internal state collected for particular feature and captured
info will be helpful for troubleshooting.
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
336 18/2/2019
Test: BP Filter: HPE
Test: GUID: ALMTP157C168589
337 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a
clean configuration config.
(config)# erase startup-config
338 18/2/2019
Step Name Description Expected Result
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Description:
Purpose: This facilities provides user to easily obtain information on the problem that occur and provide an appropriate
solution to the problem. The Event logging Infrastructure is responsible to generate and capture event logs from different
Features/Daemons.
System should capture only system related events (like daemon/feature enable/disable, interface up/down,
feature/daemon restart and etc.) in the events infra.
Logs are persistent over boot and HA sync. Each event logs has a fixed format containing time stamp, daemon
name, unique event ID, severity and message
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
339 18/2/2019
Test: Content Last Modified Date : 7/12/2018
Test: Content Last Modified Owner : ramesh.muthuraj
Test: Supported Platforms : 6300;6400
Test: Feature : 802.1x
Test: NPI Program : Halon 10.4
Test: Platform Independent : Y
Test: Plan Priority : 1 - Low
Test: Test Suited for OSTL? : Y
Test: Estimated Run Time : 0
Test: Scripted Date : 7/12/2018
Test: Test Area : SW Dev Feature
Test: Test Case Attributes : IFD - PVOS
Test: Topology Name : None
Test: Test Sub-Area : System Functional
Test: PVOS CR-ID : 180366
Test: BP Filter: HPE
Test: GUID: ALMTP157C168590
340 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
341 18/2/2019
Step Name Description Expected Result
capture event
logs from different
Features/Daemons.
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Description:
Purpose: Show Tech Infrastructure helps to execute multiple show commands grouped under various feature and
produce the output of those commands. This provides user to analysis the system behavior from remote.
As tester, please check only required CLIs are added into show tech infra. After required CLIs added into tech infra,
execute “show tech” CLIs and validate display output.
342 18/2/2019
Validate below
Show tech <feature> - Check output displayed properly and sufficient info available on the output
show tech <feature> localfile <file name> - Check show tech output copied into file and it has sufficient info
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
343 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
344 18/2/2019
Test: Subject : Supportability
Test: Status : Active
Test: Designer : shobana.nandakumar
Test: Creation Date : 4/2/2019
Test: Type : MANUAL
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Description:
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
345 18/2/2019
Test: BP Filter: HPE
Test: GUID: ALMTP157C168592
346 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
347 18/2/2019
Step Name Description Expected Result
Verify the configuration is
saved correctly in checkpoint
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
348 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
349 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
350 18/2/2019
Step Name Description Expected Result
SETUP:
Supplicant<---->DUT<------>Radius Server
351 18/2/2019
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
352 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
Trigger Supplicant
353 18/2/2019
Step Name Description Expected Result
354 18/2/2019
Test: Description : OBJECTIVE:
The objective of the testcase is to verify core dump generation is correct
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
355 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
356 18/2/2019
Step Name Description Expected Result
Abruptly stop the the 802.1x daemon Verify the core dump is generated
Step 4 process correctly
show core-dump all
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
Valgrind
357 18/2/2019
Test: Execution Status : No Run
Test: Comments :
_______________________________________
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
358 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
359 18/2/2019
Step Name Description Expected Result
Requirements:
1. Switch (DUT) - Device under Test
2. Console/Telnet/SSH connection to the Switch (DUT)
3. Supplicant
4. Radius Server
SETUP:
Supplicant<---->DUT<------>Radius Server
_______________________________________
360 18/2/2019
HPN RnD Tools and BI Team <[email protected]>, 09/12/2018: Test Case migrated from PVOS Test ID:
106764
361 18/2/2019
Steps :
Step Name Description Expected Result
Prepare DUT 1. Erase the DUT 1. DUTs will boot to a default
configuration to start with a config.
