Layer 3

DescriptionTest Case IDPDTopology

Verify that ping works over ECMP

test_ping_013

No

Verify ip address can be configured in SVI.

test_IP_001

No

Verify ip address can be configured over routed port.

test_IP_002

No

Verify SVI and routed ports can be admin down or up

test_IP_005

No

Verify connected route gets created for the SVI subnet in the ip route table.

test_IP_006

No

Verify IP interface is operational for SVI with LACP portchannel members

test_IP_011

No

Verify ip address can be configured over routed PCH.

test_IP_014

No

Verify BGP AS configuration works properly

test_bgp_001

No

Verify BGP peering happens with nodes in same AS and iBGP neighbor table gets updated properly

test_bgp_002

No

Verify BGP peering happens with nodes in different AS and eBGP neighbor table gets updated properly

test_bgp_003

No

Verify BGP route learning using eBGP with routes injected from IXIA

test_bgp_004

No

Verify BGP route removal using eBGP with routes withdrawn from IXIA

test_bgp_005

No

Verify BGP route relearn over different neighbor when interface is shutdown

test_bgp_006

No

Verify unnumbered functionality with iBGP

test_qual_bgp_001

Yes

Verify unnumbered functionality with eBGP

test_qual_bgp_002

Yes

Verify BGP route redistribution in DUT

test_qual_bgp_003

No

Verify BGP6 functionality

test_qual_bgp_004

No

Verify BGP AS-PATH prepend functionality

test_qual_bgp_007

No

Verify BGP route map match prefix list, access-list deny and permit functionality

test_qual_bgp_008

No

Verify BGP route map match AS-PATH permit and deny functionality

test_qual_bgp_009

No

Verify BGP route map match community list permit and deny functionality

test_qual_bgp_010

No

Verify BGP max MED functionality

test_qual_bgp_011

No

Verify BGP maximum prefix limit per peer functionality

test_qual_bgp_013

No

Verify BGP communities functionality

test_qual_bgp_014

No

Verify BGP regexp match single and multi AS permit & deny action using AS-path access lists

test_qual_bgp_015

No

Verify BGP regexp match any AS permit and deny action using AS-path access lists

test_qual_bgp_016

No

Verify BGP regexp match range of BGP communities functionality

test_qual_bgp_017

No

Verify BGP peering working with BGP listen range

test_qual_bgp_019

No

Verify VRF functionality

test_qual_vrf

Yes

Verify VLAN 1 support for Host connectivity

test_qual_vlan1

Yes

Verify IPV6 neighbor discovery

test_qual_ipv6_neighbor

No

Verify L3 DROP ACL functionality with matching source IP and source port

test_acl_001

No

Verify L3 DROP ACL functionality with matching destination IP and destination port

test_acl_002

No

Verify L3 DROP ACL functionality with matching SIP, DIP, SPORT, DPORT

test_acl_003

No

Verify L3 DROP ACL with ACL rule having subnet mask

test_acl_004

No

Verify L3 DROP ACL est acl rule with protocol = TCP

test_acl_005

No

Verify L3 DROP ACL - Test acl rule with protocol = UDP

test_acl_006

No

Verify L3 PERMIT ACL functionality with matching source IP and source port

test_acl_007

No

Verify L3 PERMIT ACL functionality with matching destination IP and destination port

test_acl_008

No

Verify L3 PERMIT ACL functionality with matching SIP, DIP, SPORT, DPORT

test_acl_009

No

Verify L3 PERMIT ACL with ACL rule having subnet mask

test_acl_010

No

Verify L3 PERMIT ACL - Test acl rule with protocol = TCP

test_acl_011

No

Verify L3 PERMIT ACL - Test acl rule with protocol = UDP

test_acl_012

No

Verify Drop ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port

test_qual_ip6_acl_001

No

Verify Drop ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port

test_qual_ip6_acl_002

No

Verify drop ACL - matching IPv6 params subnet, dst, src ports combined

test_qual_ip6_acl_003

No

Verify PERMIT ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port

test_qual_ip6_acl_004

No

Verify Permit ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port

test_qual_ip6_acl_005

No

Verify drop ACL - matching IPv6 params subnet, dst, src ports combined

test_qual_ip6_acl_006

No

Verify whether static ARP entry can be configured

test_arp_003

No

Verify that the DUT will respond to an ARP Request for the SVI interface

test_arp_007

No

Verify whether clear ARP entries works properly

test_arp_011

No

Verify whether ARP entries are flushed after some time

test_arp_012

Yes

PD(Platform dependent) means that FTAS is designed to work with specific hardware and software configurations and may not be compatible with other platforms.

Last updated