clean configuration
(config)# erase startup-config
362 18/2/2019
Index
8 802.1x_2.64_RADIUS_Server__Redundan
802.1x_01_CLI_Help_Text_Verification, cy, 123
215 802.1x_2.65_RADIUS_Server_Interoperab
802.1x_02_SNMP_Read, 229 ility, 128
802.1x_03_REST_Read, 232 802.1x_2.69_Authenticator_Port_Hoping_
802.1x_04_REST_Write, 234 With_NO_Link_Down, 125
802.1x_1.01_Basic_Port_Based, 63 802.1x_2.70_RADIUS_AVPs_in_Access-
802.1x_1.02_Basic_User_Mode, 66 Request_during_supplicant_auth, 131
802.1x_1.21_Config- 802.1x_2.76_RADIUS_Unique_Session_I
CLI_Boundary_Values, 99 D, 104
802.1x_2.03_Authenticator_Values_Held_ 802.1x_2.81_Cached_Re-
Over_Reboot, 70 Authentication_Basic_Functionality,
802.1x_2.04_Authenticator_Statistics, 72 147
802.1x_2.05_Authenticator_EAP_Messag 802.1x_2.82_Cached_Re-
es, 76 Authentication_Persistant_Configurati
802.1x_2.06_Authenticator_Mode_Auto- on, 102
Failed_Reauthentication, 79 802.1x_3.02_Loopback_BPDU_protection
802.1x_2.09_Authenticator_Mode_Auto_ , 276
Successful_Re-authentication, 82 802.1x_4.01_HA_-
802.1x_2.12_Authenticator_Supported_E _Redundancy_Switchover, 244
AP_Types, 85 802.1x_6.1_Multiple_Vendor_Supplicant_
802.1x_2.13_Authenticator_User_Mode_P Authentication, 61
ort_Hopping, 88 802.1x_6.3 Phone_PC_Authentication, 58
802.1x_2.14_RADIUS_Assigned_CoS, 137 802.1x_6.4 Phone_PC_Hoping_Move, 134
802.1x_2.15_RADIUS_Assigned_Egress- 802.1x_Auth_Failure_CLCA_236982_Auth
VLAN-Name, 139 entication failure with Aastra phone
802.1x_2.16_RADIUS_Assigned_Egress- that is doing both 802.1x and mac
VLANID, 144 authentication, 33
802.1x_2.17_RADIUS_Assigned_Rate_Li 802.1x_Cached_Reauth_F_09_Reachable
mit-Egress, 91 _Radius_Cached_Reauth_Period, 152
802.1x_2.18_RADIUS_Assigned_Rate_Li 802.1x_Cached_Reauth_F_11_Reachable
mit-Ingress, 95 _Radius_Different_Credentials, 155
802.1x_2.46_Port_Based_Mode_Values_ 802.1x_Cached_Reauth_F_16_UnReacha
Held_Over_Reboot, 108 ble_Radius_Different_User_Credentials
802.1x_2.47_RADIUS_Accounting_Enabl , 158
e_Disable, 278 802.1x_cdp_lldp_bypass, 316
802.1x_2.48_RADIUS_Accounting_Interi 802.1x_CLCA_106214_Disabling_port_wh
m_Update_Record, 282 en_allowed_RADIUS_GVRP_VLANS, 22
802.1x_2.49_RADIUS_Accounting_Reque 802.1x_CLCA_108818_IOP_with_STP, 10
sts_Retransmitted, 287 802.1x_CLCA_122837_Verifying_settings
802.1x_2.50_RADIUS_Accounting_Start_ _after_re-enabled, 13
Stop_Record, 289 802.1x_CLCA_134114_MAC-
802.1x_2.51_RADIUS_Accouting_Unique auth_with_mixed_mode, 18
_Session_ID, 296 802.1x_CLCA_170012_AP connected
802.1x_2.55_NAS_Attributes_MS-RAS- through 2610 switch are not 802.1x
Vendor_Attribute, 110 authenticated, 29
802.1x_2.61_RADIUS_Access- 802.1x_CLCA_199478_connection to port
Accept_with_Reply-Message, 114 using PEAP can erase existing ACL for
802.1x_2.62_RADIUS_Message_Authenti other MAC address, 26
cator_in_packet, 116 802.1x_CLCA_211376_EAPOL_Logoff, 51
802.1x_2.63_RADIUS_Proxy_Server, 120
363 18/2/2019
802.1x_CLCA_243452_EAP_TLS_Fragme after successful 802.1x authentication,
ntation, 54 31
802.1x_CLCA_245042_EAP_TLS_Jumbo, C
48 Critical_VLAN_F_22_PC_Critical_Role,
802.1x_CLCA_CR244438_Any 305
configuration change done at port level D
that causes de-authentication of all the Disconnect_Message_PC_Behind_IP_Ph
clients_User_Role, 39 one, 212
802.1x_CLCA_CR244438_Any P
configuration change done at port level Port_Bounce_Host_PC_Behind_IP_Phon
that causes de-authentication of all the e, 185
clients_Vlan, 42 R
802.1x_CLCA_CR245547_Macq Bank Radius_F_35._Attributes_Dynamic_Xauth
Cisco VoIP phones seem to drop out of mode, 253
MAC address table on 5412 switch, 45 Radius_F_53._RFC_4675_On_User_Priori
802.1x_Deauthentication_of_Guest_Clien ty_Table, 204
ts, 272 Radius_Tracking_I_01_Radius_Server_G
802.1x_DSNOOP, 332 roups, 301
802.1x_EAP_Retries_Timeout, 236 Radius-Filter-
802.1x_EAP-ID-Compliance, 265 ID_F_01_ipv4_Functionality_802.1x,
802.1x_Force_Authorized_Reauthenticati 195
on, 247 Radius-Filter-
802.1x_Idle_Session_Timeout, 262 ID_F_04_ipv6_Functionality_8021x, 191
802.1x_mac-auth_CLCA_235976_Cisco Radius-Filter-
phones will NOT authenticate to ID_I_02_Interop_Radius_Assigned_AC
correct VLAN, 36 L, 199
802.1x_Machine_User_Auth_Mac_Auth, RFC_4675_on_2510_B_01.
270 VLAN_ID_tagged, 161
802.1x_Non_Default_VRF, 329 RFC_4675_on_2510_B_02. VLAN
802.1x_Port_Security_Mac_Lockdown_L _Name_tagged, 166
ockout, 321 RFC_4675_on_2510_B_03.
802.1x_Preauth_Role, 309 VLAN_ID_untagged, 171
802.1x_Quiet_Discovery_Authentication_ RFC_4675_on_2510_B_04.
Attempts, 240 VLAN_Name_untagged, 176
802.1x_RADIUS Assigned VLAN, 209 S
802.1x_Radius_Over_IPSec, 326 Session_Timeout_CoA_F_08_PC_Behind
802.1x_Reject_Role, 313 _IP_Phone, 181
802.1x_S_01._CopySupportFiles, 336 Special_488_02_PortSpeedVSA_with_Diff
802.1x_S_02._DiagDump, 340 erent_Port_Speed, 188
802.1x_S_03._EventLogs, 344 Subject, 6
802.1x_S_04._ShowTech, 347 Subject\Production, 6
802.1x_S_05._Checkpoint, 349 Subject\Production\SW Development, 7
802.1x_S_06_Config_Migration_CLI, 353 Subject\Production\SW
802.1x_S_07_Config_Migration_JSON, Development\Feature Test Plans - Dev
356 Handoff, 8
802.1x_S_08_Core_Dump, 359 Subject\Production\SW
802.1x_S_09_Memory_leak, 362 Development\Feature Test Plans - Dev
802.1x_S_10_Debug_Logs, 365 Handoff\802.1x, 9
802.1x_Subsequent_Users_Radius_Assi Subject\Production\SW
gned_Attributes, 259 Development\Feature Test Plans - Dev
802.1x_Trunk_Port, 251 Handoff\802.1x\CFD_Analysis, 10
8021x_CLCA_241399_Radius accounting Subject\Production\SW
start packets are sometimes delayed Development\Feature Test Plans - Dev
364 18/2/2019
Handoff\802.1x\Functionality_Testing, Subject\Production\SW
58 Development\Feature Test Plans - Dev
Subject\Production\SW Handoff\802.1x\Interop Testing, 276
Development\Feature Test Plans - Dev Subject\Production\SW
Handoff\802.1x\IFD_Analysis, 251 Development\Feature Test Plans - Dev
Handoff\802.1x\Supportability, 336
365 18/2/2019